Unlock instant, AI-driven research and patent intelligence for your innovation.

User authentication method and device

A technology of user identity and verification method, which is applied in the field of user identity verification methods and devices, can solve problems such as potential safety hazards and low reliability of verification results, and achieve the effect of avoiding hidden safety hazards and improving reliability

Inactive Publication Date: 2011-04-20
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Because the existing method only verifies the user's identity based on a password, there are security risks, so the reliability of the verification result is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and device
  • User authentication method and device
  • User authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention. Obviously, the described embodiments are part of the embodiments of the present invention , but not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] figure 1 It is a flow chart of Embodiment 1 of the user identity verification method provided by the present invention. In the user information table of the present invention, one user name corresponds to more than one password. In this embodiment, one user name in the user information table corresponds to two passwords, namely the first password and the second password. Further...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user authentication method and a device. The method comprises the following steps: receiving a user name and a first submitted password, which are submitted by a user, and authenticating the submitted user name according to the user name in a user information table; authenticating the first submitted password according to a first password corresponding to the submitted user name in the user information table when the submitted user name passes the authentication; receiving a second submitted password submitted by the user when the first submitted password passes the authentication; and authenticating the second submitted password according to a second password corresponding to the submitted user name in the user information table, and providing services for the user when the second submitted password passes the authentication. By adopting the method and the device, the reliability of user authentication result can be improved, and the potential safety hazard caused after a system is entered by illegal users can be further avoided.

Description

technical field [0001] The present invention relates to computer security technology, in particular to a user identity verification method and device. Background technique [0002] Before a user logs in to a website or electronic system, usually the website or electronic system needs to verify the identity of the user to prevent unauthorized users from entering and provide legitimate users with services corresponding to their authority. When authenticating a user's identity in the prior art, the user's identity is usually verified according to a user name and a password, and there is only one password for identity verification. However, it is easy for others to enter the system after stealing a single password, thereby performing illegal operations, [0003] In the existing authority management system, the concept of multiple passwords for the same user is introduced. A user has multiple passwords, and users have different access rights when logging in with different passw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 齐飞李建功赵文东李珩王伟华
Owner CHINA UNITED NETWORK COMM GRP CO LTD