Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and equipment

A technology of identity authentication and equipment, applied in the field of verification, can solve the problems of reduced reliability of identity authentication

Active Publication Date: 2017-07-11
金红宇
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, since the content of the SMS verification code is in clear text, after being intercepted by criminals, it is easy to use the SMS verification code to successfully complete identity authentication, which leads to a reduction in the reliability of identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and equipment
  • Identity authentication method and equipment
  • Identity authentication method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0113] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0114] It should be noted that the terminals involved in the embodiments of the present invention may include but are not limited to mobile phones, personal digital assistants (Personal Digital Assistants, PDAs), wireless handheld devices, wireless netbooks, personal computers, portable computers, MP3 players, MP4 player etc.

[01...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method and equipment. In the embodiment of the present invention, the security server receives the identity authentication information sent by the service server, the identity authentication information includes a verification code and the mobile phone number of the user to be authenticated, and then obtains the key corresponding to the mobile phone number according to the mobile phone number, Use the key to encrypt the verification code to obtain encrypted verification information, so that the security server can send the encrypted verification information to the service server, so that the service server can Send the encrypted verification information with a short message, because the content of the verification code is no longer in plain text, even if it is intercepted by criminals, the verification code cannot be decrypted, which can avoid account security problems caused by the leakage of the verification code, thereby improving the reliability of identity authentication.

Description

[0001] 【Technical field】 [0002] The invention relates to verification technology, in particular to an identity authentication method and device. [0003] 【Background technique】 [0004] With the development of communication technology, the terminal integrates more and more functions, so that more and more corresponding applications (Application, APP) are included in the system function list of the terminal. When the terminal is running these applications, in some cases, for example, making a payment, etc., it is necessary to use a short message verification code, that is, a verification code sent in a short message, to perform identity authentication. [0005] However, since the content of the SMS verification code is in plain text, after being intercepted by criminals, it is easy to use the SMS verification code to successfully complete the identity authentication, thus reducing the reliability of the identity authentication. [0006] [Content of the invention] [0007] Va...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 金红宇
Owner 金红宇