CN1750462A - Method for realizing identity identification by mobile terminal - Google Patents

Method for realizing identity identification by mobile terminal Download PDF

Info

Publication number
CN1750462A
CN1750462A CN 200410074750 CN200410074750A CN1750462A CN 1750462 A CN1750462 A CN 1750462A CN 200410074750 CN200410074750 CN 200410074750 CN 200410074750 A CN200410074750 A CN 200410074750A CN 1750462 A CN1750462 A CN 1750462A
Authority
CN
China
Prior art keywords
authentication
user
portable terminal
information
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200410074750
Other languages
Chinese (zh)
Inventor
杨鹏亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN 200410074750 priority Critical patent/CN1750462A/en
Publication of CN1750462A publication Critical patent/CN1750462A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

This invention discloses a method for realizing identity certification by a mobile terminal, which first of all sets up a corresponding relation between an exclusive identification information owned by the user and said user identity certification information, then a, the network receives the identity certification request carrying a ciphered code and gets the exclusive identification information of the mobile terminal held by the user, b, the network gets the identity certification information of the user based on the relation between the identification information and the user identity certification information got in step a, c, the network sends the identity certification information to the certification end directly or indirectly.

Description

Realize the method for authentication by portable terminal
Technical field
The present invention relates to identity identifying technology, refer to a kind of method that realizes authentication by portable terminal especially.
Background technology
Along with mobile communication and rapid network development, people can realize the demand of communication and online by portable terminal anywhere any time.Because the continuous increase of network service, mobile phone users can not only be linked up with the people anywhere or anytime, and can obtain up-to-date information, the required service of enjoyment easily, such as: inquire about news messages, train number information, Flight Information or the like by the wireless Internet access mode, or realize ecommerce classes application such as booking tickets on net, not deposit and withdraw by the wireless Internet access mode.The ecommerce class service that realizes online transaction generally all can relate to authentication, present way mostly is: identity information is provided when carrying out online transaction, confirm identity face to face by identity document or specific identification information more afterwards, could finally finish transaction behind the identity validation.Such as: ticket booking person need provide the identification card number of oneself during booking tickets on net, when getting tickets, confirm just can take ticket after the identity by identity card, so, not only need the user to carry the identity document of the own identity of proof, even may be owing to need authenticating identity to allow the user go to the appointed place in person, very trouble can not provide service more easily for the user, can not embody the superior part of online transaction and wireless Internet access.
In addition, only from the angle of authentication, need the occasion of authentication a lot of at present, such as: bank, customs, insurance or the like, a lot of carrying out and need user's identity being authenticated of serving, all now authentications all need the party to carry the identity document of oneself, wait the identity of unique proof oneself such as identity card, passport, army's testimony of a witness, so, just need the user to carry identity document, not only bother but also lose easily.And if someone identity document is lost or leave behind identity document when handling affairs, the current thing that will do just can't be finished, and not only wastes time, and also may incur loss through delay the processing to critical event.As seen, adopt identity document to carry out authentication and exist a lot of not convenient problems.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of and realizes the method for authentication by portable terminal, can be simply, easily and fast finish authentication.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of method by portable terminal realization authentication, key is, sets up the unique identification information of portable terminal that the user has and the corresponding relation between this user's ID authentication information; This method is further comprising the steps of:
A. network side receives and carries the ID authentication request of secret password, and obtains the unique identification information that needs the current portable terminal of holding of authenticated user;
B. network side need to obtain the authentication information of authenticated user according to the corresponding relation between the portable terminal unique identification information that obtains among the step a and portable terminal unique identification information and user's ID authentication information;
C. network side offers the authentication information that is obtained at the authentication end that need carry out authentication to the user.
Among the step a, described ID authentication request is from portable terminal; Mutual signaling between network side basis and the current portable terminal of holding of needs authenticated user is obtained the portable terminal unique identification information automatically.
In the such scheme, described step c is specially: network side sends to the current authentication information of obtaining needs the current portable terminal of holding of authenticated user; This portable terminal sends to the authentication information of receiving the authentication end that need carry out authentication to the user again.Perhaps, described step c is specially: network side directly sends to the current authentication information of obtaining the authentication end that need carry out authentication to the user.
Among the step a, described ID authentication request is from portable terminal, and further carries the unique identification information that needs the current portable terminal of holding of authenticated user in the ID authentication request; Network side obtains the portable terminal unique identification information from ID authentication request.
