Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method, device and system

An identity authentication device and identity authentication technology, applied in user identity/authority verification, transmission systems, electrical components, etc., can solve problems such as inconvenient operation, high threshold for use, and unfavorable popularization, and achieve low-cost effects

Inactive Publication Date: 2011-06-01
杨凯涵
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These known authentication methods all have their advantages and characteristics, but there are still two main disadvantages: 1. The user must use additional electronic devices, such as chip cards, card readers, password generators, etc. to perform identity authentication. The use threshold is high and the operation is inconvenient, which is not conducive to popularization; 2. Some authentication technologies still have loopholes in security, for example, OTP cannot prevent phishing
Therefore, known identity authentication methods still cannot completely prevent various network attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and system
  • Identity authentication method, device and system
  • Identity authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The aforementioned and other technical contents, features and effects of the present invention will be clearly presented in the following detailed description of a preferred embodiment with reference to the drawings.

[0030] refer to figure 1 and figure 2 , is a preferred embodiment of the identity authentication method of the present invention, the method of this embodiment is applied to a server 500 connected to a user terminal 200 through a communication network (this embodiment takes the Internet 300 as an example), the server The 500 can perform identity authentication on the user terminal 200 of the identity authentication device 100, so that the user can obtain the right to use the network resources of the server 500 or conduct network transactions with the server 500 after passing the identity authentication. The server 500 of this embodiment includes a network system 400 connected to the Internet 300 and an identity authentication device 100 connected to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method. An authentication end provides a decoding table for a user end, wherein the decoding table consists of m rows* n columns of first symbols, m rows are marked by m different second symbols and n columns are marked by n different third symbols; when the user end requests for authentication of the authentication end, the authentication end transmits p groups of interrogation codes consisting of m second symbols and n third symbols to the user end, each group of interrogation codes correspond to at least one of the first symbols according to the decoding table, and the user end transmits q groups of answer back codes corresponding to q groups of interrogation codes in the p groups of interrogation codes back to the authentication end according to the decoding table; and the authentication end determines that the user end passes the authentication if judging that the q groups of answer back codes exist in p groups of first symbols corresponding to the p groups of interrogation codes, wherein m, n and p are more than 2 and q is more than 1.

Description

technical field [0001] The invention relates to an authentication method, in particular to a method for a server to authenticate a user's identity, so that the user can obtain the use authority of the server or another system or conduct network transactions. Background technique [0002] Due to its simplicity, traditional passwords have always been the most basic identity authentication method for computer use. However, because traditional passwords are simple, they are easily cracked by peeping, guessing, or using Trojan horse programs and phishing methods. [0003] Therefore, in view of the above problems, it is known to propose various identity security technologies, such as PKI, OTP and other identity authentication methods to further ensure the security of users and systems. These known authentication methods all have their advantages and characteristics, but there are still two main disadvantages: 1. The user must use additional electronic devices, such as chip cards, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 杨凯涵
Owner 杨凯涵