Authentication method and device

一种身份认证、置信概率的技术,应用在安全通信装置、计算机安全装置、用户身份/权限验证等方向,能够解决回答错误、答案不准确、增加客户额外负担等问题,达到增加灵活性、良好正交性、提高安全性和可靠性的效果

Inactive Publication Date: 2011-04-27
INT BUSINESS MASCH CORP
View PDF5 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even if the customer itself is a valid user, it will be rejected for inaccurate answers or wrong answers to any questions
This forces customers to memorize a large amount of reserved information for various network authentications, which obviously increases the additional burden on customers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device
  • Authentication method and device
  • Authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Because the existing authentication mechanism is based on limited static information, it is easy for criminals to steal the information and pass the authentication. However, the inventors have noticed that when users use service applications such as games and e-commerce, a large number of "footprints", that is, recorded information, will be left in the database of the network. These record information are, for example, transaction records stored in network databases, event logs, or any other electronic records. These recorded information as "footprints" are different from user to user and unique to each user. In particular, the recorded information changes with the user's behavior on the network. That is to say, specific users can be identified by virtue of these dynamically changing record information. Therefore, a main idea of ​​the present invention is to verify the user's identity based on various record information left by the user when using a specific service. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method. The method comprises the following steps: acquiring recorded information for an effective user, wherein, the recorded information shows the behaviors executed by effective user previously; mapping the recorded information to a plurality of dimensionalities according to an orthogonal behavioral model with a plurality of orthogonal dimensionalities, wherein, the behaviors showed by the recorded information mapped to different dimensionalities are not overlapped with each other and have no logical causal relationship; respectively sampling the recorded information mapped to different dimensionalities so as to generate an authentication questionnaire containing a plurality of authentication problems; calculating the total confidence probability P of a client as the effective user based on answers of the client to the authentication questionnaire, and outputting a positive authentication result in the event that the total confidence probability P falls into a confidence interval; and outputting a negative authentication result in the event that the total confidence probability P does not fall into the confidence interval. The invention further provides a corresponding identity authentication device.

Description

technical field [0001] The invention relates to an authentication method and device. In particular, the present invention relates to methods and devices for identity authentication in networks. Background technique [0002] In the current environment of online communities, games, e-commerce, etc., in order to identify valid users, security measures of customer identity authentication are usually adopted. The authentication process is actually the process of determining whether the authenticating subject (client) is who it claims to be (eg, a valid user). [0003] Usually, in some online service systems, when customers apply for some specific services, they are usually required to reserve certain personal information data in the database, and then the authentication system designs questions or tests based on these private information to authenticate the identity of the customer. A simple example is that in some website login pages, customers are required to provide login in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCG06F2221/2101H04L9/321G06F21/316H04L2209/56
Inventor 邹峘浩韩竹刘强
Owner INT BUSINESS MASCH CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products