CN109450872A - Method for authenticating user identity, system, storage medium and electronic equipment - Google Patents

Method for authenticating user identity, system, storage medium and electronic equipment Download PDF

Info

Publication number
CN109450872A
CN109450872A CN201811235438.2A CN201811235438A CN109450872A CN 109450872 A CN109450872 A CN 109450872A CN 201811235438 A CN201811235438 A CN 201811235438A CN 109450872 A CN109450872 A CN 109450872A
Authority
CN
China
Prior art keywords
code
terminal device
cloud
electronic identifications
subscriber
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811235438.2A
Other languages
Chinese (zh)
Inventor
姜琳
翟京卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201811235438.2A priority Critical patent/CN109450872A/en
Publication of CN109450872A publication Critical patent/CN109450872A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The present invention provides a kind of method for authenticating user identity, system, storage medium and electronic equipment.Method for authenticating user identity provided by the invention, it include: the subscriber authentication request electronic identifications code that terminal device is first initiated according to application program, electronic identifications code is preset in subscriber identification card, subscriber identification card is connect with terminal equipment in communication, then, electronic identifications code is sent to cloud authentication platform by terminal device, so that whether authentication platform verification electronic identifications code in cloud is effective, finally, terminal device determines whether subscriber authentication request passes through according to the check results that cloud authentication platform returns.Method for authenticating user identity provided by the invention, during entire real-name authentication, inputting any personal information without user can be completed real-name authentication, and entire verification process service operation side also can not obtain or save any user information, guarantee user information safety while convenient certification.

