CN109450872A - Method for authenticating user identity, system, storage medium and electronic equipment - Google Patents
Method for authenticating user identity, system, storage medium and electronic equipment Download PDFInfo
- Publication number
- CN109450872A CN109450872A CN201811235438.2A CN201811235438A CN109450872A CN 109450872 A CN109450872 A CN 109450872A CN 201811235438 A CN201811235438 A CN 201811235438A CN 109450872 A CN109450872 A CN 109450872A
- Authority
- CN
- China
- Prior art keywords
- code
- terminal device
- cloud
- electronic identifications
- subscriber
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Abstract
The present invention provides a kind of method for authenticating user identity, system, storage medium and electronic equipment.Method for authenticating user identity provided by the invention, it include: the subscriber authentication request electronic identifications code that terminal device is first initiated according to application program, electronic identifications code is preset in subscriber identification card, subscriber identification card is connect with terminal equipment in communication, then, electronic identifications code is sent to cloud authentication platform by terminal device, so that whether authentication platform verification electronic identifications code in cloud is effective, finally, terminal device determines whether subscriber authentication request passes through according to the check results that cloud authentication platform returns.Method for authenticating user identity provided by the invention, during entire real-name authentication, inputting any personal information without user can be completed real-name authentication, and entire verification process service operation side also can not obtain or save any user information, guarantee user information safety while convenient certification.
Description
Technical field
The present invention relates to technical field of network security more particularly to a kind of method for authenticating user identity, system, storage mediums
And electronic equipment.
Background technique
With the development of mobile Internet business and universal, more and more business scenarios require to carry out user identity to recognize
The business such as card, such as ticketing service class, financial class and payment class, for the authenticity to guarantee user identity, before the use,
It needs first to carry out user identity authentication to user.
Currently, the method for user identity authentication is mainly passed through input name and identification card number by user in operation system,
And it is inquired by related service system connection public security system to judge.Either need user upload identity card picture or I
Hand-held identity card, which is taken pictures, to be authenticated, and is then compared by the way that backstage is artificial, to determine the authenticity of user identity.
As it can be seen that being easy to cause individual subscriber privacy, personally identifiable information to be easy by way of uploading personally identifiable information
Leak, for example, during real-name authentication business, service provider can obtain and store the name of user, identification card number,
The personal information such as photo, therefore there are the hidden danger of leakage of personal information.Once also, the personally identifiable information of user, then will
Risk is counterfeited and falsely used there are identity information, and criminal can use on the net him by falsely using personally identifiable information
Personal part carries out some relevant illegal activities, the serious interests for damaging user itself.
Summary of the invention
The present invention provides a kind of method for authenticating user identity, system, storage medium and electronic equipment, to realize service operation
Side, which does not need any personal information of user's input, can be completed real-name authentication, and entire verification process service operation side can not also obtain
Or any user information is saved, guarantee user information safety while convenient certification.
In a first aspect, the present invention provides a kind of method for authenticating user identity, comprising:
The subscriber authentication request electronic identifications code that terminal device is initiated according to application program, the electricity
Sub- Identity Code is preset in subscriber identification card, and the subscriber identification card is connect with the terminal equipment in communication;
The electronic identifications code is sent to cloud authentication platform by the terminal device, so that cloud certification is flat
Whether platform verifies the electronic identifications code effective;
The terminal device determines that the subscriber authentication is asked according to the check results that the cloud authentication platform returns
Seeking Truth is no to be passed through.
In a kind of possible design, in the subscriber authentication request that terminal device is initiated according to application program
Before electronic identifications code, further includes:
The terminal device obtains preset program identification code in the application program;
Whether the terminal device verification described program identification code is effective, and described program identification code is effective.
In a kind of possible design, the electronic identifications code is sent to cloud certification in the terminal device and is put down
After platform, further includes:
Described program identification code is sent to the cloud authentication platform by the terminal device, so that cloud certification is flat
Platform verifies whether described program identification code is effective, and described program identification code is effective.
In a kind of possible design, in the subscriber authentication request that terminal device is initiated according to application program
Before electronic identifications code, further includes:
The terminal device obtains the personal recognition code of user's input;
Whether the terminal device verification personal recognition code is effective, and individual's recognition code is effective.
In a kind of possible design, the check results are one in following result:
The electronic identifications code is effective, the electronic identifications code is invalid, the electronic identifications code freezes
And the subscriber authentication request is illegally.
