Identity authentication system and method based on identifiers
An identity authentication and identification technology, applied in the field of information security, can solve problems such as cumbersome authentication process and poor user experience, achieve reliability and security, prevent adverse consequences, and simplify the authentication process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the present invention will be specifically described below in conjunction with the accompanying drawings and embodiments. The drawings in the following description are only some embodiments of the invention. For those skilled in the art, other drawings can also be obtained based on these drawings without creative effort.
[0041] Such as figure 1 As shown, the present invention provides an identity-based authentication system, including a client, a private key generation server, and at least one terminal device.
[0042] Specifically, the client is used to form a public key that uniquely identifies the user. Usually, the user specifies identification information that uniquely identifies himself, that is, a public key, such as a website, company name, email address, etc.; the client includes but is not limited to a mobile phone , computer, tablet, e...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com