CN101291217A - Network identity authentication method - Google Patents
- ️Wed Oct 22 2008
CN101291217A - Network identity authentication method - Google Patents
Network identity authentication method Download PDFInfo
-
Publication number
- CN101291217A CN101291217A CNA2007100397660A CN200710039766A CN101291217A CN 101291217 A CN101291217 A CN 101291217A CN A2007100397660 A CNA2007100397660 A CN A2007100397660A CN 200710039766 A CN200710039766 A CN 200710039766A CN 101291217 A CN101291217 A CN 101291217A Authority
- CN
- China Prior art keywords
- authentication
- authentication number
- service provider
- client
- user Prior art date
- 2007-04-20 Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000012795 verification Methods 0.000 claims description 7
- 230000008901 benefit Effects 0.000 abstract description 4
- 238000012550 audit Methods 0.000 description 6
- 230000008676 import Effects 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000007726 management method Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000012467 final product Substances 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 238000007630 basic procedure Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a network identity authentication method which is used to provide user information of the identity authentication for an Internet service provider and comprises the steps that: a. an authentication server is provided, which is provided with a number generating unit and a database in which the user information provided by customers is stored; b. when the customers log on the authentication server, the authentication server receives and sends a user information option and a request for generating an identity authentication number set by the customer to the number generation unit; c. the number generation unit generates the identity authentication number according to the user information option, wherein the identity authentication number comprises a user identification code and a user information code which needs to be provided to the Internet service provider; d. When receiving the identity authentication number sent from the Internet service provider, the authentication server searches and sends the corresponding user information of the identity authentication number from the database to the Internet service provider for the identity authentication. The method has the advantages of being reliable in authentication, cost-saving, rapid and convenient and protecting the privacy of users.
Description
Technical field
The present invention relates to a kind of identity identifying method, relate in particular to a kind of network authentication method.
Background technology
Along with popularizing rapidly of network, the many things that must handle to relevant place in person originally, home-confined now can finishing by the Internet, nowadays for example traditional transaction can be finished by online transaction, and nowadays traditional banking service can realize by e-bank.In the Internet,, need carry out authentication to the user for guaranteeing fail safe.
Common authentication is meant the authenticity of authenticated user, and whether the current online user of authentication authorization and accounting is exactly the user of former registration or registration, is stolen by other people and uses with the account number that prevents the user.In order to carry out authentication, each service provider must provide a system that is used for the authenticated user authenticity, and this has greatly increased cost.Secondly, the service provider is for guaranteeing the authentic and valid of user profile, often also write down for example details such as address name, age, ID card No., address, but the authenticity of examining these information very difficulty and cost is too high, the service provider often after paying very big cost, but is difficult to bring the lifting of fail safe; Moreover, for the user, in order to use each service provider's service, just need provide detailed personal information for authentication, this is not only very inconvenient, and causes user's detailed personal information unnecessarily to provide to each service provider, has increased the danger that privacy of user exposes.
Above-mentioned conventional identity identifying method, for quick online identity authentication such as a class website visiting restriction (as age limit), Internet bar's restrict access (as time period, age limit), and the condition of relevant client identity authentication (as the sex of the sex of friend-making website, age etc., matchmaking service website, age, marital status etc.) is especially inapplicable, this desired fail safe in class website is low, because these service providers often just need a certain of authenticated user or part personal information (age, sex typically), but need quick and convenient checking.As use conventional identity identifying method, its authentication shortcoming loaded down with trivial details, consuming time, that cost is high is especially obvious, and in these are used as require the user still to provide complete personal information for authentication, it is unnecessary then to belong to, and has increased the danger that privacy of user exposes equally.
Summary of the invention
Technical problem to be solved by this invention provides a kind of network authentication method, and it provides a third-party server, is used for being provided for to Internet service provider the user profile of authentication.
The present invention provides a kind of network authentication method for solving the problems of the technologies described above the technical scheme that adopts, and comprises the following steps.At first, provide a certificate server, this certificate server has a number generation unit and a database, and the user profile that is provided by the client is provided in this database; When client's login authentication server, certificate server receives the user information choice of client's setting and the request that generates the authentication number, and sends to the number generation unit; Then, described number generation unit produces an identity Verification Number according to user information choice, wherein this authentication number user profile code of comprising user identification code and need offering Internet service provider; At last, when the described authentication number that receives that Internet service provider sends, certificate server is searched for the pairing user profile of this authentication number from described database, and sends to Internet service provider and be used for authentication.