In the such scheme, described step c is specially: network side sends to the current authentication information of obtaining needs the current portable terminal of holding of authenticated user; This portable terminal sends to the authentication information of receiving the authentication end that need carry out authentication to the user again.Perhaps, described step c is specially: network side directly sends to the current authentication information of obtaining the authentication end that need carry out authentication to the user.
Among the step a, described ID authentication request be from need carrying out the authentication end of authentication to the user, and further carries the unique identification information that needs the current portable terminal of holding of authenticated user in the ID authentication request; Network side obtains the portable terminal unique identification information from ID authentication request.Then before step a, this method further comprises:
A01. the authentication end that needs the user is carried out authentication carries the proof of identification information of self to needing the current portable terminal of holding of authenticated user to initiate ID authentication request in this request;
A02. need the current portable terminal of holding of authenticated user according to the proof of identification information in the request, judge whether that the authentication end that allows to initiate to ask obtains the authentication information that needs authenticated user, if do not allow, then return refusal information, finish current handling process; If allow, then need the current portable terminal of holding of authenticated user the destination address of self portable terminal unique identification information, secret password and network side to be sent to the authentication end of the request of initiation.
In the such scheme, described step c is specially: network side directly sends to the current authentication information of obtaining the authentication end that need carry out authentication to the user.
In the such scheme, this method further comprises: need carry out the authentication end of authentication to needing the current portable terminal of holding of authenticated user to initiate ID authentication request to the user.
In the such scheme, portable terminal unique identification information of being set up and the corresponding relation between the user's ID authentication information are stored in network side with the database form.In this case, obtain described in the step b to need the authentication information of authenticated user specifically to comprise:
B1. network side is an index with the current portable terminal unique identification information that obtains, every recorded information in the Query Database; Judge whether to exist the item of information with current mobile terminal unique identification information coupling, if exist, execution in step b2 then, otherwise, return the information of not finding, and finish current handling process;
B2. judge secret password entrained in the ID authentication request whether with the item of information that finds in the secret password coupling, if then return the authentication information of current mobile terminal unique identification information correspondence; Otherwise, return the password error message, finish current handling process.
In the such scheme, the described corresponding relation of setting up between customer mobile terminal unique identification information and this user's ID authentication information is: set up one-one relationship or many-one relationship or many-to-one relationship or many-to-many relationship between customer mobile terminal unique identification information and this user's ID authentication information.Described portable terminal is: 2G mobile communication terminal or 3G mobile communication terminal or PHS mobile phone or PDA or palmtop PC.Described portable terminal unique identification information is: SIM card card number or usim card card number or PHS card card number or cell phone apparatus are made number or PDA Equipment Serial Number or handheld computing device sequence number.Described authentication information is: identification card number or passport number or army's testimony of a witness number or fingerprint or pupil film.Described authentication information provides with data or voice or image format.
The method that realizes authentication by portable terminal provided by the present invention, the unique identification information of the portable terminal that the user is held and this user's authentication information are set up corresponding relation, make the user just can provide the trusted identities authentication information anywhere or anytime by the own current portable terminal of holding, and then finish authentication to this user, this method realizes simple, convenient, fast, not only improved authentication efficient, and given full play to mobile communication, the superior part of wireless Internet access and ecommerce, avoided the user must carry the trouble of identity document, can provide a great convenience for the user.
The present invention can adopt different ways when specific implementation, such as: set up between all portable terminals of certain user and all authentication information one to one or the relation of many-one or one-to-many or multi-to-multi; For another example: in the authentication process, directly provide authentication information by the current portable terminal of holding of user, or only obtain route and corresponding security information by what the current portable terminal of holding of user provided authentication information, by asking the initiator, finish authentication or the like again according to route that is provided and the real authentication information of corresponding safety information acquisition; Therefore, the present invention has very big flexibility in realization.
Description of drawings
Fig. 1 is the process chart of network side inquiring user authentication information among the present invention;
Fig. 2 obtains the process chart of user's ID authentication information method embodiment one for the present invention;
Fig. 3 obtains the handling process schematic diagram of another situation among the user's ID authentication information method embodiment one for the present invention;
Fig. 4 obtains the process chart of user's ID authentication information method embodiment two for the present invention;
Fig. 5 obtains the process chart of user's ID authentication information method embodiment three for the present invention.
Embodiment
