Identity authentication method, system thereof, authentication subject and authenticated subject
A technology of the subject to be authenticated and the subject of authentication, applied in the field of identity authentication, can solve the problems of global Internet security hidden dangers, security risks, system complexity, etc., to achieve the effect of ensuring trustworthiness, improving security, and reducing complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0042] figure 1 A schematic diagram of the identity authentication system provided by the embodiment of the present invention, such as figure 1 As shown, the system may include: an authenticating subject 100 , an authenticated subject 110 and an asymmetric information registration subject 120 .
[0043] The authenticating subject 100 may be a service provider's server, and the authenticated subject 110 may be an authentication terminal used by a user, such as a handheld electronic authenticator. The authentication terminal can collect user characteristics, and the user characteristics may include but not limited to: password, Passwords, biometrics, etc., where biometrics such as fingerprints, facial features, etc. In order to ensure security, us...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 