In the above-mentioned network authentication method, user profile comprises one of them or its combination at least of name, sex, ID card No., date of birth, contact address information, be that the user only provides the part in its all user profile, as long as satisfy the desired necessary information of Internet service provider, and full detail needn't be provided.
Above-mentioned network authentication method wherein when certificate server receives the user profile of client's setting, also comprises the security information of the authentication number that receives client's setting, and also comprises this security information in the above-mentioned authentication number.
In above-mentioned network authentication method, security information can comprise one of them or its combination of website of access times, the term of validity, the use of authentication number.
In the network authentication method of stating, the pairing user profile of search authentication number comprises the user identification code and the user profile code that are comprised according to the authentication number from database, obtains user information corresponding from database.
In above-mentioned network authentication method, when receiving the authentication number that Internet service provider sends, comprising: the validity of the security information audit authentication number that comprises according to the authentication number; And if the authentication number is effective, then user identification code and the user profile code that is comprised according to the authentication number obtains user information corresponding from database.
In above-mentioned network authentication method, wherein, after producing the authentication number, also comprise the authentication number is encrypted.And after receiving the authentication number that Internet service provider sends, also comprise the authentication number is decrypted.
In the above-mentioned network authentication method, Internet service provider can comprise e-commerce website, restricted other website, the website at restriction age or Internet bar, online service website.
The present invention makes it compared with prior art owing to adopt above technical scheme, has following remarkable advantage:
1. the client can not repeat to set up different identity, and everyone network identity all is unique; The client can't use different identity in different occasions or different time, guarantees the uniqueness of identity; Identity and data that the while client is provided on the different online service merchant in different places all are unified;
2. the client uses different online services, or visit different websites, do not need all to provide detailed identifying data at every turn, only need provide once and get final product at certificate server, for the customer, as long as set one group of number sequence that comprises different user information and security information, can be used in various online service merchant, provide a great convenience; For different online service merchants, saved the cost that independently carries out authentication, and since the process of authentication just by our server to the third-party server solicited message, do not need manual intervention;
3. because user profile only is stored in the third-party server; only provide required partial information to the online service merchant; therefore help protecting customer privacy; this mode is specially adapted to website visiting restriction, Internet bar's restrict access etc. and needs online authentication fast, and the authentication of the condition of relevant client identity.
Description of drawings
For above-mentioned purpose of the present invention, feature and advantage can be become apparent, below in conjunction with accompanying drawing the specific embodiment of the present invention is elaborated, wherein:
Fig. 1 is the Verification System Organization Chart of setting up according to network authentication method of the present invention.
Fig. 2 is the structural representation of the certificate server C among Fig. 1.
Fig. 3 is the flow chart of network authentication method of the present invention.
Fig. 4 is the application and the auditing flow figure of the authentication of certificate server.
Fig. 5 is the use surface chart of application authentication number of the certificate server of one embodiment of the invention.
Fig. 6 is the use surface chart of application authentication number of the certificate server of another embodiment of the present invention.
Embodiment
Fig. 1 is the Verification System Organization Chart of setting up according to network authentication method of the present invention.See also shown in Figure 1ly, whole system is made of client A, the B of Internet service provider and certificate server C.The present invention's method that separately identity of user A is authenticated by each B of Internet service provider different from the past, but set up a third-party on-line authentication server C, the personal identification of specialty is provided by third party's authentication service.The basic procedure of authentication is:
Step 110: client A login authentication server C, to certificate server C application authentication number;
Step 120: certificate server C provides the authentication number to client A;
Step 130: the server of the client A logging in network B of service provider, input authentication number;
Step 140: the B of Internet service provider sends the authentication number to certificate server C, asks it to examine the identity of this number;
Step 150: certificate server C examines this authentication number, returns this number user information corresponding;
Step 160: the B of Internet service provider examines this user profile and meets the requirements, if having, then provides service for client A.
