Identity authentication method, device and system

A technology of identity authentication and corresponding relationship, which is applied in the field of information security authentication, can solve the problems that cannot be popularized, cannot cover all users, and cannot fundamentally solve the problem of account theft

Active Publication Date: 2014-05-21
SHENGQU INFORMATION TECH SHANGHAI
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, due to the certain hardware cost and high security cost of two-factor authentication, it cannot cover all users, such as palmprint recognizers, dynamic password cards, etc.; moreover, user interaction is required, and a certain user experience needs to be sacrificed, such as dynamic password cards. The user manually enters the dynamic password, and the iris recognition requires the user to align the eyes with the recognizer, which cannot be popularized among all users and cannot fundamentally solve the problem of account theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and system
  • Identity authentication method, device and system
  • Identity authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0115] The address book system and method proposed by the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Advantages and features of the present invention will be apparent from the following description and claims.

[0116] figure 1 It is a flowchart of an identity authentication method according to an embodiment of the present invention. Such as figure 1 As shown, the identity authentication method includes the following steps:

[0117] Step S1, the client sends a request for account authentication to the server;

[0118] Step S2, the server judges whether the client has a large file;

[0119] If there is a large file, the server side judges whether the account has been bound with the large file (such as figure 1 In step S3), if it has been bound, it will directly perform identity authentication (such as figure 1 In step S4), if it is not bound, then the account will be bound with the la...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identity authentication method, device and system. The method comprises the following steps that: a client sends a request for authenticating an account number to a server; the server judges whether the client has a large file; if the client has the large file, the server judges whether the account number is bound with the large file; if the account number is bound with the large file, the identity authentication is directly carried out; if the account number is not bound with the large file, the account number is bound with the large file and then the identity authentication is carried out; and if the client does not have the large file, the client is initialized to generate the large file, then the account number is bound with the large file, and finally, the identity authentication is carried out. According to the method disclosed by the invention, only by generating the large file at the client at one time and binding the account number, the authentication step can be automatically carried out by the system if a user uses the account number to log in from the same client in future; no hardware cost is generated; the whole authentication process is unnecessary to be interacted with the user; the method is very convenient; and the safety protection to the account number of the user is realized.

Description

technical field [0001] The present invention relates to the technical field of information security authentication, in particular to an identity authentication method, device and system. Background technique [0002] Authentication technology is an important aspect of information security theory and technology. It mainly includes information authentication and identity authentication. Information authentication is used to ensure the integrity and anti-repudiation of information, and identity authentication is used to identify user identities. Restrict unauthorized users from accessing resources. Among them, identity authentication is an important aspect of security technology. When users access encrypted content, they must prove their identities through some form of identity authentication mechanism. Access to encrypted content, identity authentication is the first checkpoint in the security system. Before accessing the security system, the user first passes through the ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 季昕华夏红卫吴锐杨晖张赟林金明
Owner SHENGQU INFORMATION TECH SHANGHAI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products