In a kind of possible design, when the check results that the terminal device receives are the electronic identity mark
When knowledge code is effective, the subscriber authentication request passes through;
When the check results that the terminal device receives are that the electronic identifications code is invalid or the electronics
When Identity Code freezes or subscriber authentication request is illegal, the subscriber authentication request does not pass through.
In a kind of possible design, the electronic identifications code is sent to cloud certification in the terminal device and is put down
After platform, further includes:
The terminal device receives the certification authority that the cloud authentication platform returns, and the certification authority is used for described
The cloud authentication platform is inquired in the authentication platform of cloud to the checking procedure and the verification of the electronic identifications code
As a result.
Second aspect, the present invention also provides a kind of user identity authentication systems, comprising: terminal device, user identity identification
Card and cloud authentication platform;
The subscriber identification card is connect with the terminal equipment in communication, and the terminal device and cloud certification are flat
Platform communication connection;
Terminal device, in the subscriber authentication request subscriber identification card for being initiated according to application program
Preset electronic identifications code;
The terminal device is also used to the electronic identifications code being sent to cloud authentication platform;
The cloud authentication platform, it is whether effective for verifying the electronic identifications code;
The terminal device is also used to determine the user identity according to the check results that the cloud authentication platform returns
Whether checking request passes through.
The third aspect, the present invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, the journey
The method for authenticating user identity provided in first aspect described in any one is realized when sequence is executed by processor.
Fourth aspect, the present invention also provides a kind of electronic equipment, comprising:
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to execute via the executable instruction is executed provided in first aspect and appoint
Method for authenticating user identity described in one kind of anticipating.
A kind of method for authenticating user identity, system, storage medium and electronic equipment provided by the invention are arranged by obtaining
Electronic identifications code in subscriber identification card, and by the electronic identifications code be sent to cloud authentication platform come into
Row validity check, and after verification, cloud authentication platform also only return characterization whether the check results that real-name authentication passes through,
So that whether the application program in terminal device determines corresponding subscriber authentication request according to the check results of the return
Pass through, during entire real-name authentication, inputting any personal information without user can be completed real-name authentication, entirely authenticate
Journey service operation side also can not obtain or save any user information, guarantee user information safety while convenient certification.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair
Bright some embodiments for those of ordinary skill in the art without any creative labor, can be with
It obtains other drawings based on these drawings.
Fig. 1 is the application scenario diagram of method for authenticating user identity shown according to an exemplary embodiment;
Fig. 2 is the flow diagram of method for authenticating user identity shown according to an exemplary embodiment;
Fig. 3 is the structural schematic diagram of the method for authenticating user identity shown according to another exemplary embodiment;
Fig. 4 is the structural schematic diagram of user identity authentication system shown according to an exemplary embodiment;
Fig. 5 is the structural schematic diagram for implementing the electronic equipment exemplified according to one.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Fig. 1 is the application scenario diagram of method for authenticating user identity shown according to an exemplary embodiment.As shown in Figure 1,
Method for authenticating user identity provided by the present embodiment can be to be executed by terminal device 1, which can be intelligent hand
Machine, tablet computer, personal computer etc. have the electronic equipment of data processing and display function, and subscriber identification card 2 can
Think SIM card or is built in the identification card in electronic equipment with regular coding.Specifically, can be with terminal device 1
Smart phone, and subscriber identification card 2 can be run all kinds of to be described in detail for SIM card on terminal device 1
Mobile Internet application program, wherein the application programs such as ticketing service class, financial class, payment class are typically required for real-name authentication demand.
Also, it is additionally provided in terminal device 1 for obtaining electronic identifications code (Electronic
Identification code, abbreviation eID code) Software Development Kit (Software Development Kit, letter
Claim SDK), SDK refers to that the program library for being supplied to mobile Internet application developer and software transfer interface, application program pass through
The SDK can realize the interaction with SIM card, that is, read the eID code being integrated in SIM card, wherein eID Code can be from public affairs
The identity information of certain user is identified in peace portion citizen network identity identifying system, but the coding is believed without any personal identification
Breath, and irreversible release personally identifiable information.
And can be the SIM card of any mobile phone user in three big operators for above-mentioned subscriber identification card 2,
And integrated electronic identity card eID code in user's SIM card.
