Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication system and method

An identity authentication and pending authentication technology, applied in the field of identity authentication systems, can solve the problems of lost and stolen user passwords, and achieve the effect of solving lost passwords, ensuring security and strong confidentiality

Active Publication Date: 2015-10-14
MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Embodiments of the present invention provide an identity authentication system and method to solve the problems of lost and stolen user passwords in the prior art, and effectively ensure the security of user identities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication system and method
  • Identity authentication system and method
  • Identity authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Embodiments of the present invention provide an identity authentication system and method, which are used to solve the problems of lost and stolen user passwords in the prior art, and effectively guarantee the security of user identities.

[0025] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention. And in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0026] The passwords currently used are all reproducible passwords. The embodiment of the present invention aims to realize a set of identity authentication system with non-reproducible passwords, solve the problem of user's passwords being lost and stolen, and truly realize that pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication system and method, and aims at solving problems of user password lost and stealing in the prior art so that security of user identity can be effectively guaranteed. The identity authentication system comprises a network application server, a user perceptual information database and a perceptual authentication subsystem. After an authentication request initiated by a user to be authenticated is received, perceptual authentication questioning-and-answering is performed between the network application server and the user to be authenticated based on a preset perceptual authentication scene, and authentication answer information is transmitted. The user perceptual information database is used for storing user names of all the registered users and corresponding perceptual information including personality characteristic information, emotional activity information and behavior capability information. The perceptual authentication subsystem is used for verifying whether the authentication answer information of the user to be authenticated is simultaneously matched with the perceptual information corresponding to the user name of the user to be authenticated stored in the user perceptual information database. If the verification result is yes, the user to be authenticated passes the identity authentication through judgment, or the user to be authenticated does not pass the identity authentication through judgment.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to an identity authentication system and method. Background technique [0002] Identity authentication, also known as "identity verification" or "identity authentication", refers to the process of confirming the identity of the operator in the computer network system, so as to determine whether the user has access or use rights to certain resources, and then make the computer network system The access policy can be implemented reliably and effectively, preventing attackers from posing as legitimate users to obtain resource access or use rights, ensuring the security of the system and data, and the legitimate interests of authorized visitors. [0003] Username / password is the simplest and most commonly used identity authentication method, which is based on "what you know" verification means. The password of each user is set by the user himself, and only the user know...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3221H04L63/08
Inventor 潘蒙召
Owner MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products