Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

User identity authentication method, device and system

A technology for user identity authentication and user identity information, applied in the field of data communication, can solve the problems of high cost, difficult to crack, and cannot be spread, and achieve the effect of lowering the threshold, expanding market share, and reducing operating costs

Inactive Publication Date: 2016-06-22
卓望数码技术(深圳)有限公司
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This scheme has good security. The card issuance process is in a completely controlled environment. The operator generates data and initializes the card in the factory. The user only uses and cannot understand the external reading interface of the card, so it is difficult to crack; The acceptance equipment POS machine is also generated in the production environment of the supervised supplier, in which the key interface protocol and key information are developed in a closed environment and cannot be diffused
However, the cost of this solution is high. Merchants who have already installed POS need to renovate their existing equipment, and merchants who have not installed POS need to purchase reading head equipment or POS machines. The cost is relatively high, and it is an economic burden for small and medium-sized merchants.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method, device and system
  • User identity authentication method, device and system
  • User identity authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] The present invention proposes a system that uses NFC mobile terminals to replace the dedicated POS machine used in the existing unified user identity authentication card solution to perform user identity authentication. figure 1 A schematic diagram of a logical structure of a user identity authentication system according to an embodiment of the present invention is shown. Such as figure 1 As shown, the user identity authentication system includes a user identity authentication card 10 , an NFC mobile terminal 20 , an authentication server 30 and a business system 40 . The user identity au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a user identity authentication method, a user identity authentication device and a user identity authentication system. The system includes: a user identity authentication card for storing encrypted user identity information; a mobile terminal with short-range wireless communication function for reading the user identity information in the user identity authentication card by using short-range wireless communication technology, and Send an identity authentication request in an encrypted manner based on the user identity information; the authentication server is used to receive and verify the identity authentication request, and decrypt the user identity information; the business system is used to receive the user identity delivered by the authentication server information, generating service information based on the user identity information and returning it to the mobile terminal. The invention adopts the NFC mobile terminal which is easily configured by merchants as the reading device, which greatly reduces the operating cost, and at the same time fully considers factors such as process safety and transmission safety, achieves a balance in performance and safety, and is easy to promote and cover the market.

Description

technical field [0001] The invention relates to the field of data communication, more specifically, to a user identity authentication method, a user identity authentication device and a user identity authentication system. Background technique [0002] In the commercial society, various business activities are inevitably accompanied by identification work, such as confirming membership status when shopping in a shopping mall, picking up goods offline for online shopping, paying for shopping through prepaid cards, point cards, etc., all must first The business can only be completed after confirming the legitimacy of the user. Identity authentication is used more and more widely in the credit society. The traditional identity authentication method is in the form of independent physical cards, such as membership cards, point cards, access cards, payment cards, game cards, recharge cards, while technically using ordinary cards, magnetic stripe cards, IC cards and other forms, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 梁夏王巍刘志诚唐锋陈蕙茗
Owner 卓望数码技术(深圳)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products