In addition, what cloud authentication platform can provide for the electronic third-party authentication ids service provider of Ministry of Public Security's authorization
EID code authentication platform, predominantly mobile Internet application operator provide eID code validity, authenticity verification service,
And authentication result, certification authority are returned into requesting party.
With continued reference to Fig. 1, method for authenticating user identity provided by the present embodiment can be on terminal device 1 some answer
The electronics in SDK interface captures user identification card 2 when needing to carry out real-name authentication with program, by obtaining eID code
Identity Code, and the electronic identifications code is sent to cloud authentication platform 3 and is verified, beyond the clouds in authentication platform 3
Foundation has each electronic identifications code and the one-to-one mapping relations of subscriber identity information.If cloud authentication platform 3 verifies
The electronic identifications code is effective, then the check results being proved to be successful are back in terminal device 1 by cloud authentication platform 3, with
Pass through the application program real-name authentication, and if the verification of the cloud authentication platform 3 electronic identifications code is invalid, cloud certification
The check results of authentication failed are back in terminal device 1 by platform 3, so that the application program real-name authentication fails.
Fig. 2 is the flow diagram of method for authenticating user identity shown according to an exemplary embodiment.As shown in Fig. 2,
Method for authenticating user identity provided in this embodiment, comprising:
The subscriber authentication request electronic identifications that step 101, terminal device are initiated according to application program
Code.
Specifically, it can be for characterizing the electronic identifications code of subscriber identity information and be preset in subscriber identification card
In, wherein subscriber identification card can be the SIM card of any mobile phone user in three big operators, and be built in SIM card
In electronic identifications code can be the identity information that certain user is identified from Ministry of Public Security citizen network identity identifying system,
But in the identification code and any personally identifiable information is free of, and believe using the identification code also irreversible release personal identification
Breath.
When the application program of some application program on terminal device, such as ticketing service class, financial class, payment class needs to carry out
When real-name authentication, it will usually which display needs to carry out the window of real name verification on the display interface of terminal device, and user can select
It selects and carries out continuation real-name authentication, termination certification can also be cancelled.When user selects to carry out real-name authentication, terminal device then passes through
The SDK interface captures user identification card for obtaining eID code, such as the electronic identifications code in SIM card.
Below by by method for authenticating user identity provided in this embodiment be applied to Alipay carry out real-name authentication for into
Row is described in detail:
When user binds bank card and paid in Alipay, for the account safety of user, need user first
Real-name authentication is carried out, at this point, Alipay application will prompt the user whether to carry out real-name authentication, if user's selection continues reality
Name certification, then Alipay application will obtain the electronic identifications code in smart phone SIM card by SDK interface.The electronics
Identity Code can be used for corresponding unique user information out in Ministry of Public Security citizen network identity identifying system, wherein should
Electronic identifications code can be digital coding, such as 110215199205189411, or number and the group of letter are compiled in collaboration with
Code, such as ZHANGSAN4345611 can be with bar code either two dimensional code, by identifying that the electronic identifications code can be with
Unique user is indexed out in Ministry of Public Security citizen network identity identifying system, for example, name " Zhang San ", ID card No.:
“33021819860512XXXX”。
Electronic identifications code is sent to cloud authentication platform by step 102, terminal device, so that cloud authentication platform school
Whether the sub- Identity Code of electrical verification is effective;If electronic identifications code is effective, 1031 are thened follow the steps, if electronic identifications code
In vain, 1032 are thened follow the steps.
After terminal device gets the electronic identifications code being preset in subscriber identification card, by electronic identity
Identification code is sent to cloud authentication platform, so that whether authentication platform verification electronic identifications code in cloud is effective.
Wherein, above-mentioned cloud authentication platform can be Ministry of Public Security citizen network identity identifying system, be also possible to official
Reliable mechanism is linked into the related platform of Ministry of Public Security citizen network identity identifying system, can pass through state in authentication platform beyond the clouds
The authenticity and validity of close ciphering signature verification algorithm verifying eID Code.
Step 1031, subscriber authentication request pass through.
If authentication platform beyond the clouds, electronic identifications code is verified as effectively, then cloud authentication platform can be by user's body
The check results that part checking request passes through are back to terminal device, and SDK then can be further by letters such as check results, verification authoritys
Breath returns to application program, so that the application program completes real-name authentication.
Step 1032, subscriber authentication request do not pass through.
