Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for logging in through user equipment and verifying user's identity

A user equipment and user technology, applied in the field of user login and user identity verification, to achieve the effect of ensuring security

Inactive Publication Date: 2015-04-29
BEIJING DIDI INFINITY TECH & DEV
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method has obvious limitations. First of all, this method is only suitable for browser / server (B / S) architecture applications, and additional protocol support may be required for client / server (C / S) architecture applications.
In addition, https is not necessarily safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for logging in through user equipment and verifying user's identity
  • Method and device for logging in through user equipment and verifying user's identity
  • Method and device for logging in through user equipment and verifying user's identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The principles of the invention will be described below with reference to several example embodiments shown in the accompanying drawings. It should be understood that these embodiments are described only to enable those skilled in the art to better understand and implement the present invention, but not to limit the scope of the present invention in any way.

[0031] figure 1 is a flow chart of a method 100 for logging in through a user equipment according to an embodiment of the present invention, which includes steps S101 to S104.

[0032] In step S101, the user's login account and password are input. Usually, the user's login account and password are input through the client software on the user equipment. A user's device as described herein may be any user device into which a smart card is inserted, such as a cell phone, tablet, laptop, personal digital assistant, game console, and the like.

[0033] Next, the method proceeds to step S102, using the private key i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a method and device for logging in through user equipment and verifying user's identity. The method for logging in through the user equipment includes: inputting login identity and codes of a user; encrypting the login identity and codes of the user by the aid of a private key in a smart card of the user equipment; sending the encrypted login identity and codes of the user to a server; receiving verification result sent from the server. The method for verifying the user's identity includes: acquiring a public key from the user; receiving the encrypted login identity and codes of the user; based on the public key, decrypting the login identity and codes of the user, verifying the effectiveness of the identity of the user and sending the verification result. By means of combining a PKI (public key infrastructure) system with the smart card, security of user login and effectiveness of user identity verification can be guaranteed.

Description

technical field [0001] Embodiments of the present invention relate to user login and user identity verification, and in particular to a method and device for logging in and verifying user identity through user equipment. Background technique [0002] With the development of mobile Internet, more and more services are provided to users through mobile devices. Most mobile applications require user authentication first to determine the validity of the user's identity. [0003] Common user authentication methods for mobile applications currently on the market include: the user enters his or her login account and password, and sends it to the server for user authentication; Authentication, etc. The obvious disadvantage of these methods of user login and user authentication is that they are not secure enough. The login account number and password entered by the user during the login process or the SMS verification code received by the user are easily intercepted and cracked by ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCG06F21/34H04L63/0428H04L63/083
Inventor 吴召学
Owner BEIJING DIDI INFINITY TECH & DEV