Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of identity authentication

An identity authentication and authentication request technology, applied in the security field, can solve problems such as leakage of user accounts and static passwords, inconvenient identity authentication, and theft, etc., to improve user experience, convenience, and security.

Active Publication Date: 2019-05-14
SHENZHEN TRANSSION HLDG CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the common identity authentication technology is in the form of "user account + static password". , the identity authentication technology cannot effectively distinguish between legitimate users and illegal users
Furthermore, in order to strengthen security protection, an identity authentication mode based on dynamic passwords was born. Dynamic passwords are more secure than static passwords. However, the tokens that output dynamic passwords can be copied. When illegal users obtain When the token and its password are used, the dynamic password loses its security meaning, making identity authentication still have a large security risk
In addition, both of the above two identity authentication technologies require the user to manually enter the account number and password, and the situation of forgetting the account number and password occurs from time to time, which brings a lot of inconvenience to the identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of identity authentication
  • A method of identity authentication
  • A method of identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0021] The embodiment of the present invention provides an identity authentication method, which can improve the security of identity authentication, improve the convenience of identity authentication operations, and effectively improve user experience. Each will be described in detail below.

[0022] see figure 1 , figure 1 It is a schematic flowchart of an identity authentication method provided by an embodiment of the present invention. like...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method. The method comprises the following steps: acquiring holding state information of a user holding terminal and acquiring current motion state information of the terminal; generating a corresponding information abstract according to the holding state information; transmitting an authentication request to an authentication server, wherein the authentication request comprises the information abstract and the current motion state information, so that the authentication server authenticates whether the information abstract is the same as the registered information abstract corresponding to the previously stored current motion state information; if the information abstract is the same as the registered information abstract, the identity authentication success information returned by the authentication server is received. By implementing the embodiment of the invention, the safety of identity authentication can be improved, the convenience of identity authentication operation is improved, and the user experience is effectively improved.

Description

technical field [0001] The invention relates to the field of security technology, in particular to an identity authentication method. Background technique [0002] With the continuous development of Internet technology, while the Internet brings convenience to people's lives, the network security situation is becoming more and more severe. It is not uncommon for users to have their bank accounts stolen, funds stolen, and user identities fraudulently used. At present, the common identity authentication technology is in the form of "user account + static password". , this identity authentication technology cannot effectively distinguish between legitimate users and illegal users. Furthermore, in order to strengthen security protection, an identity authentication mode based on dynamic passwords was born. Dynamic passwords are more secure than static passwords. However, the tokens that output dynamic passwords can be copied. When illegal users obtain When the token and its pas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/08
Inventor 王延毅
Owner SHENZHEN TRANSSION HLDG CO LTD