With regard to network authentication method of the present invention, please consult Fig. 1~Fig. 3 simultaneously, wherein Fig. 2 is the structural representation of the certificate server C among Fig. 1.Fig. 3 is the flow chart of network authentication method of the present invention, and this method comprises the following steps:
Step 310: a certificate server C is provided.As shown in Figure 2, this certificate server C has a
user interaction unit21, a
network communication unit22, a
processing unit23, a
number generation unit24, an encryption/
decryption element25 and a
database26, and the
user profile260 that is provided by the client is provided in this database 26.This
user profile260 for example be by user log-in authentication server C register import, or filled in carrying out sales counter when registration institute by the user, it comprises the personal information that name, sex, ID card No., place of birth, date of birth, telephone number, address etc. are necessary.These personal informations must be through the authentication audit, to guarantee authenticity.
Fig. 4 illustrates the application and the review process of authenticating user identification in the
step310, client A access registrar server C (410), fill in personal data (420), client A must provide personal identification to prove (430) (for example providing personal identity card at sales counter, the personal identity card copy of perhaps faxing) simultaneously.These data after audit is passed through (450), store client's
user profile260, and send the access code of certificate server C to the client through authentication audit (440) in
database26, and activate client identity authentication authentication account number (460).Like this, but client login authentication server C just, and request generates an identity Verification Number.
Step 320: when client's login authentication server C generates the authentication number with request,
user interaction unit21 can provide an
interactive interface500, import the user profile of setting for the user, as shown in Figure 5, this
interface500 comprises user
profile selection zone510, in the present embodiment, this
zone510 for example comprises: ID card No. option one .1, name option one 2, sex option one .3, date of birth option one .4, marital status option 2.1, contact address option 2.2, telephone number option 2.3, email option 2.4 etc.Client A sets the user profile of being ready to offer Internet service provider, for example for need authenticating identity Internet service provider, client A chooses ID card No. option one .1, name option one 2, sex option one .3, date of birth option one .4 etc., so that necessary user profile to be provided; And for the needs Internet service provider at authentication age, client A only need set the information that the date of birth provides for
needs.Interface500 comprises that also one preserves
title input frame501, to import the above-mentioned title that preservation is set.After finishing for user's input, submits to one
submit button502 and request generation authentication number.After the user submitted input to,
user interaction unit21 received these user profile and user's request, sends to
number generation unit24.
Step 330:
number generation unit24 produces an identity Verification Number according to the user information choice that client A sets, and to offer client A, uses when carrying out the authentication of the B of Internet service provider for it.This authentication number at first comprise one in database the user identification code of unique identification client A, and comprise the user profile code that need offer Internet service provider.So-called user profile code is the sign indicating number sequence that is made of numeral, letter or other symbols, and it represents one or more user profile titles, it should be noted that it does not comprise user profile content itself.When the user profile that provides for example was provided for " age ", the authentication number can comprise the code of this name of the information of representative " date of birth ", and does not comprise the age itself (for example 18 years old).In the present invention, after the authentication number generates, can directly be presented on the
interface500 with user interactions and read for the client, also can be to send on the email mailbox or mobile phone of client's appointment via email or SMS, or other any modes through client's approval and setting.
Step 340: when certificate server C received the authentication number that the B of Internet service provider sends, then
search database26, obtain the pairing user profile of this authentication number, and sent to the B of Internet service provider and authenticate.
In above-mentioned
steps330, preferably, after producing the authentication number, it to be encrypted by encryption/
decryption element25, the algorithm of encryption for example is to use MD5, RSA etc.Like this, reduce at the authentication number during the chance of information leakage via Internet communication.Correspondingly, in
step330, when receiving the authentication number that the B of Internet service provider sends, it is decrypted by encryption/
decryption element25.
Fig. 6 is the use surface chart of application authentication number of the certificate server of another embodiment of the present invention.See also shown in Figure 6ly, the part of same numerals is adopted at
interface500a and interface shown in Figure 5 500, represent identical content, so repeats no more.The difference at
interface500a and
interface500 is, increased security
information input area520, in the present embodiment, this
zone520 for example can comprise: the website that the access times
limited option521 of authentication number, term of
validity option522, appointment are used (figure does not show) etc.Correspondingly, in above-mentioned
steps320, comprise receiving the user profile of being ready to offer Internet service provider that client A sets, and the security information of authentication number.After client A submitted user profile and the security information of setting to and asks to generate the authentication number, certificate server C generated the authentication number according to this user profile and security information.Therefore, this authentication number at first is included in the user identification code of unique identification client A in the database, and comprises the user profile code that need offer Internet service provider, and the security information that has comprised the authentication number.