Core concept of the present invention is: for any one user, set up the unique identification information of portable terminal that the user has and the corresponding relation between this user's ID authentication information, after network side is received ID authentication request, network side is according to the unique identification information of the current portable terminal of holding of user, search and this user's trusted identities authentication information is provided, and then finish authentication this user.
Here, the described corresponding relation of setting up between customer mobile terminal unique identification information and this user's ID authentication information can be one-one relationship or many-to-one relationship or many-one relationship or many-to-many relationship.Be exactly specifically, can be with a plurality of portable terminals unique identification information separately that same user had to should the same authentication information of user, have a GSM net mobile phone, hand-held telephone system (PHS) mobile phone of people, people's handheld device (PDA) one by one one by one such as: certain user, can set up SIM card card number, PHS card card number, PDA device number three and this user identity corresponding relation between demonstrate,proving number; Perhaps, with the unique identification information of a portable terminal of certain user to a plurality of definite identity information that should the user, such as: set up the corresponding relation between SIM card card number and this user identity card in certain user GSM net mobile phone number, the passport No.; Certainly, also can set up between SIM card card number, PHS card card number and user identity card number, the passport No. one to one or the corresponding relation of multi-to-multi, specifically set up which kind of corresponding relation, can determine according to user's request or practical situations.Wherein, described portable terminal includes but not limited to 2G mobile radio communication mobile phone, 3G mobile radio communication mobile phone, PHS mobile phone, PDA, palmtop PC or the like; Described portable terminal unique identification information includes but not limited to that SIM card card number, usim card card number, PHS card card number, cell phone apparatus are made number, PDA Equipment Serial Number, handheld computing device sequence number or the like; Described authentication information includes but not limited to identification card number, passport number, army's testimony of a witness number, fingerprint, pupil film or the like, and this authentication information can provide with different forms: data, image, voice.
Here, the network side of being mentioned provides authentication information to be: mutual by between UE and the network side, network side provides authentication information to current UE after searching and obtain this user's authentication information according to the unique identification information of the current portable terminal of holding of user; Can also be: need the authentication end to initiate request to UE, whether UE allows to initiate the authentication information that the requestor obtains this user according to the validation of information that carries in the request, if allow, then provide unique identification information and the corresponding security information of obtaining required authenticated user authentication information to initiating the requestor, obtain the authentication information of required authenticated user according to the unique identification information that is provided and corresponding security information from network side by initiating the requestor again, finish authentication; Also can be: need the authentication end to initiate request to UE, UE is according to request mutual by between self and the network side, search and obtain this user's authentication information by network side according to the unique identification information of the current portable terminal of holding of user, authentication information is offered needs the authentication end then.
Based on above-mentioned principle, the present invention realizes that the method for authentication specifically may further comprise the steps:
Step 1: set up the unique identification information of portable terminal that the user holds and the corresponding relation between this user's ID authentication information in advance.Described corresponding relation can be positioned in the database and preserve, and the storage organization of every record can be as shown in Table 1 in the database.
The portable terminal unique identification information
The authentication information of portable terminal respective user
Secret password
Other necessary relevant information
Table one
Table one is the corresponding relation between portable terminal unique identification information and the user's ID authentication information, except the mobile terminal identification information and user's ID authentication information of necessity, can also comprise secret password, other necessary relevant information, wherein, the password of inquiry's input was complementary when secret password was used for Query Database, so that determine further whether the inquiry is legal; Other necessary relevant information can be that the inquiry may need the information obtained, also can be the authorization information that needs to confirm that the inquiry is whether legal.
Based on the given structure of table one, if be to concern one to one between portable terminal unique identification information and the user's ID authentication information, then these two of portable terminal unique identification information and user's ID authentication information have only one respectively; If be the relation of one-to-many between portable terminal unique identification information and the user's ID authentication information, then portable terminal unique identification information item only has one, and that the user's ID authentication information item has is a plurality of; If between portable terminal unique identification information and the user's ID authentication information be many-to-one relation, then portable terminal unique identification information item has a plurality ofly, and the user's ID authentication information item only has one; If between portable terminal unique identification information and the user's ID authentication information be the relation of multi-to-multi, then portable terminal unique identification information item and user's ID authentication information item can have a plurality of, in this case, also can be stored as the structure of a plurality of tables one, each storage organization is a relation one to one.