But if authentication platform beyond the clouds, electronic identifications code is verified as in vain, then cloud authentication platform can will be used
Authentication request unacceptable check results in family are back to terminal device, and SDK then can further by check results, verification with
According to etc. information return to application program so that the application program real-name authentication fail.
In the present embodiment, by obtaining the electronic identifications code that is arranged in subscriber identification card, and by the electricity
Sub- Identity Code is sent to cloud authentication platform to carry out validity check, and after verification, cloud authentication platform also only
Return characterization whether the check results that real-name authentication passes through so that the verification of application program in terminal device according to the return
As a result it determines whether corresponding subscriber authentication request passes through, during entire real-name authentication, is inputted without user any
Real-name authentication can be completed in personal information, and entire verification process service operation side also can not obtain or save any user information,
Guarantee user information safety while convenient certification.
On the basis of the above embodiments, in order to further improve the confidence level of real-name authentication, in terminal device
Before the subscriber authentication request electronic identifications code initiated according to application program, terminal can also be first passed through and set
The standby personal recognition code (Personal Identification Number, abbreviation PIN code) for obtaining user's input, then,
Whether terminal device is effective in the PIN code of verification user's input, if PIN code is effective, the user that is initiated according to application program
Authentication request obtains electronic identifications code, if PIN code is invalid, directly prompt user's real-name authentication failure.
It is worth explanatorily, above-mentioned electronic identifications code, which can be, to be signed and issued by the Ministry of Public Security and be integrated in SIM card, can not
It copying and, when use, needs to input the corresponding personal recognition code of SIM card, even if in the case where mobile phone such as loses at the abnormal conditions, only
It needs to shut down cell-phone number or pin number, the eID in SIM card also will be frozen or be cancelled, therefore there is no risk is falsely used, to guarantee
The confidence level of real-name authentication.
Fig. 3 is the structural schematic diagram of the method for authenticating user identity shown according to another exemplary embodiment.Such as Fig. 3 institute
Show, method for authenticating user identity provided by the present embodiment, comprising:
Step 201, terminal device obtain preset program identification code in application program.
Specifically, for application program in user's registration, the calling interface request provided by SDK carries out real name to the user
Certification.It requests that the application program is needed to be passed to the program identification code that cloud authentication platform distributes the application program when real-name authentication,
It is worth explanatorily, the application developer of institute's real-name authentication in need requires on authentication platform beyond the clouds application acquisition real-name authentication
License applies for that the application passed through can take the program identification code that cloud authentication platform distributes to the application, such as
" 5510f9cafd98c50ebf0000d1 ", for identification legitimacy of verification Application.
Step 202, terminal device judge whether checking routine identification code is effective.If the determination result is YES, it thens follow the steps
203, if judging result be it is no, process terminates.
In terminal device acquisition application program after preset program identification code, school can be judged first with terminal device
Whether effective test program identification code, if if the program identification code is invalid, illustrating that the application program is unreliable or dangerous,
Subsequent real-name authentication is directly terminated, if if the program identification code is effective, continuing real-name authentication operation.
But since the application program update speed of current application program in the market is exceedingly fast and the forgery technology of identification code
Also it is exceedingly fast, therefore local is preliminarily to be identified to program identification code to program identification code check.In order to further
The reliability of real-name authentication is improved, program identification code can also be sent to by terminal device after getting program identification code
Cloud authentication platform is verified.
The subscriber authentication request electronic identifications that step 203, terminal device are initiated according to application program
Code.
Electronic identifications code is sent to cloud authentication platform by step 204, terminal device, so that cloud authentication platform school
Whether the sub- Identity Code of electrical verification is effective;If electronic identifications code is effective, 2051 are thened follow the steps, if electronic identifications code
In vain, 2052 are thened follow the steps.
Step 2051, subscriber authentication request pass through.
Step 2052, subscriber authentication request do not pass through.
Step 203-204,2051 and 2052 specific implementation is referring to step 101-102,1031 in embodiment one
And 1032 description, which is not described herein again.
In the present embodiment, by obtaining the electronic identifications code and program mark that are arranged in subscriber identification card
Know code, and the electronic identifications code and program identification code are sent to cloud authentication platform to carry out dual validity school
Test, and after verification, cloud authentication platform also only return characterization whether the check results that real-name authentication passes through so that terminal
Application program in equipment determines whether corresponding subscriber authentication request passes through according to the check results of the return, entire
During real-name authentication, inputting any personal information without user can be completed real-name authentication, entire verification process service operation
Side also can not obtain or save any user information, guarantee user information safety while convenient certification.
