CN101465733A - Identity authentication method based on telephone - Google Patents
Identity authentication method based on telephone Download PDFInfo
- Publication number
- CN101465733A CN101465733A CNA2007101917234A CN200710191723A CN101465733A CN 101465733 A CN101465733 A CN 101465733A CN A2007101917234 A CNA2007101917234 A CN A2007101917234A CN 200710191723 A CN200710191723 A CN 200710191723A CN 101465733 A CN101465733 A CN 101465733A
- Authority
- CN
- China
- Prior art keywords
- user
- telephone
- identity
- identity authentication
- telephone number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
Disclosed is a telephone-based identity authentication method, which is characterized in that: a user reserves a telephone number or a plurality of telephone numbers; when the user requests authentication, the user dials the telephone number reserved by the user, and then an auth-code is played in voice form; the user needs to acquire the auth-code to pass the identity authentication. The invention supports common telephone terminal and reduces the user application threshold; users have no need to purchase new equipment, so the user application cost is reduced; users have no need to carry extra hardware devices. The telephone-based identity authentication method has simple technical implantation, no technical obstacle and no special privacy algorithm, lower cost and risk.
Description
Technical field
The present invention relates to information security field, particularly relate to a kind of method for authenticating user identity.
Background technology
Authentication generally is meant the process of computer and network system affirmation operator identity, yet digital identity and the physical identity in real world of user in the virtual network world is difficult to corresponding one by one.Computer and computer network have been formed a virtual digital world, and the digital identity that computer can only authenticated user also carries out for user's mandate at the number identity.And our real world of life is a real physical world, and everyone has unique physical identity.How to guarantee with the visitor that digital identity is operated to be exactly the lawful owner of this digital identity, how to guarantee that promptly operator's physical identity is corresponding with digital identity, just become an important safety problem.
The birth of identity identifying technology is exactly in order to address this problem.At present, identity identifying technology has been widely used in fields such as the Internet, financial sector, e-commerce system.
Commonly used in the prior art of information security field have two kinds of identity identifying methods:
A kind of is static identity identifying method, and this method comes the user is carried out authentication by the predefined character string of user, for example the user name, the password that use in daily life of people.
Another kind is the dynamic identity authentication method, and each authentication uses the content of dynamic change to confirm user identity.For example, general mobile phone authenticates on the Internet at present, and the cell-phone number of reserving by the user authenticates exactly, and when needs were confirmed identity, system sent a note that comprises identifying code to user mobile phone, by the identity of identifying code authenticated user.
Cipher type authorization information in the static identity identifying method is a static strings, need propagate into server end by approach such as keyboard input or Network Transmission, monitor very easily by keyboard, means such as network interception are stolen and are revealed, its fail safe is relatively low, and because password is permanently effective, in case be stolen or reveal, the user will be subjected to infringement without redemption.
The dynamic identity authentication method is each to produce interim password, and generally all is can only use once and have ageingly, even monitored and intercept and capture, also is difficult to illegally be used.But generally need to buy special terminal.Adopt SMS to authenticate the communication modes that this people generally use, although need not additionally to buy special-purpose terminal or equipment because the delay that sms technique itself might cause, lose, response speed waits problem more slowly, usually brings inconvenience to the user.
In a word, in the existing identity identifying technology, how to improve the fail safe of authentication, reduce user's use cost, user friendly operation is the technical problem that presses for solution.
Summary of the invention
Technical problem to be solved by this invention provides a kind of identity identifying method based on phone, to improve the fail safe of authentication, prevents that user identity from illegally being used.And do not need additionally to buy or carry special-purpose terminal or equipment.
For addressing the above problem, the invention provides a kind of identity identifying method based on phone, comprising:
A kind of identity identifying method based on phone is characterized in that: the user reserves one or more telephone number; During the customer requirements authentication, dial the telephone number that the user reserves, use identifying code of speech play; The user obtains this identifying code could be by authentication.
Preferably, in the described method, the user can reserve one or more telephone number, comprises landline telephone, mobile phone or Personal Handyphone System.
Preferably, in the described method, this identifying code generally is a numeric string at random.
Preferably, in the described method, this identifying code can be once effective.
Preferably, in the described method, this identifying code can be only effective in a period of time.
Preferably, in the described method, only hold this telephone number, receive identifying code, just can finish authentication.
Compared with prior art, the present invention has the following advantages:
1. the present invention accepts an identifying code by the telephone number that the user reserves, and only obtains this
Identifying code could be by authentication.In this case, though the usersaccount information leakage,
Still can guarantee the safety of authentication, improve the fail safe of identification effectively.
2. the present invention does not need the user additionally to buy or carries special-purpose terminal or establish in actual applications
Be equipped with.
3. the present invention supports communicating terminals commonly used such as landline telephone, mobile phone, Personal Handyphone System, has reduced the user and has made
With threshold.
4. the present invention does not need the user to carry extra hardware device.
For the service provider, technology realizes simple, and no technology barrier does not have special secret algorithm, only needs to build private telephone, and cost and risk is lower.
Description of drawings
Do not have.
Embodiment
For above-mentioned purpose of the present invention, feature and advantage can be become apparent more, below to further detailed explanation of embodiment.