Recorded information in the described database can typing when the user buys portable terminal; The database of being set up is a query term with the portable terminal unique identification information; The database of being set up is generally deposited in the core net part of network side, can deposit separately, also can be positioned in certain network entity, such as being positioned among the HLR, the inquiry that can finish data between this database and the core network with communicate by letter.
Step 2: when needs carry out authentication to the user, network side receives the ID authentication request that contains secret password, according to the pairing portable terminal unique identification information of current request of receiving, in database, inquire about, obtain the authentication information that need carry out the authentication user, network side returns the authentication information of being obtained.
In this step, what generally initiate ID authentication request to network side is to carry out the current portable terminal of holding of authentication user, in this case, if the portable terminal unique identification information is SIM card card number or usim card card number or International Mobile Station Equipment Identification (IMEI) etc., because these identification information network sides can be by obtaining in the standard traffic signaling mutual between self and the user terminal (UE), such as from the WCDMA signaling, obtaining, then needn't carry the portable terminal unique identification information in the request, network side obtains automatically and gets final product; The identification information that can obtain automatically if not network side or what initiate ID authentication request to network side is not to carry out the current portable terminal of holding of authentication user then also must carry in the request and need carry out authentication user corresponding mobile terminal unique identification information.
Here, form from ID authentication request to network side that initiate can have multiple, such as: by the standard traffic signaling, by specifically defined signaling, by short message (SMS), by Multimedia Message (MMS), pass through E-mail mode or the like.Therefore, the present invention need increase the logic function module that ID authentication request initiation function is finished in setting in portable terminal.
In this step, described data base querying idiographic flow may further comprise the steps as shown in Figure 1:
Step 101: network side is an index with the current portable terminal unique identification information that obtains, promptly as coupling input item, every recorded information in the Query Database.Wherein, the portable terminal unique identification information can be that network side obtains automatically, also can obtain from ID authentication request.
Step 102: judge whether and the item of information of input item coupling that if having, then execution in step 103; Otherwise, return the information of not finding, finish current handling process.
Step 103~104: judge secret password entrained in the ID authentication request whether with the item of information that finds in the secret password coupling, if then return the authentication information of current mobile terminal unique identification information correspondence; Otherwise, return the password error message, finish current handling process.Here, if a plurality of authentication information are arranged, can return any one, or return all authentication information, or return the authentication information of appointment, such as: require to return the finger print information that needs authenticated user in the request.
Mutual between network side and the database can be two communication interactions between the network entity, also can be the mutual of certain network entity inside, and the mutual signaling that is adopted can be the standard signaling, also can be self-defining mutual signaling.
At user terminal or after asking the initiator to obtain authentication information, can finish authentication to active user's identity, continue follow-up operation; Or start other related application.
In order to guarantee security reliability, can carry out encryption to the interactive information of any inter-entity in the inventive method as required, can adopt existing any one cipher mode and cryptographic algorithm thereof.
In actual applications, identity identifying method of the present invention is mainly concerned with four entities: need carry out the authentication end of authentication, portable terminal, network side signaling processing entity and the network side data storehouse that the active user holds to the active user.Below respectively with reference to accompanying drawing, in conjunction with practical application, further specify several situations that the inventive method realizes by three specific embodiments.
Embodiment one:
In the present embodiment, initiate ID authentication request by the portable terminal that the active user holds to network side, and mutual by portable terminal and network side, network side returns to the portable terminal that the active user holds with the active user's that obtains authentication information.Suppose that the active user is user A, as shown in Figure 2, realize in the present embodiment that the method for authentication specifically comprises:
Step 200: user A need carry out certain business, and the end that provides that should business need carry out authentication to user A, then should providing of business hold, initiate ID authentication request to the current portable terminal of holding of user A just as the authentication end that need carry out authentication to the active user.
Step 201: after the current portable terminal of holding of user A is received ID authentication request, initiate ID authentication request, comprise secret password in this request at least, can also further carry the portable terminal unique identification information of current mobile terminal to network side.
Step 202~203: after the network side signaling processing entity is received that user A is current and held the ID authentication request that portable terminal sends, in the network side data storehouse, search whether there is required authentication information according to the portable terminal unique identification information, if exist, then the network side signaling processing entity returns the authentication information of being obtained to the current portable terminal of holding of user A.Wherein, the concrete search procedure of database as shown in Figure 1.
Step 204: after the current portable terminal of holding of user A is received required authentication information, the authentication information that obtains is returned to the authentication end that need carry out authentication to the active user, promptly business provides end.Business provides end further to finish authentication to user A, and corresponding service is provided.
