Unlock instant, AI-driven research and patent intelligence for your innovation.

authentication system

A technology for identity authentication and authentication equipment, applied in user identity/authority verification, transmission systems, electrical components, etc., can solve the problems of single-factor authentication insecurity, high cost, insufficient security and usability, etc., to improve security The effect of sex and ease of use

Active Publication Date: 2015-10-28
CHENGDU CYBERKEY TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, single-factor authentication is quite insecure. In order to improve security, more than two factors need to be used at the same time, which is called multi-factor authentication.
[0004] However, the multi-factor authentication scheme in the prior art has the following disadvantages: that is, if there is no good system method, the cost will be relatively high, and the use will be inconvenient
This technical solution makes two-factor authentication (what you know, what you have) easy, but since there is no specific way to integrate the user's biometrics into a complete and unified three-factor method, Its security and ease of use are not enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • authentication system
  • authentication system
  • authentication system

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0039] Example 1: CJ is the fingerprints of all the fingers of the user, ZJ=CJ, the collected sample is the fingerprint of a certain finger.

example 2

[0040] Example 2: CJ is the voice set 0-99, ZJ={10,20,30,40,50,60,70,80,90}, the collected sample is the data of a specified voice.

[0041] Example 3: CJ is a set of all 5 letters, ZJ=CJ, the collection sample is to input a string of 5 letters with the keyboard, such as abcde, ijkom, etc.

[0042] The present invention can be implemented and has the principle that the identity authentication has higher security and ease of use:

[0043] Principle 1: Biometric information should not be used directly. If it is used directly, especially in remote authentication, the characteristic information must be directly used for network transmission, which creates a considerable security risk. If there is a leak during the transmission, it will be more dangerous in the later use process, because usually a very high security confidence is placed on the biometric feature, and it will be more difficult to find the problem. And usually there are relatively few biological characteristics (for...

Embodiment 1

[0047] Embodiment 1: The biometric feature used in this embodiment is voiceprint, and corresponding to this solution, the following technical solutions are included.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication system which comprises a personal authentication device for a user and an authentication server for an authenticator. Both the personal authentication device and the authentication server are provided with predetermined symmetric confidential information SK comprising content information RC and a set of authentication content RD of biological characteristics RB. The personal authentication device comprises an acquiring unit, a processing unit, a communication unit and a storage unit. The authentication server at least comprises a communication unit, a processing unit and a storage unit. The acquiring unit, the communication unit and the storage unit of the personal authentication device are respectively connected with the processing unit. The communication unit and the storage unit of the authentication server are respectively connected with the processing unit, and the personal authentication device and the authentication server are in connection and communication with the respective communication units. The identity authentication system has the advantages that an authentication factor of 'biological characteristics' of the user can be effectively integrated with other authentication factors, and safety and usability of the multi-factor authentication technology are improved.

Description

technical field [0001] The invention relates to the technical field of computer security information, in particular to the technical field of computer identity authentication. Background technique [0002] The identity authentication process, as well as the closely related transaction control, is the process in which the authentication subject (usually the service provider) authenticates the authenticated subject (usually the user), and confirms the identity, ownership and ownership rights. At the most basic level, it is a process in which the authentication subject confirms the information submitted by the authenticated subject, that is, the process in which the authentication subject approves the submitted information. In principle, classifying the submitted information is the so-called authentication factor. The first type of authentication factor is "know what", which means that the subject to be authenticated has some special knowledge that is not easy for others to kn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 熊楚渝陈雨霖
Owner CHENGDU CYBERKEY TECH