Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method, system and sim card

A technology of authentication method and correlation coefficient, applied in the field of system, SIM card, and authentication method, can solve the problem of user's personal privacy leakage, and achieve the effect of avoiding personal privacy leakage and improving security.

Active Publication Date: 2020-02-21
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the solution of the prior art, if the user loses the mobile terminal and the lost mobile terminal is picked up by other people who can use the card authentication service, the person who picks up the mobile terminal will click the pop-up window on the mobile terminal to log in website, resulting in leakage of user privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, system and sim card
  • Authentication method, system and sim card
  • Authentication method, system and sim card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to enable those skilled in the art to better understand the technical solution of the present invention, the authentication method, system and SIM card provided by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0057] figure 1 A flow chart of an authentication method provided by Embodiment 1 of the present invention, such as figure 1 As shown, the method includes:

[0058] Step 101, receiving the biological sample to be tested sent by the mobile terminal.

[0059] Step 102. Calculate the comparison vector of the biological sample to be tested, and calculate the similarity between the pre-stored registration comparison vector and the comparison vector to be tested.

[0060] Step 103, comparing the similarity with the set threshold to obtain a comparison result.

[0061] In the technical solution of the authentication method provided in this embodiment, the comparison vector to be tested of the biologic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method, a system and a SIM card thereof. The method comprises the following steps of receiving a biological sample to be tested which is sent by a mobile terminal; calculating a comparison vector to be tested of the biological sample to be tested, and calculating similarity of a registered comparison vector which is stored in advance and the comparison vector to be tested; and comparing the similarity to a set threshold so as to acquire a comparison result. In the technical scheme of the authentication method, the system and the SIM card, the comparison vector to be tested of the biological sample to be tested is calculated, the similarity of the registered comparison vector which is stored in advance and the comparison vector to be tested is calculated, and the similarity is compared to the set threshold so as to acquire the comparison result so that safety of an authentication process is increased and personal user privacy leakage is avoided.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to an authentication method, system and SIM card. Background technique [0002] With the continuous evolution of information and communication technology and the introduction of new technologies such as cloud computing and big data, people can use PCs and mobile terminals to carry out various network services such as web surfing, resource access, e-commerce, mobile payment, and social networking. Although various network services are convenient for users, the privacy and security situation of network users is becoming more and more severe. In recent years, a series of network information leakage incidents have emerged one after another. [0003] In the prior art, the card authentication service is usually used to ensure the security of personal privacy of users. The card authentication business includes: the user logs in to a third-party website and enters the homepage; the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0861H04L63/0876H04L63/18
Inventor 刘镝王志军张尼王笑帝
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products