Description

Method for authenticating user identity, system, storage medium and electronic equipment
Technical field
The present invention relates to technical field of network security more particularly to a kind of method for authenticating user identity, system, storage mediums And electronic equipment.
Background technique
With the development of mobile Internet business and universal, more and more business scenarios require to carry out user identity to recognize The business such as card, such as ticketing service class, financial class and payment class, for the authenticity to guarantee user identity, before the use, It needs first to carry out user identity authentication to user.
Currently, the method for user identity authentication is mainly passed through input name and identification card number by user in operation system, And it is inquired by related service system connection public security system to judge.Either need user upload identity card picture or I Hand-held identity card, which is taken pictures, to be authenticated, and is then compared by the way that backstage is artificial, to determine the authenticity of user identity.
As it can be seen that being easy to cause individual subscriber privacy, personally identifiable information to be easy by way of uploading personally identifiable information Leak, for example, during real-name authentication business, service provider can obtain and store the name of user, identification card number, The personal information such as photo, therefore there are the hidden danger of leakage of personal information.Once also, the personally identifiable information of user, then will Risk is counterfeited and falsely used there are identity information, and criminal can use on the net him by falsely using personally identifiable information Personal part carries out some relevant illegal activities, the serious interests for damaging user itself.
Summary of the invention
The present invention provides a kind of method for authenticating user identity, system, storage medium and electronic equipment, to realize service operation Side, which does not need any personal information of user's input, can be completed real-name authentication, and entire verification process service operation side can not also obtain Or any user information is saved, guarantee user information safety while convenient certification.
In a first aspect, the present invention provides a kind of method for authenticating user identity, comprising:
The subscriber authentication request electronic identifications code that terminal device is initiated according to application program, the electricity Sub- Identity Code is preset in subscriber identification card, and the subscriber identification card is connect with the terminal equipment in communication;
The electronic identifications code is sent to cloud authentication platform by the terminal device, so that cloud certification is flat Whether platform verifies the electronic identifications code effective;
The terminal device determines that the subscriber authentication is asked according to the check results that the cloud authentication platform returns Seeking Truth is no to be passed through.
In a kind of possible design, in the subscriber authentication request that terminal device is initiated according to application program Before electronic identifications code, further includes:
The terminal device obtains preset program identification code in the application program;
Whether the terminal device verification described program identification code is effective, and described program identification code is effective.
In a kind of possible design, the electronic identifications code is sent to cloud certification in the terminal device and is put down After platform, further includes:
Described program identification code is sent to the cloud authentication platform by the terminal device, so that cloud certification is flat Platform verifies whether described program identification code is effective, and described program identification code is effective.
In a kind of possible design, in the subscriber authentication request that terminal device is initiated according to application program Before electronic identifications code, further includes:
The terminal device obtains the personal recognition code of user's input;
Whether the terminal device verification personal recognition code is effective, and individual's recognition code is effective.
In a kind of possible design, the check results are one in following result:
The electronic identifications code is effective, the electronic identifications code is invalid, the electronic identifications code freezes And the subscriber authentication request is illegally.
In a kind of possible design, when the check results that the terminal device receives are the electronic identity mark When knowledge code is effective, the subscriber authentication request passes through;
When the check results that the terminal device receives are that the electronic identifications code is invalid or the electronics When Identity Code freezes or subscriber authentication request is illegal, the subscriber authentication request does not pass through.
In a kind of possible design, the electronic identifications code is sent to cloud certification in the terminal device and is put down After platform, further includes:
The terminal device receives the certification authority that the cloud authentication platform returns, and the certification authority is used for described The cloud authentication platform is inquired in the authentication platform of cloud to the checking procedure and the verification of the electronic identifications code As a result.
Second aspect, the present invention also provides a kind of user identity authentication systems, comprising: terminal device, user identity identification Card and cloud authentication platform;
The subscriber identification card is connect with the terminal equipment in communication, and the terminal device and cloud certification are flat Platform communication connection;
Terminal device, in the subscriber authentication request subscriber identification card for being initiated according to application program Preset electronic identifications code;
The terminal device is also used to the electronic identifications code being sent to cloud authentication platform;
The cloud authentication platform, it is whether effective for verifying the electronic identifications code;
The terminal device is also used to determine the user identity according to the check results that the cloud authentication platform returns Whether checking request passes through.
The third aspect, the present invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, the journey The method for authenticating user identity provided in first aspect described in any one is realized when sequence is executed by processor.
Fourth aspect, the present invention also provides a kind of electronic equipment, comprising:
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor is configured to execute via the executable instruction is executed provided in first aspect and appoint Method for authenticating user identity described in one kind of anticipating.