In the present embodiment, step 200 also can be omitted, if user A need carry out certain business, directly initiate ID authentication request to network side by the current portable terminal of holding of this user, and, portable terminal is restarted required service after the authentication information of receiving the active user that network side returns.Accordingly, step 204 also can be omitted, and portable terminal can be after starting required service, resulting authentication information is offered institute start the business of serving end is provided, as shown in Figure 3.Mobile communication terminal is as portable terminal among Fig. 3, and mobile communication terminal is registered to network side, is meant that mobile communication terminal needs search network after start, and registers to the network of current access.
Embodiment two:
In the present embodiment, initiate ID authentication request by the portable terminal that the active user holds to network side, by behind portable terminal and network side mutual, network side returns to the authentication end that need carry out authentication to the active user with the active user's that obtains authentication information.Suppose that the active user is user A, as shown in Figure 4, realize in the present embodiment that the method for authentication specifically comprises:
Step 400: identical with the step 200 among the embodiment one.
Step 401: after the current portable terminal of holding of user A is received ID authentication request, initiate ID authentication request to network side, comprise secret password in this request, return information is sent to the instruction of authentication end and the destination address of authentication end, can also further carry the portable terminal unique identification information of current mobile terminal.
Step 402~403: after the network side signaling processing entity is received that user A is current and held the ID authentication request that portable terminal sends, in the network side data storehouse, search whether there is required authentication information according to the portable terminal unique identification information, if exist, then the network side signaling processing entity sends to the authentication information of being obtained the authentication end entity of destination address correspondence.Wherein, the concrete search procedure of database as shown in Figure 1.
Need carry out the authentication end of authentication to the active user, promptly business provides end, obtain the authentication information of user A after, further finish authentication, and corresponding service be provided user A.
In the present embodiment, step 400 also can be omitted, when user A need carry out certain business, directly initiate ID authentication request to network side, and this portable terminal informing network side directly returns to the authentication information of obtaining and need provide end to the business that the user authenticates by the current portable terminal of holding of this user.
Embodiment three:
In the present embodiment, by initiating ID authentication request to network side to the authentication end that the active user carries out authentication, mutual by authentication end and network side, network side returns to the authentication end that need carry out authentication to the active user with the active user's that obtains authentication information.Suppose that the active user is user A, and present embodiment need increase setting and judge whether to allow to authenticate the logical functional entity that end directly obtains user's ID authentication information in the current portable terminal of holding of user, as shown in Figure 4, the method for realization authentication specifically comprises in the present embodiment:
Step 500: user A need carry out certain business, and the end that provides that should business need carry out authentication to user A, then should providing of business hold just as the authentication end that need carry out authentication to the active user, initiate ID authentication request to the current portable terminal of holding of user A, carry the proof of identification information of self in this request, described proof of identification information can be authorization message or authentication information.
Step 501~502: after the current portable terminal of holding of user A is received ID authentication request, judge according to mandate entrained in the request or authentication information, the authentication end whether permission initiates to ask obtains the authentication information of user A, if do not allow, then return refusal information, finish current handling process; If allow, then the current portable terminal of holding of user A sends to the authentication end with the address of self portable terminal unique identification information, secret password and network side signaling processing entity.Present embodiment is to determine that the authentication end that allows initiation to ask obtains the authentication information of user A.
Step 503: after the authentication end is received, initiate ID authentication request, comprise portable terminal unique identification information and the secret password that is obtained in this request at least to the network side signaling processing entity.
Step 504~505: after the network side signaling processing entity receives that the ID authentication request of sending is held in authentication, in the network side data storehouse, search whether there is required authentication information according to the portable terminal unique identification information, if exist, then the network side signaling processing entity returns to authentication end entity with the authentication information of being obtained.Wherein, the concrete search procedure of database as shown in Figure 1.Here, the network side signaling processing entity also can be verified the legitimacy of authentication end once more, in this case, also will carry the authentication information of authorization message or authentication end in the ID authentication request that the authentication end is sent.
Authentication end is that business provides end, obtain the authentication information of user A after, further finish authentication, and corresponding service be provided user A.
In the foregoing description, can adopt existing any one cipher mode and cryptographic algorithm thereof that the interactive information of inter-entity is carried out encryption.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.

