Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method, equipment and system

An identity verification method and identity verification technology, which is applied in the direction of user identity/authority verification, etc., can solve problems such as complex operations and manual input information security defects, and achieve the effect of simplifying operating procedures, avoiding cumbersome operations and security vulnerabilities, and ensuring matching

Active Publication Date: 2012-11-21
ALIBABA GRP HLDG LTD
View PDF3 Cites 85 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] The embodiment of the present application provides an identity verification method, device and system to solve the problems of complex operation and safety defects in manual input information in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, equipment and system
  • Authentication method, equipment and system
  • Authentication method, equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] As mentioned in the background technology, many sensitive operations in the real world and on the Internet need to verify the identity of the user to determine whether the operation is legal, such as opening a door, opening a car, withdrawing money from an ATM, online payment, online shopping, etc. However, whether the verification methods in the existing technical solutions are static verification or dynamic verification, they all need to rely on cumbersome manual input operations, and there are security loopholes such as phishing hazards.

[0049] Based on this, the embodiment of this application proposes a method of triggering the binding terminal device to directly report the pre-stored verification information and the actually collected environmental information for identity verification. On the one hand, it simplifies the operator's operating procedures and avoids manual input of verification information. The cumbersome operations and security loopholes brought abo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an authentication method, authentication equipment and an authentication system. By applying the technical scheme adopted by the embodiment of the invention, when a service operation request is received, preset binding terminal equipment can be triggered to carry out authentication, the matching judgment is carried out on information corresponding to the service operation request according to returned authentication information and environment information and the corresponding service operation request can be executed only under the condition of successful matching, so that the operation program of an operator is simplified and the fussy operation and the security hole which are caused by manual input of authentication information are avoided; and meanwhile, under the assist of authentication of the environment information, the matching of characteristic information such as an actual position of a user and the like and the information corresponding to the service operation request is ensured, so that the safety of the service processing is further improved.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular to an identity verification method, device and system. Background technique [0002] With the rapid development of electronic technology, wireless communication services and Internet-based services, in real life and in the process of network-based business processing, more and more operations need to verify the identity of the user to determine the Whether the operation is legal, such as opening the door, opening the car, ATM (Automatic Teller Machine, automatic teller machine) withdrawal, online payment, online shopping, etc. [0003] Identity verification, also known as authentication, refers to the confirmation of the user's identity through certain means. [0004] In the prior art, in addition to the authentication using a fixed password or an identity mark, there is also an OTP (One Time Password, OTP) authentication that is more confidential, more difficu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 刘大林蔡勇茹新峰吴斌黄建康张小龙徐君吴海波隋东平魏丽萍魏萌赵静吴念峰王静华崔晓珂
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products