A kind of method for authenticating user identity, system, storage medium and electronic equipment provided by the invention are arranged by obtaining Electronic identifications code in subscriber identification card, and by the electronic identifications code be sent to cloud authentication platform come into Row validity check, and after verification, cloud authentication platform also only return characterization whether the check results that real-name authentication passes through, So that whether the application program in terminal device determines corresponding subscriber authentication request according to the check results of the return Pass through, during entire real-name authentication, inputting any personal information without user can be completed real-name authentication, entirely authenticate Journey service operation side also can not obtain or save any user information, guarantee user information safety while convenient certification.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without any creative labor, can be with It obtains other drawings based on these drawings.
Fig. 1 is the application scenario diagram of method for authenticating user identity shown according to an exemplary embodiment;
Fig. 2 is the flow diagram of method for authenticating user identity shown according to an exemplary embodiment;
Fig. 3 is the structural schematic diagram of the method for authenticating user identity shown according to another exemplary embodiment;
Fig. 4 is the structural schematic diagram of user identity authentication system shown according to an exemplary embodiment;
Fig. 5 is the structural schematic diagram for implementing the electronic equipment exemplified according to one.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Fig. 1 is the application scenario diagram of method for authenticating user identity shown according to an exemplary embodiment.As shown in Figure 1, Method for authenticating user identity provided by the present embodiment can be to be executed by terminal device 1, which can be intelligent hand Machine, tablet computer, personal computer etc. have the electronic equipment of data processing and display function, and subscriber identification card 2 can Think SIM card or is built in the identification card in electronic equipment with regular coding.Specifically, can be with terminal device 1 Smart phone, and subscriber identification card 2 can be run all kinds of to be described in detail for SIM card on terminal device 1 Mobile Internet application program, wherein the application programs such as ticketing service class, financial class, payment class are typically required for real-name authentication demand.
Also, it is additionally provided in terminal device 1 for obtaining electronic identifications code (Electronic Identification code, abbreviation eID code) Software Development Kit (Software Development Kit, letter Claim SDK), SDK refers to that the program library for being supplied to mobile Internet application developer and software transfer interface, application program pass through The SDK can realize the interaction with SIM card, that is, read the eID code being integrated in SIM card, wherein eID Code can be from public affairs The identity information of certain user is identified in peace portion citizen network identity identifying system, but the coding is believed without any personal identification Breath, and irreversible release personally identifiable information.
And can be the SIM card of any mobile phone user in three big operators for above-mentioned subscriber identification card 2, And integrated electronic identity card eID code in user's SIM card.
In addition, what cloud authentication platform can provide for the electronic third-party authentication ids service provider of Ministry of Public Security's authorization EID code authentication platform, predominantly mobile Internet application operator provide eID code validity, authenticity verification service, And authentication result, certification authority are returned into requesting party.
With continued reference to Fig. 1, method for authenticating user identity provided by the present embodiment can be on terminal device 1 some answer The electronics in SDK interface captures user identification card 2 when needing to carry out real-name authentication with program, by obtaining eID code Identity Code, and the electronic identifications code is sent to cloud authentication platform 3 and is verified, beyond the clouds in authentication platform 3 Foundation has each electronic identifications code and the one-to-one mapping relations of subscriber identity information.If cloud authentication platform 3 verifies The electronic identifications code is effective, then the check results being proved to be successful are back in terminal device 1 by cloud authentication platform 3, with Pass through the application program real-name authentication, and if the verification of the cloud authentication platform 3 electronic identifications code is invalid, cloud certification The check results of authentication failed are back in terminal device 1 by platform 3, so that the application program real-name authentication fails.
Fig. 2 is the flow diagram of method for authenticating user identity shown according to an exemplary embodiment.As shown in Fig. 2, Method for authenticating user identity provided in this embodiment, comprising:
The subscriber authentication request electronic identifications that step 101, terminal device are initiated according to application program Code.
Specifically, it can be for characterizing the electronic identifications code of subscriber identity information and be preset in subscriber identification card In, wherein subscriber identification card can be the SIM card of any mobile phone user in three big operators, and be built in SIM card In electronic identifications code can be the identity information that certain user is identified from Ministry of Public Security citizen network identity identifying system, But in the identification code and any personally identifiable information is free of, and believe using the identification code also irreversible release personal identification Breath.
When the application program of some application program on terminal device, such as ticketing service class, financial class, payment class needs to carry out When real-name authentication, it will usually which display needs to carry out the window of real name verification on the display interface of terminal device, and user can select It selects and carries out continuation real-name authentication, termination certification can also be cancelled.When user selects to carry out real-name authentication, terminal device then passes through The SDK interface captures user identification card for obtaining eID code, such as the electronic identifications code in SIM card.
Below by by method for authenticating user identity provided in this embodiment be applied to Alipay carry out real-name authentication for into Row is described in detail:
When user binds bank card and paid in Alipay, for the account safety of user, need user first Real-name authentication is carried out, at this point, Alipay application will prompt the user whether to carry out real-name authentication, if user's selection continues reality Name certification, then Alipay application will obtain the electronic identifications code in smart phone SIM card by SDK interface.The electronics Identity Code can be used for corresponding unique user information out in Ministry of Public Security citizen network identity identifying system, wherein should Electronic identifications code can be digital coding, such as 110215199205189411, or number and the group of letter are compiled in collaboration with Code, such as ZHANGSAN4345611 can be with bar code either two dimensional code, by identifying that the electronic identifications code can be with Unique user is indexed out in Ministry of Public Security citizen network identity identifying system, for example, name " Zhang San ", ID card No.: “33021819860512XXXX”。