Authentication number according to generation embodiment illustrated in fig. 6, owing to comprise security information, therefore in the above-mentioned
steps340, after receiving the authentication number that the B of Internet service provider sends, also comprise: according to the validity of security information audit authentication number, and if the authentication number is effective, the user profile code that is comprised according to the authentication number then, from
database26, obtain user information corresponding, and send to the B of Internet service provider.The condition for validity of authentication number wherein, whether the access times that for example are the authentication number surpass set point number, whether the number term of validity has passed through, whether the website of sending the authentication number is client C specified web etc., the security information condition of having only this number of authentication numbers conform of sending as the B of Internet service provider to set, certificate server C just can provide user information corresponding.
In the embodiments of the invention, Internet service provider includes but are not limited to e-commerce website, restricted other website, the website at restriction age or Internet bar, online service website.
Especially exemplified by some specific embodiments, further set forth application of the present invention below.Should be understood that these embodiment only to be used to the present invention is described and be not used in and limit the scope of the invention.
First embodiment
Online service registration: in a lot of online services, the client when registration, only need to input user name, password and comprise necessary user profile the network ID authentication number, import easy to be quick.Inquire about relevant user information by the network ID authentication number to certificate server C by the B of Internet service provider then, examine.For the B of Internet service provider, this verification process is compared and existingly independently authenticated, and is not only very rapid, and do not need manual intervention, finished voluntarily by server, thereby saved a lot of costs.
In addition, a lot of online services (comprising free mail etc.) are arranged, inaccurate netizen applies for a plurality of numbers of the account simultaneously, the Limited resources of avoiding waste still, can't accomplished in the network environment usually, the uniqueness of client identity adopts after the network ID authentication number, owing to can prevent to repeat application.
Second embodiment
In at present very general E-business applications, the audit of user identity and credit management are very important to transaction security.At first, similar with first embodiment, the client is in when registration, can only input user name, password and comprise necessary user profile the network ID authentication number, register after examining by e-commerce website B then.Secondly, in present e-commerce website, all there is a kind of oneself business trust record in each website, mainly is based on client's historical trading situation, the number of times of client's Successful Transaction for example, and the client obtains the number of times of client or businessman's favorable comment etc.Therefore in the present embodiment, network identification authentication server C can network with e-commerce website, shares credit record.Like this, different e-commerce websites can use a third-party independently identity and credit authentication system, has made things convenient for the use of e-commerce website.
And then if with the networking of network identification system and Identity Management mechanism of public security government department, network that then can the comprehensive management network user uses, network credit, promote comprehensively credit office can construction.
The 3rd embodiment
The authentication of friend-making website: the client desires to make friends in the friend-making website registration, or desire to make friends with certain online friend, can login authentication server C, selection desires to reveal to the other side's information, for example age, sex etc., request generates a network ID authentication number, then, the other side that the authentication number is offered the friend-making website or desires to get to know, like this, the other side who makes friends is by friend-making website or direct request authentication server C, just can make things convenient for information such as age of knowing the opposing party accurately, sex; And these information are necessary in the friend-making activity, also are the present means that internet dating lacked, simultaneously because both sides in the authentication website registration for information about, have also farthest prevented the generation of all kinds of crimes.
The 4th embodiment
The authentication of limiter stage website:, need checking client's age when certain website (being line server B) relates to when being not suitable for content that children visit watches.Before this website of login, client A needs can first access registrar server C, and request server C produces a network ID authentication number that comprises my date of birth.On the website that the client need visit, require visitor's fan-in network authentication number.Behind client A fan-in network authentication number, this website visiting authentication server C is with authentication number inquiry visitor's age, if surpass 18 years old, promptly allow to enter, otherwise, the visitor then can not enter the website by 18 years old, only can see the prompting of website.
The 5th embodiment
The restriction of Internet bar's visit: present law to the time that the teenager visits the Internet bar, at the age, all has defined, but owing to there are not better technical measures, often can't manage.Adopt the present invention, can require the personnel that surf the Net must fan-in network authentication number, the management software of this Internet bar sends to certificate server C request query-related information (mainly being the age) with the authentication number.If the online personnel greater than 18 years old, then allow login to use, otherwise then refusal uses Internet bar's computer.In addition, also can be by surf time of certificate server C recording internet personnel or the like.It may be noted that certificate server C is the age according to automatic computing client A of the date of birth of client A, the age of authenticated client is to calculate in real time.
