Identity authentication method

An identity verification method and technology for verifying requests, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve data conflicts, reduce user experience and other problems, and achieve the effect of avoiding data conflicts

Active Publication Date: 2015-11-25
SHANGHAI YIBAO HEALTH MANAGEMENT CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide an identity verification method to avoid data conflicts in the prior art, resulting in the problem of reducing user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The technical solution of the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments, and the following embodiments do not constitute a limitation of the present invention.

[0026] Identity verification is to determine whether the currently logged-in user is indeed a registered legal user by comparing whether the verification information entered by the user is consistent with the last verification information stored in the background server. Verification is usually achieved through channel modes such as SMS, email, WeChat, etc. The essence is to determine that the currently logged-in user is indeed a user of certain related information, such as the owner of the mobile phone number registered during registration, or the email address registered during registration. , The head of household of WeChat ID.

[0027] In this embodiment, the verification information (generally a verification code) sent by a sho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method for a user to realize identity authentication with a background server via a client. The identity authentication method comprises: firstly, the user sends an authentication request to the background server, and the background server searches whether corresponding verification information exists after receiving the authentication request sent by the user, and reads the verification information if the corresponding verification information exists; if no corresponding verification information exists, new verification information is generated and saved; next, the background server sends the verification information to the user, and the user receives the verification information and then sends the received verification information to the background server; the background server compares the verification information received from the user with the locally saved verification information, and approves the verification and clears the corresponding verification information if the verification information received from the user is consistent with the locally saved verification information; otherwise, verification is failed. The identity authentication method is capable of effectively avoiding bad experience of the user due to data collision.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to an identity verification method. Background technique [0002] With the development of the Internet and the popularity of smart phones, the mobile Internet has begun to enter people's daily lives. Because the mobile terminal is relatively easy to lose, the lost mobile terminal is easily used by others to log in the user's Internet application account. Therefore, the current Internet applications are all equipped with a user identity verification link. By verifying the association between the user identity and the identity of the owner of the mobile phone number, it is confirmed that the user himself is using it. [0003] At present, the process of identity verification is usually sent by the client to the background server. The background server generates a verification code and sends it to the user in various forms, such as SMS, email, WeChat, etc. After t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 李洋
Owner SHANGHAI YIBAO HEALTH MANAGEMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products