Electronic identifications code is sent to cloud authentication platform by step 102, terminal device, so that cloud authentication platform school Whether the sub- Identity Code of electrical verification is effective;If electronic identifications code is effective, 1031 are thened follow the steps, if electronic identifications code In vain, 1032 are thened follow the steps.
After terminal device gets the electronic identifications code being preset in subscriber identification card, by electronic identity Identification code is sent to cloud authentication platform, so that whether authentication platform verification electronic identifications code in cloud is effective.
Wherein, above-mentioned cloud authentication platform can be Ministry of Public Security citizen network identity identifying system, be also possible to official Reliable mechanism is linked into the related platform of Ministry of Public Security citizen network identity identifying system, can pass through state in authentication platform beyond the clouds The authenticity and validity of close ciphering signature verification algorithm verifying eID Code.
Step 1031, subscriber authentication request pass through.
If authentication platform beyond the clouds, electronic identifications code is verified as effectively, then cloud authentication platform can be by user's body The check results that part checking request passes through are back to terminal device, and SDK then can be further by letters such as check results, verification authoritys Breath returns to application program, so that the application program completes real-name authentication.
Step 1032, subscriber authentication request do not pass through.
But if authentication platform beyond the clouds, electronic identifications code is verified as in vain, then cloud authentication platform can will be used Authentication request unacceptable check results in family are back to terminal device, and SDK then can further by check results, verification with According to etc. information return to application program so that the application program real-name authentication fail.
In the present embodiment, by obtaining the electronic identifications code that is arranged in subscriber identification card, and by the electricity Sub- Identity Code is sent to cloud authentication platform to carry out validity check, and after verification, cloud authentication platform also only Return characterization whether the check results that real-name authentication passes through so that the verification of application program in terminal device according to the return As a result it determines whether corresponding subscriber authentication request passes through, during entire real-name authentication, is inputted without user any Real-name authentication can be completed in personal information, and entire verification process service operation side also can not obtain or save any user information, Guarantee user information safety while convenient certification.
On the basis of the above embodiments, in order to further improve the confidence level of real-name authentication, in terminal device Before the subscriber authentication request electronic identifications code initiated according to application program, terminal can also be first passed through and set The standby personal recognition code (Personal Identification Number, abbreviation PIN code) for obtaining user's input, then, Whether terminal device is effective in the PIN code of verification user's input, if PIN code is effective, the user that is initiated according to application program Authentication request obtains electronic identifications code, if PIN code is invalid, directly prompt user's real-name authentication failure.
It is worth explanatorily, above-mentioned electronic identifications code, which can be, to be signed and issued by the Ministry of Public Security and be integrated in SIM card, can not It copying and, when use, needs to input the corresponding personal recognition code of SIM card, even if in the case where mobile phone such as loses at the abnormal conditions, only It needs to shut down cell-phone number or pin number, the eID in SIM card also will be frozen or be cancelled, therefore there is no risk is falsely used, to guarantee The confidence level of real-name authentication.
Fig. 3 is the structural schematic diagram of the method for authenticating user identity shown according to another exemplary embodiment.Such as Fig. 3 institute Show, method for authenticating user identity provided by the present embodiment, comprising:
Step 201, terminal device obtain preset program identification code in application program.
Specifically, for application program in user's registration, the calling interface request provided by SDK carries out real name to the user Certification.It requests that the application program is needed to be passed to the program identification code that cloud authentication platform distributes the application program when real-name authentication, It is worth explanatorily, the application developer of institute's real-name authentication in need requires on authentication platform beyond the clouds application acquisition real-name authentication License applies for that the application passed through can take the program identification code that cloud authentication platform distributes to the application, such as " 5510f9cafd98c50ebf0000d1 ", for identification legitimacy of verification Application.
Step 202, terminal device judge whether checking routine identification code is effective.If the determination result is YES, it thens follow the steps 203, if judging result be it is no, process terminates.
In terminal device acquisition application program after preset program identification code, school can be judged first with terminal device Whether effective test program identification code, if if the program identification code is invalid, illustrating that the application program is unreliable or dangerous, Subsequent real-name authentication is directly terminated, if if the program identification code is effective, continuing real-name authentication operation.
But since the application program update speed of current application program in the market is exceedingly fast and the forgery technology of identification code Also it is exceedingly fast, therefore local is preliminarily to be identified to program identification code to program identification code check.In order to further The reliability of real-name authentication is improved, program identification code can also be sent to by terminal device after getting program identification code Cloud authentication platform is verified.
The subscriber authentication request electronic identifications that step 203, terminal device are initiated according to application program Code.