Claims (18)

1, a kind of method by portable terminal realization authentication is characterized in that, sets up the unique identification information of portable terminal that the user has and the corresponding relation between this user's ID authentication information; This method is further comprising the steps of:
A. network side receives and carries the ID authentication request of secret password, and obtains the unique identification information that needs the current portable terminal of holding of authenticated user;
B. network side need to obtain the authentication information of authenticated user according to the corresponding relation between the portable terminal unique identification information that obtains among the step a and portable terminal unique identification information and user's ID authentication information;
C. network side offers the authentication information that is obtained at the authentication end that need carry out authentication to the user.
2, method according to claim 1 is characterized in that, among the step a, described ID authentication request is from portable terminal; Mutual signaling between network side basis and the current portable terminal of holding of needs authenticated user is obtained the portable terminal unique identification information automatically.
3, method according to claim 2 is characterized in that, described step c is specially: network side sends to the current authentication information of obtaining needs the current portable terminal of holding of authenticated user; This portable terminal sends to the authentication information of receiving the authentication end that need carry out authentication to the user again.
4, method according to claim 2 is characterized in that, described step c is specially: network side directly sends to the current authentication information of obtaining the authentication end that need carry out authentication to the user.
5, method according to claim 1 is characterized in that, among the step a, described ID authentication request is from portable terminal, and further carries the unique identification information that needs the current portable terminal of holding of authenticated user in the ID authentication request; Network side obtains the portable terminal unique identification information from ID authentication request.
6, method according to claim 5 is characterized in that, described step c is specially: network side sends to the current authentication information of obtaining needs the current portable terminal of holding of authenticated user; This portable terminal sends to the authentication information of receiving the authentication end that need carry out authentication to the user again.
7, method according to claim 5 is characterized in that, described step c is specially: network side directly sends to the current authentication information of obtaining the authentication end that need carry out authentication to the user.
8, method according to claim 1, it is characterized in that, among the step a, described ID authentication request be from need carrying out the authentication end of authentication to the user, and further carries the unique identification information that needs the current portable terminal of holding of authenticated user in the ID authentication request; Network side obtains the portable terminal unique identification information from ID authentication request.
9, method according to claim 8 is characterized in that, before the step a, this method further comprises:
A01. the authentication end that needs the user is carried out authentication carries the proof of identification information of self to needing the current portable terminal of holding of authenticated user to initiate ID authentication request in this request;
A02. need the current portable terminal of holding of authenticated user according to the proof of identification information in the request, judge whether that the authentication end that allows to initiate to ask obtains the authentication information that needs authenticated user, if do not allow, then return refusal information, finish current handling process; If allow, then need the current portable terminal of holding of authenticated user the destination address of self portable terminal unique identification information, secret password and network side to be sent to the authentication end of the request of initiation.
10, method according to claim 8 is characterized in that, described step c is specially: network side directly sends to the current authentication information of obtaining the authentication end that need carry out authentication to the user.
11, according to each described method of claim 1 to 7, it is characterized in that this method further comprises: need carry out the authentication end of authentication to needing the current portable terminal of holding of authenticated user to initiate ID authentication request to the user.
According to each described method of claim 1 to 10, it is characterized in that 12, portable terminal unique identification information of being set up and the corresponding relation between the user's ID authentication information are stored in network side with the database form.
13, method according to claim 12 is characterized in that, obtaining described in the step b needs the authentication information of authenticated user specifically to comprise:
B1. network side is an index with the current portable terminal unique identification information that obtains, every recorded information in the Query Database; Judge whether to exist the item of information with current mobile terminal unique identification information coupling, if exist, execution in step b2 then, otherwise, return the information of not finding, and finish current handling process;
B2. judge secret password entrained in the ID authentication request whether with the item of information that finds in the secret password coupling, if then return the authentication information of current mobile terminal unique identification information correspondence; Otherwise, return the password error message, finish current handling process.
14, according to each described method of claim 1 to 10, it is characterized in that the described corresponding relation of setting up between customer mobile terminal unique identification information and this user's ID authentication information is: set up one-one relationship or many-one relationship or many-to-one relationship or many-to-many relationship between customer mobile terminal unique identification information and this user's ID authentication information.
15, according to each described method of claim 1 to 10, it is characterized in that described portable terminal is: 2G mobile communication terminal or 3G mobile communication terminal or PHS mobile phone or PDA or palmtop PC.
16, according to each described method of claim 1 to 10, it is characterized in that described portable terminal unique identification information is: SIM card card number or usim card card number or PHS card card number or cell phone apparatus are made number or PDA Equipment Serial Number or handheld computing device sequence number.
17, according to each described method of claim 1 to 10, it is characterized in that described authentication information is: identification card number or passport number or army's testimony of a witness number or fingerprint or pupil film.
According to each described method of claim 1 to 10, it is characterized in that 18, described authentication information provides with data or voice or image format.
CN 200410074750 2004-09-14 2004-09-14 Method for realizing identity identification by mobile terminal Pending CN1750462A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200410074750 CN1750462A (en) 2004-09-14 2004-09-14 Method for realizing identity identification by mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200410074750 CN1750462A (en) 2004-09-14 2004-09-14 Method for realizing identity identification by mobile terminal

