Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and system for identity verification and related device

A technology for identity verification and identity verification information, applied in the fields of systems and related equipment, identity verification methods, and devices, can solve the problems of usernames and main passwords that cannot be used for identity verification, too long and complicated, and inconvenient to remember, so as to simplify user operations. , the effect of improving versatility and improving safety

Inactive Publication Date: 2014-09-24
BEIJING STONE SHIELD TECH
View PDF4 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Among the various authentication methods mentioned above, user name and password are the most commonly used authentication methods. However, due to certain restrictions on the length of user name and password, if the password is set too short and too simple, it is easy to be cracked, and if it is too long, too complicated and not easy to remember
Moreover, when the user name and password are entered through the keyboard, they are easily stolen by malicious code in the terminal device, thereby reducing the security of authentication
[0005] If the mobile phone verification code is used as an auxiliary means of identity verification, since the smartphone can easily be implanted with malicious codes, it can intercept the mobile phone verification code issued by the network side, so the security of identity verification cannot be guaranteed.
However, due to hardware limitations, smart cards are difficult to popularize and are not very versatile.
As for the RSA SecurID two-factor authentication token, it is widely used in important information systems around the world, but because it uses 6 digits for verification, it is only suitable for use as a verification code, not as a user name and main password for identity verification
Moreover, this method can only be used in an independent information system and cannot be used universally. Users usually need to hold multiple different SecurID tokens

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for identity verification and related device
  • Method, device and system for identity verification and related device
  • Method, device and system for identity verification and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Such as figure 1 As shown, it is a schematic structural diagram of an identity verification system provided by an embodiment of the present invention, including a verification information generating device and an identity verification server, wherein:

[0042] The verification information generation device 11 is configured to generate user identity verification information when identity verification is required, wherein the user identity verification information includes at least processed seed information obtained by processing the seed information with a stored key;

[0043]The identity verification server 12 is configured to receive the identity verification request sent by the terminal device, the identity verification request carries processed seed information, wherein the processed seed information is the user identity verification information obtained by the terminal device from the verification information generation device 11 Obtained; from the keys stored by i...

Embodiment 2

[0055] In order to better understand the embodiment of the present invention, the following describes the specific implementation process of the embodiment of the present invention in conjunction with the information interaction process during identity verification. The online banking process is as follows figure 2 As shown, the following steps may be included:

[0056] S21. The verification information generating device generates and displays a two-dimensional code for authenticating the user.

[0057] During specific implementation, users may access online banking in the following two ways:

[0058] method one,

[0059] The user accesses online banking using a terminal device that obtains user identity verification information. For example, a user uses a mobile phone to access online banking, and at the same time uses the mobile phone to obtain user identity verification information generated by a verification information generation device. In this case, the login page o...

Embodiment 3

[0087] Such as image 3 As shown, it is a schematic diagram of the implementation flow of the identity verification method implemented on the network side provided by the embodiment of the present invention, including:

[0088] S31. The identity verification server receives the identity verification request sent by the terminal device.

[0089] Wherein, the identity verification request carries the user identity verification information obtained by the terminal device from the verification information generation device, and the identity verification information includes at least the information that the verification information generation device processes the seed information using the stored key The obtained processed seed information is any information that can be processed by the computer system.

[0090] S32. The identity verification server searches for the key corresponding to the key stored in the verification information generation device from the keys stored by itsel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, device and system for identity verification and a related device. The method, device and system for identity verification and the related device are used for improving safety and universality of identity verification. The system for identity verification comprises a verification information generating device and an identity verification server. The verification information generating device is used for generating user identity verification information when identity verification is required, wherein the user identity verification information at least comprises processed seed information obtained after the seed information is processed through stored secret keys. The identity verification server is used for receiving an identity verification request sent by a terminal device, wherein the identity verification request carries the processed seed information, and the processed seed information is obtained by the terminal device from the user identity verification information of the verification information generating device. The stored secret keys of the identity verification server are searched for secret keys corresponding to the stored secret keys in the verification information generating device. The processed seed information is restored and / or verified through the found secret keys. Whether identity verification is passed or not is determined according to a restoring result or a verification result.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an identity verification method, device, system and related equipment. Background technique [0002] With the rapid development of Internet technologies, especially mobile Internet technologies, more and more Internet applications are provided through the Internet. When users access these Internet applications, such as accessing e-mail, accessing instant messaging applications, visiting websites, etc., in order to ensure the security of user access, the provider of each Internet application usually needs to verify the user's identity when the user logs in. [0003] Currently, the most common authentication method is the username and password provided by the user during registration. The username and password are usually composed of uppercase and lowercase letters, numbers, and symbols that can be entered. If the entered username and password match, the authen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCG06F21/34H04L63/08H04L63/0853H04L63/0876H04W12/77H04W12/068H04L63/0884H04L9/321H04L9/3242H04L63/123
Inventor 韩晟王盈
Owner BEIJING STONE SHIELD TECH