Electronic identifications code is sent to cloud authentication platform by step 204, terminal device, so that cloud authentication platform school Whether the sub- Identity Code of electrical verification is effective;If electronic identifications code is effective, 2051 are thened follow the steps, if electronic identifications code In vain, 2052 are thened follow the steps.
Step 2051, subscriber authentication request pass through.
Step 2052, subscriber authentication request do not pass through.
Step 203-204,2051 and 2052 specific implementation is referring to step 101-102,1031 in embodiment one And 1032 description, which is not described herein again.
In the present embodiment, by obtaining the electronic identifications code and program mark that are arranged in subscriber identification card Know code, and the electronic identifications code and program identification code are sent to cloud authentication platform to carry out dual validity school Test, and after verification, cloud authentication platform also only return characterization whether the check results that real-name authentication passes through so that terminal Application program in equipment determines whether corresponding subscriber authentication request passes through according to the check results of the return, entire During real-name authentication, inputting any personal information without user can be completed real-name authentication, entire verification process service operation Side also can not obtain or save any user information, guarantee user information safety while convenient certification.
On the basis of the above embodiments, the check results in above-described embodiment can be segmented further, Specifically, check results can be one in following result: electronic identifications code is effective, electronic identifications code is invalid, Electronic identifications code freezes and subscriber authentication request is illegal.
When the check results that terminal device receives are that electronic identifications code is effective, then this subscriber authentication Request passes through, still, when the check results that terminal device receives are that electronic identifications code is invalid or electronic identifications code Freeze or subscriber authentication request it is illegal when, then this subscriber authentication request do not pass through.
In addition, in order to enable application program can continue subsequent processing according to check results, in terminal device by electronics body Part identification code is sent to after the authentication platform of cloud, and terminal device can also receive the certification authority of cloud authentication platform return, Wherein, certification authority for inquiry cloud authentication platform in authentication platform beyond the clouds to the checking procedure of electronic identifications code with And check results, so that future query is lifted, proof uses.
Fig. 4 is the structural schematic diagram of user identity authentication system shown according to an exemplary embodiment.As shown in figure 4, A kind of user identity authentication system provided in this embodiment, comprising: terminal device 1, subscriber identification card 2 and cloud certification Platform 3.
The subscriber identification card 2 is communicated to connect with the terminal device 1, and the terminal device 1 is recognized with the cloud Platform 3 is demonstrate,proved to communicate to connect;
Terminal device 1, the subscriber authentication request subscriber identification card 2 for being initiated according to application program In preset electronic identifications code, the electronic identifications code be used for the user's in cloud authentication platform 3 Identity information establishes unique corresponding relation;
The terminal device 1 is also used to the electronic identifications code being sent to cloud authentication platform 3;
The cloud authentication platform 3, it is whether effective for verifying the electronic identifications code;
The terminal device 1 is also used to determine user's body according to the check results that the cloud authentication platform 3 returns Whether part checking request passes through.
In a kind of possible design, the terminal device 1 is also used to obtain preset program mark in the application program Know code;
The terminal device 1 verifies whether described program identification code is effective, and described program identification code is effective.
In a kind of possible design, described program identification code is sent to the cloud certification and put down by the terminal device 1 Platform 3, so that whether the cloud authentication platform 3 verification described program identification code is effective.
In a kind of possible design, the terminal device 1 obtains the personal recognition code of user's input;
The terminal device 1 verifies whether the personal recognition code is effective, and individual's recognition code is effective.
In a kind of possible design, the electronic identifications code is effective, the electronic identifications code is invalid, described Electronic identifications code freezes and subscriber authentication request is illegal.
In a kind of possible design, when the check results that the terminal device 1 receives are the electronic identity When identification code is effective, the subscriber authentication request passes through;
When the check results that the terminal device 1 receives are that the electronic identifications code is invalid or the electronics When Identity Code freezes or subscriber authentication request is illegal, the subscriber authentication request does not pass through.
In a kind of possible design, the terminal device 1 receives the certification authority that the cloud authentication platform 3 returns, The certification authority in the cloud authentication platform 3 for inquiring the cloud authentication platform 3 to the electronic identifications The checking procedure and the check results of code.
The user identity authentication system that embodiment shown in Fig. 4 provides can be used for executing the side that above-mentioned Fig. 2-Fig. 3 is provided Method, specific implementation is similar with technical effect, and which is not described herein again.
In addition, it is stored thereon with computer program the present invention also provides a kind of computer readable storage medium, the program quilt Processor realizes technical solution described in any one of aforementioned embodiment of the method when executing, it is similar that the realization principle and technical effect are similar, Details are not described herein again.
Fig. 5 is the structural schematic diagram for implementing the electronic equipment exemplified according to one.As shown in figure 5, provided in this embodiment Electronic equipment, comprising:
Processor 301;And
Memory 302, for storing the executable instruction of the processor;
Wherein, the processor is configured to execute any one of aforementioned embodiment of the method via the executable instruction is executed The technical solution, it is similar that the realization principle and technical effect are similar, and details are not described herein again.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or part of or all technical features are carried out etc. With replacement;And these modifications or substitutions, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution Range.