1. the user reserves one or more telephone number;
2. the user uses the username and password login system;
3. system generates an identifying code at random;
4., then allow the selected telephone number that needs clawback of user if the user has reserved a plurality of telephone numbers; If the user has only reserved a telephone number, then use the telephone number of this telephone number as clawback.The user initiates the telephone redialing request;
5. the automatic clawback user's telephone number of system is used this identifying code at random of speech play.If dial unsuccessfully, then repeat to try each 15 seconds at interval three times;
6., advise that then the user repeats to initiate the phone authentication request if the user did not receive the phone of clawback in 3 minutes;
7. the identifying code of user's uppick speech play, manual input system;
8. system is by user's authentication.
More than to a kind of identity identifying method provided by the present invention based on phone, be described in detail, used specific embodiment herein principle of the present invention and execution mode are set forth, the explanation of above examples of implementation just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, the part that all can change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention.
Claims (1)
- A kind of identity identifying method based on phone is characterized in that:1. the user reserves one or more telephone number.2. when customer requirements authenticates, dial the telephone number that the user reserves, use identifying code of speech play.The user obtain this identifying code could be by authentication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007101917234A CN101465733A (en) | 2007-12-17 | 2007-12-17 | Identity authentication method based on telephone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007101917234A CN101465733A (en) | 2007-12-17 | 2007-12-17 | Identity authentication method based on telephone |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101465733A true CN101465733A (en) | 2009-06-24 |
Family
ID=40806110
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2007101917234A Pending CN101465733A (en) | 2007-12-17 | 2007-12-17 | Identity authentication method based on telephone |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101465733A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102598641A (en) * | 2009-09-18 | 2012-07-18 | 林仲宇 | Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password |
CN103973644A (en) * | 2013-01-30 | 2014-08-06 | 腾讯科技(深圳)有限公司 | Authentication method, device and system |
CN104184710A (en) * | 2013-05-23 | 2014-12-03 | 中国移动通信集团重庆有限公司 | Random code providing method, user identity authentication method and related devices |
CN104348780A (en) * | 2013-07-26 | 2015-02-11 | 中国移动通信集团四川有限公司 | Login method and system thereof |
CN109862033A (en) * | 2019-03-14 | 2019-06-07 | 浙江糖链科技有限公司 | A method of realizing that real time information confirms using heterogeneous network |
-
2007
- 2007-12-17 CN CNA2007101917234A patent/CN101465733A/en active Pending
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102598641A (en) * | 2009-09-18 | 2012-07-18 | 林仲宇 | Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password |
CN103973644A (en) * | 2013-01-30 | 2014-08-06 | 腾讯科技(深圳)有限公司 | Authentication method, device and system |
CN103973644B (en) * | 2013-01-30 | 2015-07-08 | 腾讯科技(深圳)有限公司 | Authentication method, device and system |
CN104184710A (en) * | 2013-05-23 | 2014-12-03 | 中国移动通信集团重庆有限公司 | Random code providing method, user identity authentication method and related devices |
CN104348780A (en) * | 2013-07-26 | 2015-02-11 | 中国移动通信集团四川有限公司 | Login method and system thereof |
CN104348780B (en) * | 2013-07-26 | 2018-05-22 | 中国移动通信集团四川有限公司 | A kind of method and system of login |
CN109862033A (en) * | 2019-03-14 | 2019-06-07 | 浙江糖链科技有限公司 | A method of realizing that real time information confirms using heterogeneous network |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8528076B2 (en) | Method and apparatus for authenticating online transactions using a browser and a secure channel with an authentication server | |
US9722984B2 (en) | Proximity-based authentication | |
CN104065652B (en) | A kind of auth method, device, system and relevant device | |
US8627088B2 (en) | System and method for in- and out-of-band multi-factor server-to-user authentication | |
US20070220275A1 (en) | WEB AUTHORIZATION BY AUTOMATED INTERACTIVE PHONE OR VoIP SESSION | |
US11444940B2 (en) | User authentication of smart speaker system | |
US20140380431A1 (en) | Computer implemented method to prevent attacks against authorization systems and computer programs products thereof | |
CN101257489A (en) | Method for protecting account number safety | |
TW201014315A (en) | User identity authentication method, system thereof and identifying code generating maintenance subsystem | |
US9001977B1 (en) | Telephone-based user authentication | |
US20210234850A1 (en) | System and method for accessing encrypted data remotely | |
CN110166453A (en) | A kind of interface authentication method, system and storage medium based on SE chip | |
CN111294796A (en) | Smart phone login management system based on zero-knowledge proof | |
CN101465733A (en) | Identity authentication method based on telephone | |
JP2006033780A (en) | Network authentication system using identification by calling-back | |
US8635454B2 (en) | Authentication systems and methods using a packet telephony device | |
Hassan et al. | An improved time-based one time password authentication framework for electronic payments | |
US9686270B2 (en) | Authentication systems and methods using a packet telephony device | |
EP1989815A2 (en) | A method for serving a plurality of applications by a security token | |
CN101483520A (en) | Identity authentication method based on telephone | |
Pampori et al. | Securely eradicating cellular dependency for e-banking applications | |
JP2004185454A (en) | User authentication method | |
Pranata et al. | 2FYSH: two-factor authentication you should have for password replacement | |
CN108322430B (en) | Anonymous real name authentication method | |
US20040010723A1 (en) | Network security method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
DD01 | Delivery of document by public notice |
Addressee: Peng Yong Document name: Notification of before Expiration of Request of Examination as to Substance |
|
DD01 | Delivery of document by public notice |
Addressee: Peng Yong Document name: Notification that Application Deemed to be Withdrawn |
|
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20090624 |