Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method, device and system

An identity authentication device and identity authentication technology, applied in transmission systems, electrical components, etc., can solve the problems of inconvenient operation, unfavorable popularization, security loopholes in authentication technology, etc., and achieve the effect of low cost

Inactive Publication Date: 2011-06-01
杨凯涵
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These known authentication methods have their advantages and characteristics, but there are still two main disadvantages: 1. The user must use additional electronic devices, such as chip cards and card readers, password generators, etc. to perform identity verification Authentication, the use threshold is high and the operation is inconvenient, which is not conducive to popularization; 2. Some authentication technologies still have loopholes in security, for example, OTP cannot prevent phishing
Therefore, known identity authentication methods still cannot completely prevent various network attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and system
  • Identity authentication method, device and system
  • Identity authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The aforementioned and other technical content, features and effects of the present invention will be clearly presented in the following detailed description of a preferred embodiment with reference to the drawings.

[0033] refer to figure 1 and figure 2 , is a preferred embodiment of the identity authentication method of the present invention. The method of this embodiment is applied to a server (or called as Authentication terminal) 500, the server 500 can perform identity authentication on the user terminal 200 that wants to perform identity authentication, so that the user can obtain the use authority of the network resources of the server 500 or conduct network transactions with the server 500 after passing the identity authentication. The server 500 of this embodiment includes a network system 400 connected to the Internet 300 and an identity verification device 100 connected to the back end of the network system 400 .

[0034] The network system 400 of this emb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method comprising the steps of: filling n (n is more than 10) different symbols of a first type into the first n grids in a decoding table with i*j (i*j is not smaller than n) grids by an authentication end, forming i*j symbol groups respectively corresponding to the i*j grids by i symbols of a second type and j symbols of a third type, and providing the decoding table to a user end; when the user end requests authentication from the authentication end, randomly selecting k symbol groups from the first n symbol groups of the i*j symbol groups by the authentication end, and randomly arraying the k symbol groups into annular query codes to be sent to the user end; sequentially selecting p (p is smaller than k) adjacent symbol groups from the annular query codes by the user end, and sending a group of answer codes corresponding to the p symbol groups to the authentication end according to the decoding table by the user end; and finding out q (q is not smaller than p) symbol groups corresponding to the answer codes by the authentication end according to the decoding table, judging whether the q symbol groups are adjacent to at least p symbol groups in the query codes, and if so, judging that the user end passes the authentication.

Description

technical field [0001] The invention relates to an authentication method, in particular to a method for a server to authenticate a user's identity, so that the user can obtain the use authority of the server or another system or conduct network transactions. Background technique [0002] Due to its simplicity, traditional passwords have always been the most basic identity authentication method for computer use. However, because traditional passwords are simple, they are easy to be peeped, guessed, or cracked by means of Trojan horse programs, phishing, etc. [0003] Therefore, in view of the above problems, it is known to propose various identity security technologies, such as PKI, OTP, . . . and other identity authentication methods to further ensure the security of users and systems. These known authentication methods have their advantages and characteristics, but there are still two main disadvantages: 1. The user must use additional electronic devices, such as chip cards...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 杨凯涵
Owner 杨凯涵