On the basis of the above embodiments, the check results in above-described embodiment can be segmented further,
Specifically, check results can be one in following result: electronic identifications code is effective, electronic identifications code is invalid,
Electronic identifications code freezes and subscriber authentication request is illegal.
When the check results that terminal device receives are that electronic identifications code is effective, then this subscriber authentication
Request passes through, still, when the check results that terminal device receives are that electronic identifications code is invalid or electronic identifications code
Freeze or subscriber authentication request it is illegal when, then this subscriber authentication request do not pass through.
In addition, in order to enable application program can continue subsequent processing according to check results, in terminal device by electronics body
Part identification code is sent to after the authentication platform of cloud, and terminal device can also receive the certification authority of cloud authentication platform return,
Wherein, certification authority for inquiry cloud authentication platform in authentication platform beyond the clouds to the checking procedure of electronic identifications code with
And check results, so that future query is lifted, proof uses.
Fig. 4 is the structural schematic diagram of user identity authentication system shown according to an exemplary embodiment.As shown in figure 4,
A kind of user identity authentication system provided in this embodiment, comprising: terminal device 1, subscriber identification card 2 and cloud certification
Platform 3.
The subscriber identification card 2 is communicated to connect with the terminal device 1, and the terminal device 1 is recognized with the cloud
Platform 3 is demonstrate,proved to communicate to connect;
Terminal device 1, the subscriber authentication request subscriber identification card 2 for being initiated according to application program
In preset electronic identifications code, the electronic identifications code be used for the user's in cloud authentication platform 3
Identity information establishes unique corresponding relation;
The terminal device 1 is also used to the electronic identifications code being sent to cloud authentication platform 3;
The cloud authentication platform 3, it is whether effective for verifying the electronic identifications code;
The terminal device 1 is also used to determine user's body according to the check results that the cloud authentication platform 3 returns
Whether part checking request passes through.
In a kind of possible design, the terminal device 1 is also used to obtain preset program mark in the application program
Know code;
The terminal device 1 verifies whether described program identification code is effective, and described program identification code is effective.
In a kind of possible design, described program identification code is sent to the cloud certification and put down by the terminal device 1
Platform 3, so that whether the cloud authentication platform 3 verification described program identification code is effective.
In a kind of possible design, the terminal device 1 obtains the personal recognition code of user's input;
The terminal device 1 verifies whether the personal recognition code is effective, and individual's recognition code is effective.
In a kind of possible design, the electronic identifications code is effective, the electronic identifications code is invalid, described
Electronic identifications code freezes and subscriber authentication request is illegal.
In a kind of possible design, when the check results that the terminal device 1 receives are the electronic identity
When identification code is effective, the subscriber authentication request passes through;
When the check results that the terminal device 1 receives are that the electronic identifications code is invalid or the electronics
When Identity Code freezes or subscriber authentication request is illegal, the subscriber authentication request does not pass through.
In a kind of possible design, the terminal device 1 receives the certification authority that the cloud authentication platform 3 returns,
The certification authority in the cloud authentication platform 3 for inquiring the cloud authentication platform 3 to the electronic identifications
The checking procedure and the check results of code.
The user identity authentication system that embodiment shown in Fig. 4 provides can be used for executing the side that above-mentioned Fig. 2-Fig. 3 is provided
Method, specific implementation is similar with technical effect, and which is not described herein again.
In addition, it is stored thereon with computer program the present invention also provides a kind of computer readable storage medium, the program quilt
Processor realizes technical solution described in any one of aforementioned embodiment of the method when executing, it is similar that the realization principle and technical effect are similar,
Details are not described herein again.
Fig. 5 is the structural schematic diagram for implementing the electronic equipment exemplified according to one.As shown in figure 5, provided in this embodiment
Electronic equipment, comprising:
Processor 301;And
Memory 302, for storing the executable instruction of the processor;
Wherein, the processor is configured to execute any one of aforementioned embodiment of the method via the executable instruction is executed
The technical solution, it is similar that the realization principle and technical effect are similar, and details are not described herein again.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or part of or all technical features are carried out etc.
With replacement;And these modifications or substitutions, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution
Range.