In sum, the present invention sets up a third-party on-line authentication server C, and in personal identification, such advantage is by third party's authentication service provider specialty:
1. the client can not repeat to set up different identity, and everyone network identity all is unique; The client can't use different identity in different occasions or different time, guarantees the uniqueness of identity; Identity and data that the while client is provided on the different online service merchant in different places all are unified;
2. the client uses different online services, or visit different websites, do not need all to provide detailed identifying data at every turn, only need provide once and get final product at certificate server, for the customer, as long as set one group of number sequence that comprises different user information and security information, can be used in various online service merchant, provide a great convenience; For different online service merchants, saved the cost that independently carries out authentication, and since the process of authentication just by our server to the third-party server solicited message, do not need manual intervention;
3. because user profile only is stored in the third-party server; only provide required partial information to the online service merchant; therefore help protecting customer privacy; this mode is specially adapted to website visiting restriction, Internet bar's restrict access etc. and needs online authentication fast, and the authentication of the condition of relevant client identity.
Above embodiment explanation only is preferred embodiment explanation of the present invention, and those skilled in the art can make the replacement and the modification of other all equivalence according to the above embodiment of the present invention explanation.Yet these all equivalences of doing according to the embodiment of the invention are replaced and are revised, and belong to invention spirit of the present invention and reach by in the claim that claim defined.
Claims (9)
1. network authentication method is used for being provided for to Internet service provider the user profile of authentication, it is characterized in that, comprising:
A., one certificate server is provided, and this certificate server has a number generation unit and a database, and the user profile that is provided by the client is provided in this database;
B. when client's login authentication server, certificate server receives the user information choice of client's setting and the request that generates the authentication number, and sends to the number generation unit;
C. described number generation unit produces an identity Verification Number according to user information choice, wherein this authentication number user profile code of comprising user identification code and need offering Internet service provider;
D. when the described authentication number that receives that Internet service provider sends, certificate server is searched for the pairing user profile of this authentication number from described database, and sends to Internet service provider and be used for authentication.
2. network authentication method as claimed in claim 1 is characterized in that, described user profile comprises one of them or its combination at least of name, sex, ID card No., date of birth, contact address information.
3. network authentication method as claimed in claim 1 is characterized in that, in described step b, also comprise the security information of the described authentication number that receives client's setting, and among the described step c, described authentication number also comprises security information.
4. network authentication method as claimed in claim 3 is characterized in that, described security information comprises one of them or its combination of website of access times, the term of validity, the use of described authentication number.
5. network authentication method as claimed in claim 1 is characterized in that, described steps d comprises user identification code and the user profile code that is comprised according to the authentication number, obtains user information corresponding from described database.
6. network authentication method as claimed in claim 3 is characterized in that, described steps d comprises:
The validity that the security information that comprises according to described authentication number is examined described authentication number; And
If described authentication number is effective, then user identification code and the user profile code that is comprised according to the authentication number obtains user information corresponding from described database.
7. network authentication method as claimed in claim 1 is characterized in that, in described step c, behind the generation authentication number, also comprises the authentication number is encrypted.
8. network authentication method as claimed in claim 7 is characterized in that, in described steps d, receive the authentication number that Internet service provider sends after, also comprise the authentication number is decrypted.