Claims (10)

1. a kind of method for authenticating user identity characterized by comprising
The subscriber authentication request electronic identifications code that terminal device is initiated according to application program, the electronics body Part identification code is preset in subscriber identification card, and the subscriber identification card is connect with the terminal equipment in communication;
The electronic identifications code is sent to cloud authentication platform by the terminal device, so that cloud authentication platform school Whether effective test the electronic identifications code;
The terminal device determines that the subscriber authentication request is according to the check results that the cloud authentication platform returns It is no to pass through.
2. method for authenticating user identity according to claim 1, which is characterized in that in terminal device according to application program institute Before the subscriber authentication request electronic identifications code of initiation, further includes:
The terminal device obtains preset program identification code in the application program;
Whether the terminal device verification described program identification code is effective, and described program identification code is effective.
3. method for authenticating user identity according to claim 2, which is characterized in that in the terminal device by the electronics Identity Code is sent to after the authentication platform of cloud, further includes:
Described program identification code is sent to the cloud authentication platform by the terminal device, so that cloud authentication platform school Whether effective test described program identification code, described program identification code is effective.
4. method for authenticating user identity described in any one of -3 according to claim 1, which is characterized in that in terminal device root Before the subscriber authentication request electronic identifications code initiated according to application program, further includes:
The terminal device obtains the personal recognition code of user's input;
Whether the terminal device verification personal recognition code is effective, and individual's recognition code is effective.
5. method for authenticating user identity according to claim 3, which is characterized in that the check results are in following result One:
The electronic identifications code is effective, the electronic identifications code is invalid, the electronic identifications code freezes and The subscriber authentication request is illegal.
6. method for authenticating user identity according to claim 5, which is characterized in that when the institute that the terminal device receives When to state check results be that the electronic identifications code is effective, subscriber authentication request passes through;
When the check results that the terminal device receives are that the electronic identifications code is invalid or the electronic identity When identification code freezes or subscriber authentication request is illegal, the subscriber authentication request does not pass through.
7. method for authenticating user identity according to claim 6, which is characterized in that in the terminal device by the electronics Identity Code is sent to after the authentication platform of cloud, further includes:
The terminal device receives the certification authority that the cloud authentication platform returns, and the certification authority is used in the cloud The cloud authentication platform is inquired in authentication platform to the checking procedure and the check results of the electronic identifications code.
8. a kind of user identity authentication system characterized by comprising terminal device, subscriber identification card and cloud are recognized Demonstrate,prove platform;
The subscriber identification card is connect with the terminal equipment in communication, and the terminal device and the cloud authentication platform are logical Letter connection;
Terminal device, it is pre- in the subscriber authentication request subscriber identification card for being initiated according to application program If electronic identifications code, the electronic identifications code is for identity information with the user in the authentication platform of cloud Establish unique corresponding relation;
The terminal device is also used to the electronic identifications code being sent to cloud authentication platform;
The cloud authentication platform, it is whether effective for verifying the electronic identifications code;
The terminal device is also used to determine the subscriber authentication according to the check results that the cloud authentication platform returns Whether request passes through.
9. a kind of storage medium, is stored thereon with computer program, which is characterized in that realize power when the program is executed by processor Benefit requires 1 to 7 described in any item method for authenticating user identity.
10. a kind of electronic equipment characterized by comprising
Processor;And
Memory, for storing the executable instruction of the processor;
Wherein, the processor be configured to via execute the executable instruction come perform claim require it is 1 to 7 described in any item Method for authenticating user identity.
CN201811235438.2A 2018-10-23 2018-10-23 Method for authenticating user identity, system, storage medium and electronic equipment Pending CN109450872A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811235438.2A CN109450872A (en) 2018-10-23 2018-10-23 Method for authenticating user identity, system, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811235438.2A CN109450872A (en) 2018-10-23 2018-10-23 Method for authenticating user identity, system, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN109450872A true CN109450872A (en) 2019-03-08