Publications (1)

Publication Number Publication Date
CN1750462A true CN1750462A (en) 2006-03-22

Family

ID=36605735

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200410074750 Pending CN1750462A (en) 2004-09-14 2004-09-14 Method for realizing identity identification by mobile terminal

Country Status (1)

Country Link
CN (1) CN1750462A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008040256A1 (en) * 2006-09-29 2008-04-10 Huawei Technologies Co., Ltd. A user authentication method, apparatus and system for passive optical network
CN101917669A (en) * 2010-08-31 2010-12-15 华为技术有限公司 Method and device for train safe boarding
CN101925202A (en) * 2009-06-11 2010-12-22 北京大学 Dual-network dual-standby communication system, method and terminal
CN101958792A (en) * 2009-07-17 2011-01-26 华为技术有限公司 Method and device for authenticating finger print of user
CN101964977A (en) * 2010-09-07 2011-02-02 深圳市乙辰科技发展有限公司 Method, system and router for realizing network identification policy
CN102158468A (en) * 2011-01-26 2011-08-17 清华大学 Method for sharing and acquiring data in social network service (SNS)
CN102307181A (en) * 2011-04-27 2012-01-04 上海动联信息技术有限公司 Method for preventing phishing attack for dynamic password
CN102867166A (en) * 2012-09-19 2013-01-09 腾讯科技(深圳)有限公司 Method and device for obtaining interactive information via two-dimension codes
WO2013107423A1 (en) * 2012-01-21 2013-07-25 华为技术有限公司 Network access authentication method, system and device
CN103929419A (en) * 2014-03-28 2014-07-16 小米科技有限责任公司 Access control method and device
CN105279416A (en) * 2015-10-27 2016-01-27 上海川织金融信息服务有限公司 Identity recognition method and system based on multi-biometric feature in combination with device fingerprint
CN105337937A (en) * 2014-07-24 2016-02-17 小米科技有限责任公司 Network verification method and device
CN105376220A (en) * 2011-11-30 2016-03-02 阿里巴巴集团控股有限公司 Service implementation method and system and server
CN105488495A (en) * 2016-01-05 2016-04-13 上海川织金融信息服务有限公司 Identity identification method and system based on combination of face characteristics and device fingerprint
CN105933353A (en) * 2016-07-05 2016-09-07 北京万维星辰科技有限公司 Method and system for realizing secure login
CN106897307A (en) * 2015-12-21 2017-06-27 李凡 A kind of method for obtaining electronic identity documents on mobile terminals
US9794261B2 (en) 2014-03-28 2017-10-17 Xiaomi Inc. Method and apparatus for controlling access to a server