Claims (10)
1. a kind of method for authenticating user identity characterized by comprising
The subscriber authentication request electronic identifications code that terminal device is initiated according to application program, the electronics body
Part identification code is preset in subscriber identification card, and the subscriber identification card is connect with the terminal equipment in communication;
The electronic identifications code is sent to cloud authentication platform by the terminal device, so that cloud authentication platform school
Whether effective test the electronic identifications code;
The terminal device determines that the subscriber authentication request is according to the check results that the cloud authentication platform returns
It is no to pass through.
2. method for authenticating user identity according to claim 1, which is characterized in that in terminal device according to application program institute
Before the subscriber authentication request electronic identifications code of initiation, further includes:
The terminal device obtains preset program identification code in the application program;
Whether the terminal device verification described program identification code is effective, and described program identification code is effective.
3. method for authenticating user identity according to claim 2, which is characterized in that in the terminal device by the electronics
Identity Code is sent to after the authentication platform of cloud, further includes:
Described program identification code is sent to the cloud authentication platform by the terminal device, so that cloud authentication platform school
Whether effective test described program identification code, described program identification code is effective.
4. method for authenticating user identity described in any one of -3 according to claim 1, which is characterized in that in terminal device root
Before the subscriber authentication request electronic identifications code initiated according to application program, further includes:
The terminal device obtains the personal recognition code of user's input;
Whether the terminal device verification personal recognition code is effective, and individual's recognition code is effective.
5. method for authenticating user identity according to claim 3, which is characterized in that the check results are in following result
One:
The electronic identifications code is effective, the electronic identifications code is invalid, the electronic identifications code freezes and
The subscriber authentication request is illegal.
6. method for authenticating user identity according to claim 5, which is characterized in that when the institute that the terminal device receives
When to state check results be that the electronic identifications code is effective, subscriber authentication request passes through;
When the check results that the terminal device receives are that the electronic identifications code is invalid or the electronic identity
When identification code freezes or subscriber authentication request is illegal, the subscriber authentication request does not pass through.
7. method for authenticating user identity according to claim 6, which is characterized in that in the terminal device by the electronics
Identity Code is sent to after the authentication platform of cloud, further includes:
The terminal device receives the certification authority that the cloud authentication platform returns, and the certification authority is used in the cloud
The cloud authentication platform is inquired in authentication platform to the checking procedure and the check results of the electronic identifications code.
8. a kind of user identity authentication system characterized by comprising terminal device, subscriber identification card and cloud are recognized
Demonstrate,prove platform;
The subscriber identification card is connect with the terminal equipment in communication, and the terminal device and the cloud authentication platform are logical
Letter connection;
Terminal device, it is pre- in the subscriber authentication request subscriber identification card for being initiated according to application program
If electronic identifications code, the electronic identifications code is for identity information with the user in the authentication platform of cloud
Establish unique corresponding relation;
The terminal device is also used to the electronic identifications code being sent to cloud authentication platform;
The cloud authentication platform, it is whether effective for verifying the electronic identifications code;
The terminal device is also used to determine the subscriber authentication according to the check results that the cloud authentication platform returns
Whether request passes through.
9. a kind of storage medium, is stored thereon with computer program, which is characterized in that realize power when the program is executed by processor
Benefit requires 1 to 7 described in any item method for authenticating user identity.