Family

ID=65548227

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811235438.2A Pending CN109450872A (en) 2018-10-23 2018-10-23 Method for authenticating user identity, system, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN109450872A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110191123A (en) * 2019-05-29 2019-08-30 中国联合网络通信集团有限公司 It applies for card on a kind of line method, client and system
CN113704808A (en) * 2020-05-20 2021-11-26 中国移动通信集团浙江有限公司 User information processing method and device and computing equipment
CN115102771A (en) * 2022-06-25 2022-09-23 平安银行股份有限公司 Data processing method, terminal device, system, device and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101193368A (en) * 2006-11-22 2008-06-04 中兴通讯股份有限公司 Method for wireless access fixing station software to validate identifier setup
CN103259667A (en) * 2013-06-07 2013-08-21 北京邮电大学 Method and system for eID authentication on mobile terminal
US20160094543A1 (en) * 2014-09-30 2016-03-31 Citrix Systems, Inc. Federated full domain logon
CN105868970A (en) * 2016-03-25 2016-08-17 联想(北京)有限公司 Authentication method and electronic device
CN107305608A (en) * 2016-04-21 2017-10-31 成都鼎桥通信技术有限公司 The management method and device of terminal device
CN108427895A (en) * 2018-03-16 2018-08-21 何小林 Data of magnetic disk array protects system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101193368A (en) * 2006-11-22 2008-06-04 中兴通讯股份有限公司 Method for wireless access fixing station software to validate identifier setup
CN103259667A (en) * 2013-06-07 2013-08-21 北京邮电大学 Method and system for eID authentication on mobile terminal
US20160094543A1 (en) * 2014-09-30 2016-03-31 Citrix Systems, Inc. Federated full domain logon
CN105868970A (en) * 2016-03-25 2016-08-17 联想(北京)有限公司 Authentication method and electronic device
CN107305608A (en) * 2016-04-21 2017-10-31 成都鼎桥通信技术有限公司 The management method and device of terminal device
CN108427895A (en) * 2018-03-16 2018-08-21 何小林 Data of magnetic disk array protects system and method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110191123A (en) * 2019-05-29 2019-08-30 中国联合网络通信集团有限公司 It applies for card on a kind of line method, client and system
CN110191123B (en) * 2019-05-29 2022-02-18 中国联合网络通信集团有限公司 Online card handling method, client and system
CN113704808A (en) * 2020-05-20 2021-11-26 中国移动通信集团浙江有限公司 User information processing method and device and computing equipment
CN115102771A (en) * 2022-06-25 2022-09-23 平安银行股份有限公司 Data processing method, terminal device, system, device and storage medium
CN115102771B (en) * 2022-06-25 2023-08-22 平安银行股份有限公司 Data processing method, terminal device, system, device and storage medium

Similar Documents

Publication Publication Date Title
US11088855B2 (en) System and method for verifying an identity of a user using a cryptographic challenge based on a cryptographic operation
RU2710889C1 (en) Methods and systems for creation of identification cards, their verification and control
CN105306490B (en) Payment verifying system, method and device
EP3499795A1 (en) Authentication system and method, and user equipment, authentication server, and service server for performing same method
US20090234764A1 (en) Systems and methods for biometric authentication of monetary fund transfer
CN110826043B (en) Digital identity application system and method, identity authentication system and method
CN111092899B (en) Information acquisition method, device, equipment and medium
CN109325342A (en) Identity information management method, apparatus, computer equipment and storage medium
US20210014064A1 (en) Method and apparatus for managing user authentication in a blockchain network
CN105868970B (en) authentication method and electronic equipment
EP3206329B1 (en) Security check method, device, terminal and server
US9911158B1 (en) Systems and methods for providing a persistent state
CN109450872A (en) Method for authenticating user identity, system, storage medium and electronic equipment
CN109150547A (en) A kind of system and method for the digital asset real name registration based on block chain
US11620650B2 (en) Mobile authentication method and system therefor
US10764049B2 (en) Method for determining approval for access to gate through network, and server and computer-readable recording media using the same
US20190320039A1 (en) Systems and methods for use in providing digital identities
CN110278084B (en) eID establishing method, related device and system
US8931080B2 (en) Method and system for controlling the execution of a function protected by authentification of a user, in particular for the access to a resource
US20150106871A1 (en) System and method for controlling access to security engine of mobile terminal
CN103559430B (en) application account management method and device based on Android system
CN110995661B (en) Network card platform
US20160342996A1 (en) Two-factor authentication method
CN106599619A (en) Verification method and device
CN107104922B (en) Method and device for authority management and resource control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190308

RJ01 Rejection of invention patent application after publication