Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and system

A technology of identity authentication and path, applied in the network field, can solve the problem of low security and achieve the effect of improving security

Active Publication Date: 2013-07-10
SHENZHEN TENCENT COMP SYST CO LTD
View PDF7 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the security of the traditional identity authentication method is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system
  • Identity authentication method and system
  • Identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] like figure 1 As shown, an identity authentication method provided by the present invention includes the following steps:

[0039] Step S10, using the first path to perform first identity authentication on the user.

[0040] Step S20, receiving an operation request initiated by the user after passing the first identity authentication.

[0041] Step S30, using a second path different from the first path to perform second identity authentication on the user.

[0042] Step S40, performing an operation corresponding to the operation request according to the authentication result of the second identity authentication.

[0043] The present invention authenticates the user's identity through two different paths, and since a malicious third party can usually only intercept user authentication information on one path, the present invention can effectively improve the security of operation.

[0044] The above-mentioned operation request may be a sensitive operation request tha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method. The identity authentication method includes the following steps: using a first route to carry out a first identity authentication to a user; receiving operational requests initiated by the user after the first identity authentication is achieved; using a second route which is different from the first route to carry out a second identity authentication to the user; carrying out operation which corresponds with the operational requests according to authentication results of the second identity authentication. The identity authentication is carried out to the user through two different routes, and safety can be effectively improved.

Description

【Technical field】 [0001] The invention relates to network technology, in particular to an identity authentication method and system. 【Background technique】 [0002] With the development of various network applications, such as online shopping, online games, etc., the value of users' online accounts is getting higher and higher, and the behavior of stealing user accounts and various virtual properties is becoming more and more rampant. . For example, phishing means that a third party (account hacker) intends to trick users into submitting current identity-sensitive information (identity credentials) by sending deceptive messages or emails claiming to be from certification agencies or officials, or forging official behaviors, and then through the user-submitted Identity credentials steal account property. [0003] In order to improve the security of network applications, more and more network applications require identity authentication. The traditional method is that the us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 郭计伟李俊喻欣秦雷
Owner SHENZHEN TENCENT COMP SYST CO LTD