10. a kind of electronic equipment characterized by comprising
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor be configured to via execute the executable instruction come perform claim require it is 1 to 7 described in any item
Method for authenticating user identity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811235438.2A CN109450872A (en) | 2018-10-23 | 2018-10-23 | Method for authenticating user identity, system, storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811235438.2A CN109450872A (en) | 2018-10-23 | 2018-10-23 | Method for authenticating user identity, system, storage medium and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109450872A true CN109450872A (en) | 2019-03-08 |
Family
ID=65548227
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811235438.2A Pending CN109450872A (en) | 2018-10-23 | 2018-10-23 | Method for authenticating user identity, system, storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109450872A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110191123A (en) * | 2019-05-29 | 2019-08-30 | 中国联合网络通信集团有限公司 | It applies for card on a kind of line method, client and system |
CN113704808A (en) * | 2020-05-20 | 2021-11-26 | 中国移动通信集团浙江有限公司 | User information processing method and device and computing equipment |
CN115102771A (en) * | 2022-06-25 | 2022-09-23 | 平安银行股份有限公司 | Data processing method, terminal device, system, device and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101193368A (en) * | 2006-11-22 | 2008-06-04 | 中兴通讯股份有限公司 | Method for wireless access fixing station software to validate identifier setup |
CN103259667A (en) * | 2013-06-07 | 2013-08-21 | 北京邮电大学 | Method and system for eID authentication on mobile terminal |
US20160094543A1 (en) * | 2014-09-30 | 2016-03-31 | Citrix Systems, Inc. | Federated full domain logon |
CN105868970A (en) * | 2016-03-25 | 2016-08-17 | 联想(北京)有限公司 | Authentication method and electronic device |
CN107305608A (en) * | 2016-04-21 | 2017-10-31 | 成都鼎桥通信技术有限公司 | The management method and device of terminal device |
CN108427895A (en) * | 2018-03-16 | 2018-08-21 | 何小林 | Data of magnetic disk array protects system and method |
-
2018
- 2018-10-23 CN CN201811235438.2A patent/CN109450872A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101193368A (en) * | 2006-11-22 | 2008-06-04 | 中兴通讯股份有限公司 | Method for wireless access fixing station software to validate identifier setup |
CN103259667A (en) * | 2013-06-07 | 2013-08-21 | 北京邮电大学 | Method and system for eID authentication on mobile terminal |
US20160094543A1 (en) * | 2014-09-30 | 2016-03-31 | Citrix Systems, Inc. | Federated full domain logon |
CN105868970A (en) * | 2016-03-25 | 2016-08-17 | 联想(北京)有限公司 | Authentication method and electronic device |
CN107305608A (en) * | 2016-04-21 | 2017-10-31 | 成都鼎桥通信技术有限公司 | The management method and device of terminal device |
CN108427895A (en) * | 2018-03-16 | 2018-08-21 | 何小林 | Data of magnetic disk array protects system and method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110191123A (en) * | 2019-05-29 | 2019-08-30 | 中国联合网络通信集团有限公司 | It applies for card on a kind of line method, client and system |
CN110191123B (en) * | 2019-05-29 | 2022-02-18 | 中国联合网络通信集团有限公司 | Online card handling method, client and system |
CN113704808A (en) * | 2020-05-20 | 2021-11-26 | 中国移动通信集团浙江有限公司 | User information processing method and device and computing equipment |
CN115102771A (en) * | 2022-06-25 | 2022-09-23 | 平安银行股份有限公司 | Data processing method, terminal device, system, device and storage medium |
CN115102771B (en) * | 2022-06-25 | 2023-08-22 | 平安银行股份有限公司 | Data processing method, terminal device, system, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11088855B2 (en) | System and method for verifying an identity of a user using a cryptographic challenge based on a cryptographic operation | |
RU2710889C1 (en) | Methods and systems for creation of identification cards, their verification and control | |
CN105306490B (en) | Payment verifying system, method and device | |
EP3499795A1 (en) | Authentication system and method, and user equipment, authentication server, and service server for performing same method | |
US20090234764A1 (en) | Systems and methods for biometric authentication of monetary fund transfer | |
CN110826043B (en) | Digital identity application system and method, identity authentication system and method | |
CN111092899B (en) | Information acquisition method, device, equipment and medium | |
CN109325342A (en) | Identity information management method, apparatus, computer equipment and storage medium | |
US20210014064A1 (en) | Method and apparatus for managing user authentication in a blockchain network | |
CN105868970B (en) | authentication method and electronic equipment | |
EP3206329B1 (en) | Security check method, device, terminal and server | |
US9911158B1 (en) | Systems and methods for providing a persistent state | |
CN109450872A (en) | Method for authenticating user identity, system, storage medium and electronic equipment | |
CN109150547A (en) | A kind of system and method for the digital asset real name registration based on block chain | |
US11620650B2 (en) | Mobile authentication method and system therefor | |
US10764049B2 (en) | Method for determining approval for access to gate through network, and server and computer-readable recording media using the same | |
US20190320039A1 (en) | Systems and methods for use in providing digital identities | |
CN110278084B (en) | eID establishing method, related device and system | |
US8931080B2 (en) | Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource | |
US20150106871A1 (en) | System and method for controlling access to security engine of mobile terminal | |
CN103559430B (en) | application account management method and device based on Android system | |
CN110995661B (en) | Network card platform | |
US20160342996A1 (en) | Two-factor authentication method | |
CN106599619A (en) | Verification method and device | |
CN107104922B (en) | Method and device for authority management and resource control |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190308 |
|
RJ01 | Rejection of invention patent application after publication |