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008040256A1 (en) * 2006-09-29 2008-04-10 Huawei Technologies Co., Ltd. A user authentication method, apparatus and system for passive optical network
CN101925202A (en) * 2009-06-11 2010-12-22 北京大学 Dual-network dual-standby communication system, method and terminal
CN101958792A (en) * 2009-07-17 2011-01-26 华为技术有限公司 Method and device for authenticating finger print of user
CN101917669A (en) * 2010-08-31 2010-12-15 华为技术有限公司 Method and device for train safe boarding
CN101964977A (en) * 2010-09-07 2011-02-02 深圳市乙辰科技发展有限公司 Method, system and router for realizing network identification policy
CN102158468A (en) * 2011-01-26 2011-08-17 清华大学 Method for sharing and acquiring data in social network service (SNS)
CN102158468B (en) * 2011-01-26 2014-10-22 清华大学 Method for sharing and acquiring data in social network service (SNS)
CN102307181A (en) * 2011-04-27 2012-01-04 上海动联信息技术有限公司 Method for preventing phishing attack for dynamic password
CN105376220A (en) * 2011-11-30 2016-03-02 阿里巴巴集团控股有限公司 Service implementation method and system and server
WO2013107423A1 (en) * 2012-01-21 2013-07-25 华为技术有限公司 Network access authentication method, system and device
CN102867166A (en) * 2012-09-19 2013-01-09 腾讯科技(深圳)有限公司 Method and device for obtaining interactive information via two-dimension codes
CN102867166B (en) * 2012-09-19 2015-11-11 腾讯科技(深圳)有限公司 A kind of method and apparatus being known interactive information by Quick Response Code
CN103929419B (en) * 2014-03-28 2017-04-12 小米科技有限责任公司 Access control method and device
JP2016519828A (en) * 2014-03-28 2016-07-07 シャオミ・インコーポレイテッド Access control method, apparatus, program, and recording medium
CN103929419A (en) * 2014-03-28 2014-07-16 小米科技有限责任公司 Access control method and device
US9794261B2 (en) 2014-03-28 2017-10-17 Xiaomi Inc. Method and apparatus for controlling access to a server
CN105337937A (en) * 2014-07-24 2016-02-17 小米科技有限责任公司 Network verification method and device
CN105337937B (en) * 2014-07-24 2019-07-26 小米科技有限责任公司 Network verification method, device and computer readable storage medium
CN105279416A (en) * 2015-10-27 2016-01-27 上海川织金融信息服务有限公司 Identity recognition method and system based on multi-biometric feature in combination with device fingerprint
CN105279416B (en) * 2015-10-27 2018-05-29 上海川织金融信息服务有限公司 Personal identification method and its system based on multi-biological characteristic bonding apparatus fingerprint
CN106897307A (en) * 2015-12-21 2017-06-27 李凡 A kind of method for obtaining electronic identity documents on mobile terminals
CN106897307B (en) * 2015-12-21 2020-07-14 李凡 Method for obtaining electronic identity document on mobile terminal
CN105488495A (en) * 2016-01-05 2016-04-13 上海川织金融信息服务有限公司 Identity identification method and system based on combination of face characteristics and device fingerprint
CN105933353A (en) * 2016-07-05 2016-09-07 北京万维星辰科技有限公司 Method and system for realizing secure login

Similar Documents

Publication Publication Date Title
CN1224213C (en) Method for issuing an electronic identity
CN1750462A (en) Method for realizing identity identification by mobile terminal
US9652920B2 (en) Voting systems and voting methods based on smart mobile communication devices
CN1176564C (en) Enabling conformance to legislative requirements for mobile devices
CN100536395C (en) System and method for verifying digital signatures on certificates
US9088565B2 (en) Use of a public key key pair in the terminal for authentication and authorization of the telecommunication user with the network operator and business partners
US10743180B2 (en) Method, apparatus, and system for authenticating WIFI network
CN101076190A (en) Management of authentication keys in a mobile communication system
US20130178190A1 (en) Mobile device identification for secure device access
US20120300927A1 (en) Method of registering smart phone when accessing security authentication device and method of granting access permission to registered smart phone
US9165149B2 (en) Use of a mobile telecommunication device as an electronic health insurance card
CN102461231A (en) Method for registering a mobile radio in a mobile radio network
CN1540550A (en) Electronic keying system and use method thereof
CN1650664A (en) Certificate based authentication authorization accounting scheme for loose coupling interworking
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN1697470A (en) Telephone number change notification method and telephone number change notification system
KR20180067183A (en) System and Method for Creating and Disposal of Identification associated with User Bio Information
CN1940955A (en) System and method for registering entities for code signing services
CN1918931A (en) Emission of a public key by a mobile terminal
CN103297404A (en) Method, device and system for achieving login confirmation
CN101034985A (en) Method and system for the anti-counterfeit of the mobile phone with the dynamic code
US8769303B2 (en) Infrastructure independent recovery key release
CN1698310A (en) Method and system for authentically servers in a distributed application environment
CN1684411A (en) Method for verifying user's legitimate of mobile terminal
CN1890950A (en) Voice authentication device, voice authentication system, and voice authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20060322