Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User authentication method and device

A technology for authenticating users and users, applied in the field of communications, can solve problems such as user terminal poisoning and untrustworthy users, and achieve the effect of improving security

Active Publication Date: 2015-12-30
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the user may inadvertently access the service provided by a malicious website, resulting in poisoning of the user terminal; or, the user may be an untrustworthy hacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and device
  • User authentication method and device
  • User authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] An embodiment of the present invention provides a method for authenticating a user, which is applied to an authentication user device, such as image 3 shown, including:

[0039] Step 101. Receive an authentication request message, where the authentication request message includes a user identifier and a service identifier.

[0040] Step 102, acquiring the trust degree between the user identifier and the service identifier.

[0041] Step 103, comparing the trust degree with a preset trust threshold to obtain an authentication service level.

[0042] Step 104: Authenticate the user identified by the user according to the authentication service level, and obtain an authentication result.

[0043]After receiving the authentication request message including the user ID and the service ID, firstly, obtain the trust degree between the user ID and the service ID; then, compare the trust degree with the preset trust threshold to obtain the authentication service level ; Fina...

Embodiment 2

[0045] An embodiment of the present invention provides a method for authenticating a user, such as Figure 4 shown, including:

[0046] Step 201, the user terminal sends an access request message to the service platform.

[0047] The access request message includes user identification, access time and so on. The user identifier is a unique identifier of the user identity, which may be the user's mobile phone number.

[0048] Step 202, the service platform sends an authentication request message to the authentication user device.

[0049] The authentication request message includes user identification and service identification. The service identifier is a service identifier corresponding to the service accessed by the user.

[0050] Step 203, the authenticated user device judges whether to store the service identifier in advance.

[0051] If the service identifier is not pre-stored, step 204 is performed.

[0052] If the service identifier is stored in advance, step 206 ...

Embodiment 3

[0112] An embodiment of the present invention provides an authentication user device 30, such as Figure 6 shown, including:

[0113] A receiving unit 301, configured to receive an authentication request message, where the authentication request message includes a user identifier and a service identifier;

[0114] A processing unit 302, configured to obtain the degree of trust between the user identifier and the service identifier;

[0115] The processing unit 302 is further configured to compare the trust degree with a preset trust threshold to obtain an authentication service level;

[0116] The processing unit 302 is further configured to authenticate the user identified by the user according to the authentication service level, and obtain an authentication result.

[0117] Compared with the existing technology, which only performs identity verification based on the user name and login password provided by the user, the present invention dynamically authenticates the user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a user authentication method and device, relates to the field of communication, and can authenticate credibility of a user and credibility of user access business and enhance security of a user access business platform. An authentication request message, including user identification and business identification, is received; trust degree between the user identification and the business identification is acquired; trust degree and the preset trust threshold are compared so that an authentication service grade is acquired; and the user of the user identification is authenticated according to the authentication service grade so that an authentication result is acquired. The user authentication method and device are used for user identity authentication.

Description

technical field [0001] The invention relates to the communication field, in particular to a user authentication method and device. Background technique [0002] At present, the number of resources and services provided by the Internet is huge and growing rapidly, and it has become the main channel for users to obtain information and services. Usually, a user needs to be authenticated by a user name and a login password before accessing services provided by the service platform, for example, login with a QQ account, login with a Weibo account, login with an email address, and the like. [0003] In the prior art, in order to reduce risks such as user information leakage, a third-party authentication system is used to uniformly manage user names and login passwords of users. When the user terminal accesses the service platform, the third-party authentication system performs identity verification according to the user name and login password provided by the user. When the user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 汤雅妃王志军张尼刘镝王笑帝
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products