Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Compound authentication method of multi-identity authentication information feature

A technology of identity authentication and authentication method, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve the problems of high possibility of single identity authentication being copied and stolen, different identity authentication methods, etc.

Inactive Publication Date: 2013-01-30
BEIJING UNIV OF TECH
View PDF2 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The problem with the classic single-identity authentication method is that the single-identity authentication has a higher possibility of being copied and stolen, and a single method cannot easily meet the needs of diverse applications. For complex identity authentication systems, different businesses often The best and most convenient identity authentication methods to be adopted are different

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Compound authentication method of multi-identity authentication information feature
  • Compound authentication method of multi-identity authentication information feature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] Attached below figure 1 This embodiment will be described in detail.

[0069] After describing the system hardware connection relationship and the implementation process in detail, this embodiment illustrates the specific implementation process of the network service platform method of the multi-identity authentication composite algorithm proposed by the present invention through actual calculation, so as to deepen the reader's understanding of the content of the present invention .

[0070] 1. Hardware system design:

[0071] The multi-identity authentication-based network service system consists of four parts: multiple user terminals (100), a real-time authentication center (200), an authentication authorization center (300), and a characteristic information storage medium (0). The authentication center (300 ) adopts a multi-identity authentication compound algorithm.

[0072] Each user terminal (100) is composed of a user terminal host (101), a fingerprint identif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multi-identity authentication compounding method which can be applied to the fields of identity authentication, office automation and the like. The method specifically comprises the following steps of: collecting identity authentication information of a legal authentication object, computing and saving an feature information matrix, collecting the identity authentication information of an unknown object J to be authenticated, computing single identity authentication probability of the unknown object J to be authenticated, judging single identity authentication information feature, computing compound judgment volume of multi-identity authentication information feature, and carrying out compound judging on the multi-identity authentication information feature. According to the multi-identity authentication compounding method, the problems of the limited precision and the limited application range of a single identity authentication method can be solved, the large-range arrangement problem in the application process and a large amount of workloads brought by professional official transaction flow can be solved, and the technical effects that the single authentication accuracy rate is improved and the applicability of the single identity authentication is extended are achieved.

Description

technical field [0001] The invention proposes a network service platform method based on a multi-identity authentication compound algorithm and a system using the method, which can be applied to the fields of identity authentication, office automation and the like. Background technique [0002] At present, in actual production and life, the identity authentication system mainly adopts the method of single identity authentication. The typical method is: [0003] 1. Many personal online payment systems use a dedicated USB authorized file storage device, commonly known as UShield. This solution requires the user to insert the UShield into the computer to be operated each time it is used. The key steps of identity authentication are: match the certificate file in this YouDun with the authentication file of the remote bank server to determine the result of identity authentication; [0004] 2. Many units use fingerprint identification devices for identity authentication, such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 刘经纬王普杨蕾李会民张春晓杨建栋赵辉常鹏贾之阳
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products