9. network authentication method as claimed in claim 1 is characterized in that, described Internet service provider comprises e-commerce website, restricted other website, the website at restriction age or Internet bar, online service website.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007100397660A CN101291217A (en) | 2007-04-20 | 2007-04-20 | Network identity authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007100397660A CN101291217A (en) | 2007-04-20 | 2007-04-20 | Network identity authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101291217A true CN101291217A (en) | 2008-10-22 |
Family
ID=40035318
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2007100397660A Pending CN101291217A (en) | 2007-04-20 | 2007-04-20 | Network identity authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101291217A (en) |
Cited By (16)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010091534A1 (en) * | 2009-02-13 | 2010-08-19 | Telefonaktiebolaget L M Ericsson (Publ) | Method of and system for implementing privacy control |
CN102111275A (en) * | 2011-04-01 | 2011-06-29 | 王冬梅 | User authentication and authorization method and system for implementing user authentication and authorization method |
CN102142959A (en) * | 2010-01-29 | 2011-08-03 | 中华电信股份有限公司 | Member account management method |
CN102214288A (en) * | 2011-06-15 | 2011-10-12 | 清华大学 | Privacy protection method based on incarnations |
CN102546166A (en) * | 2010-12-31 | 2012-07-04 | 北大方正集团有限公司 | Method, system and device for identity authentication |
CN102882853A (en) * | 2012-09-05 | 2013-01-16 | 孙银海 | System and method for internet user authentication |
CN103093131A (en) * | 2011-10-31 | 2013-05-08 | 达谊股份有限公司 | Method for authenticating identity of enterprise employee |
CN103150654A (en) * | 2013-03-18 | 2013-06-12 | 江苏乐买到网络科技有限公司 | Electronic commerce exchange system and method |
CN103458407A (en) * | 2013-07-29 | 2013-12-18 | 北京盛世光明软件股份有限公司 | Internet account number login management system and method based on short message |
CN105376220A (en) * | 2011-11-30 | 2016-03-02 | 阿里巴巴集团控股有限公司 | Service implementation method and system and server |
CN105743883A (en) * | 2016-01-21 | 2016-07-06 | 兴唐通信科技有限公司 | Network application identity attribute acquisition method and network application identity attribute acquisition device |
CN106254325A (en) * | 2013-03-25 | 2016-12-21 | 北京奇虎科技有限公司 | The display packing of website authentication information and browser |
CN103684779B (en) * | 2013-10-29 | 2018-02-02 | 北京智谷睿拓技术服务有限公司 | communication network authentication method and system |
WO2018149145A1 (en) * | 2017-02-15 | 2018-08-23 | Beijing Didi Infinity Technology And Development Co., Ltd. | Systems and methods for on-demand service |
CN108696508A (en) * | 2018-04-11 | 2018-10-23 | 于志 | System and method based on CN39 code authentication resident identification card numbers |
US11246014B2 (en) | 2017-02-15 | 2022-02-08 | Beijing Didi Infinity Technology And Development Co., Ltd. | System and method for providing information on terminal devices |
-
2007
- 2007-04-20 CN CNA2007100397660A patent/CN101291217A/en active Pending
Cited By (22)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010091534A1 (en) * | 2009-02-13 | 2010-08-19 | Telefonaktiebolaget L M Ericsson (Publ) | Method of and system for implementing privacy control |
CN102318376B (en) * | 2009-02-13 | 2016-11-23 | 爱立信(中国)通信有限公司 | For realizing the method and system that privacy controls |
EP2396980A4 (en) * | 2009-02-13 | 2016-06-01 | Ericsson Telefon Ab L M | Method of and system for implementing privacy control |
CN102142959A (en) * | 2010-01-29 | 2011-08-03 | 中华电信股份有限公司 | Member account management method |
CN102546166A (en) * | 2010-12-31 | 2012-07-04 | 北大方正集团有限公司 | Method, system and device for identity authentication |
CN102111275A (en) * | 2011-04-01 | 2011-06-29 | 王冬梅 | User authentication and authorization method and system for implementing user authentication and authorization method |
WO2012130035A1 (en) * | 2011-04-01 | 2012-10-04 | Wang Dongmei | User authentication and authorization method and implementation system thereof |
CN102214288A (en) * | 2011-06-15 | 2011-10-12 | 清华大学 | Privacy protection method based on incarnations |
CN103093131A (en) * | 2011-10-31 | 2013-05-08 | 达谊股份有限公司 | Method for authenticating identity of enterprise employee |
CN105376220A (en) * | 2011-11-30 | 2016-03-02 | 阿里巴巴集团控股有限公司 | Service implementation method and system and server |
CN102882853A (en) * | 2012-09-05 | 2013-01-16 | 孙银海 | System and method for internet user authentication |
