Method for authenticating identity and device for authenticating identity

A technology of identity authentication and authority, applied in the Internet field, can solve the problems that personal accounts cannot be effectively protected, achieve strong uniqueness and non-reproducibility, and achieve the effect of security management

Inactive Publication Date: 2015-03-18
SHENZHEN TENCENT COMP SYST CO LTD
View PDF3 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method and device for identity authentication, whi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating identity and device for authenticating identity
  • Method for authenticating identity and device for authenticating identity
  • Method for authenticating identity and device for authenticating identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions in this embodiment will be clearly and completely described below in conjunction with the drawings in this embodiment. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0029] In order to effectively protect the security of the user account, this embodiment provides an identity authentication method to authorize user operation permissions through user characteristic data authentication, so that others cannot perform illegal operations on the user account. . Such as figure 1 As shown, the method includes:

[0030] 101. Acquire characteristic data of a user.

[0031] The network-side site (hereafter referred to as the site) acquires characteristic data generated when t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for authenticating an identity and a device for authenticating the identity, relates to the technical field of Internet, and can solve the problem that individual accounts in internet application can not be practically protected. The method disclosed by the invention comprises the following steps: obtaining characteristic data of a user; analyzing an account safety state of a user according to the characteristic data; finding an operating authorization corresponding to the account safety state; executing the operating authorization corresponding to the account safety state. The method and the device are mainly applied to an account safety detection process.

Description

Technical field [0001] The present invention relates to the field of Internet technology, in particular to an identity authentication method and device. Background technique [0002] Currently, Social Networking Services (SNS) and many applications require users to register for personal accounts. Most of the data in personal accounts involves the user's private information, which should not be disclosed to others. In order to ensure the security of the personal account, the user is usually required to enter a user name and password when logging in to the personal account. The network-side site authenticates the password entered by the user through a series of algorithms, thereby realizing the identity authentication of the user. [0003] However, password authentication is only a step in user identity authentication, and successful authentication does not mean that the user's personal account is absolutely safe. For example, a hacker embeds a backup program in a web page through ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/0876
Inventor 喻欣郭计伟王小叶胡育辉
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products