Identity authentication method and device

An identity authentication device and identity authentication technology are applied in the field of identity authentication methods and devices to achieve the effects of cost controllability, risk prevention and reliability improvement

Inactive Publication Date: 2015-02-25
CHINA FINANCIAL SUPPORTING SERVICES CFSS
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of the present invention is to provide an identity authentication method and device, aiming to solve the problem of identity security authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0035] The present invention provides an identity authentication method, referring to figure 1 , figure 1 It is a schematic flow chart of the first embodiment of the identity authentication method of the present invention. In the first embodiment, the identity authentication method includes the following steps:

[0036] Step S100, collecting user name information.

[0037] The identity authentication device recognizes and collects user name information from the display interface or RFID electronic tags through manual input by the user or other means, such as RFID (Radio Frequency Identification, radio frequency identification) electronic tags, and obtains user ID information. name information.

[0038] Step S200, according to the user name information, obtain configuration information corresponding to the user name...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method. User name information is collected; the configuration information corresponding to a user name is obtained according to the user name information, and two or more different authentication modes are configured in the configuration information so as to conduct authentication on the user identity; the input mode of the authentication information input by a user is verified according to the authentication modes configured in the configuration information; if verification is qualified, the authentication information input by the user is verified. The invention further discloses an identity authentication device. By means of the identity authentication method and device, authentication reliability can be improved, advantages brought by different authentication modes can be fully played, the authentication modes are convenient to replace, dynamic authentication combination can quickly change the related authentication modes, and thus potential risks are prevented, and the identity authentication method and device are easy to implement and controllable in cost.

Description

technical field [0001] The invention relates to the field of information encryption, in particular to an identity authentication method and device. Background technique [0002] In today's information age, there are many methods used for identity authentication to determine whether a person is a real authorizer, such as manually entering passwords, SMS dynamic codes, RFID identification, handwritten signatures, fingerprint comparison, face recognition, etc. And each method has its own advantages, but all have related limitations, which cannot really solve the credibility of the certification. In the existing technologies, each technology has potential risks, such as passwords are easy to be leaked or hacked, SMS dynamic codes will be leaked due to the loss of mobile phones, handwritten signatures are easy to be imitated, and RFID identity authentication will be affected by RFID tags. Or there is a risk of device loss, fingerprint comparison also has the risk of being counte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 邓昌顺
Owner CHINA FINANCIAL SUPPORTING SERVICES CFSS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products