CN103150654A (en) * | 2013-03-18 | 2013-06-12 | 江苏乐买到网络科技有限公司 | Electronic commerce exchange system and method |
CN106254325A (en) * | 2013-03-25 | 2016-12-21 | 北京奇虎科技有限公司 | The display packing of website authentication information and browser |
CN106254325B (en) * | 2013-03-25 | 2019-08-02 | 北京奇虎科技有限公司 | The display methods and browser of website authentication information |
CN103458407A (en) * | 2013-07-29 | 2013-12-18 | 北京盛世光明软件股份有限公司 | Internet account number login management system and method based on short message |
CN103458407B (en) * | 2013-07-29 | 2017-03-29 | 北京盛世光明软件股份有限公司 | A kind of Internet account number login management system and method based on note |
CN103684779B (en) * | 2013-10-29 | 2018-02-02 | 北京智谷睿拓技术服务有限公司 | communication network authentication method and system |
CN105743883A (en) * | 2016-01-21 | 2016-07-06 | 兴唐通信科技有限公司 | Network application identity attribute acquisition method and network application identity attribute acquisition device |
WO2018149145A1 (en) * | 2017-02-15 | 2018-08-23 | Beijing Didi Infinity Technology And Development Co., Ltd. | Systems and methods for on-demand service |
US11237010B2 (en) | 2017-02-15 | 2022-02-01 | Beijing Didi Infinity Technology And Development Co., Ltd. | Systems and methods for on-demand service |
US11246014B2 (en) | 2017-02-15 | 2022-02-08 | Beijing Didi Infinity Technology And Development Co., Ltd. | System and method for providing information on terminal devices |
CN108696508A (en) * | 2018-04-11 | 2018-10-23 | 于志 | System and method based on CN39 code authentication resident identification card numbers |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11750617B2 (en) | 2023-09-05 | Identity authentication and information exchange system and method |
CN101291217A (en) | 2008-10-22 | Network identity authentication method |
US10560454B2 (en) | 2020-02-11 | Authentication system and method |
US10540515B2 (en) | 2020-01-21 | Consumer and brand owner data management tools and consumer privacy tools |
US10467624B2 (en) | 2019-11-05 | Mobile devices enabling customer identity validation via central depository |
US8826019B2 (en) | 2014-09-02 | Centralized authentication system with safe private data storage and method |
US20120221474A1 (en) | 2012-08-30 | Secure Electronic Ticketing using Mobile Communication Devices over the Internet |
US20130226813A1 (en) | 2013-08-29 | Cyberspace Identification Trust Authority (CITA) System and Method |
US20110055547A1 (en) | 2011-03-03 | Personal information management and delivery mechanism |
WO2005022428A1 (en) | 2005-03-10 | Attribute information providing server, attribute information providing method, and program |
US8713656B2 (en) | 2014-04-29 | Authentication method |
JP2002298054A (en) | 2002-10-11 | User authentication method, payment method, user authentication information processing method, payment information processing method, user authentication information processing system, payment information processing system, and program |
JP4033865B2 (en) | 2008-01-16 | Personal information management system and mediation system |
US9369452B1 (en) | 2016-06-14 | System and method for secure message reply |
KR101505667B1 (en) | 2015-03-24 | Method of subscription, authentication and payment without resident registration number |
CN104052605B (en) | 2018-04-17 | Single system for the entity authentication across different third-party platforms |
US20240086936A1 (en) | 2024-03-14 | Decentralized Identity Methods and Systems |
US20240273542A1 (en) | 2024-08-15 | Systems and methods for deterring bot access of computer resource |
JP2004341832A (en) | 2004-12-02 | Personal information management method and system, issuing device for identifier for disclosure, and personal information disclosure device |
US8533802B2 (en) | 2013-09-10 | Authentication system and related method |
US8505079B2 (en) | 2013-08-06 | Authentication system and related method |
JP4697583B2 (en) | 2011-06-08 | Personal authentication system that avoids leakage of personal information |
EP3465525A1 (en) | 2019-04-10 | Consumer and brand owner data management tools and consumer privacy tools |
US20130104209A1 (en) | 2013-04-25 | Authentication system |
KR20060103067A (en) | 2006-09-28 | How to handle consent of consent holders for content and products on the Internet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
2008-10-22 | C06 | Publication | |
2008-10-22 | PB01 | Publication | |
2011-01-12 | C02 | Deemed withdrawal of patent application after publication (patent law 2001) | |
2011-01-12 | WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20081022 |