Cross-equipment and cross-application identity authentication method based on data image coding

An identity authentication and cross-device technology, applied in the direction of user identity/authority verification, etc., can solve problems such as inability to provide personalized services

Inactive Publication Date: 2014-07-02
江苏先安科技有限公司
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This prerequisite makes it impossible to provide personalized services on terminals without interactive capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-equipment and cross-application identity authentication method based on data image coding
  • Cross-equipment and cross-application identity authentication method based on data image coding
  • Cross-equipment and cross-application identity authentication method based on data image coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Example 1, such as figure 1 As shown, the identity authentication condition data image is generated in real time and the source authentication is completed on the A device itself:

[0053] 1 The user enters the login interface of the untrusted device B;

[0054] 2. The untrusted device B provides image-based identity authentication condition information through a display device such as a screen. The image is generated by encoded identity authentication condition data. For example, you can use a QR code as the image form of the final data representation, or you can use a barcode, or directly display the data, and identify it through OCR; and the identity authentication condition data can include: the address of the server that actually completed the authentication, verifiable Publisher identity information. It may also include: application identification, authentication method requirements, random number challenge (Challenge), etc.; image-based identity authentication...

Embodiment 2

[0066] Example 2, such as figure 2 As shown, the identity authentication condition data image is generated in real time and the source authentication is completed by the remote authentication server:

[0067] 1 The user enters the login interface of the untrusted device B;

[0068] 2. The untrusted device B provides image-based identity authentication condition information through a display device such as a screen. The image is generated by encoded identity authentication condition data. For example, you can use a QR code as the image form of the final data representation, or you can use a barcode, or directly display the data, and identify it through OCR; and the identity authentication condition data can include: the address of the server that actually completed the authentication, verifiable Publisher identity information. It may also include: application identification, authentication method requirements, random number challenge (Challenge), etc.; image-based identity ...

Embodiment 3

[0080] Example 3, such as image 3 As shown, use the static identity authentication condition data image and complete the source authentication on the A device itself:

[0081] 1 The user enters the login interface of the untrusted device B;

[0082] 2. The untrusted device B provides image-based identity authentication condition information through a display device such as a screen. The image is generated by encoded identity authentication condition data. For example, you can use a QR code as the image form of the final data representation, or you can use a barcode, or directly display the data, and identify it through OCR; and the identity authentication condition data can include: the address of the server that actually completed the authentication, verifiable Publisher identity information. It may also include: application identification, authentication method requirements, random number challenge (Challenge), etc.; image-based identity authentication condition informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a cross-equipment and cross-application identity authentication method based on data image coding. Identity authentication condition information is provided by equipment B, but an actual authentication process is finished on equipment A; the identity authentication condition information provided by the equipment B comprises actually authenticated server addresses and publisher identity information capable of being verified; the identity authentication condition information is coded in a data to image mode and displayed on the equipment B in an image form finally; identity authentication condition image information on the equipment B is scanned by the equipment A, identity authentication condition data are restored through image decoding, the identity of a publisher is verified, and identity information is obtained from a user and sent to an authentication server; the identity of the user is verified by the authentication server and fed back to the equipment B, and the equipment B allows or refuses the process that the user logs in according to a feedback result; after finishing operation, the user can log out through the equipment B or the equipment A. It is guaranteed that authentication information of the identity of the user cannot be leaked or hijacked.

Description

technical field [0001] The invention relates to completing the identity authentication process of the application running on the B equipment by running the identity authentication application on the A equipment. It is used to solve the problem of how to credibly and securely complete the identity authentication of the application running on the B-device when the B-device does not have sufficient security conditions. Background technique [0002] Two-dimensional code: Two-dimensional code (2-dimensional barcode) refers to a barcode that expands on the basis of a one-dimensional barcode and is readable in another dimension. It uses a black and white rectangular pattern to represent binary data. After being scanned by the device, all information in it can be obtained. information contained. The width of a one-dimensional barcode records data, but its length does not record data. Data is recorded in both the length and width of the two-dimensional barcode. Two-dimensional bar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 庄昱垚
Owner 江苏先安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products