Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User authentication method and device

A technology for authenticating users and users, applied in the field of communications, can solve problems such as user terminal poisoning and untrustworthy users, and achieve the effect of improving security

Active Publication Date: 2019-07-02
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the user may inadvertently access the service provided by a malicious website, resulting in poisoning of the user terminal; or, the user may be an untrustworthy hacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and device
  • User authentication method and device
  • User authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] An embodiment of the present invention provides a method for authenticating a user, which is applied to authenticating a user device, such as image 3 shown, including:

[0039] Step 101: Receive an authentication request message, where the authentication request message includes a user ID and a service ID.

[0040] Step 102: Obtain the trust degree between the user identifier and the service identifier.

[0041] Step 103: Compare the trust degree with a preset trust threshold to obtain an authentication service level.

[0042] Step 104: Authenticate the user identified by the user according to the authentication service level, and obtain an authentication result.

[0043]After receiving the authentication request message including the user identifier and the service identifier, first, obtain the trust degree between the user identifier and the service identifier; then, compare the trust degree with the preset trust threshold to obtain the authentication service level...

Embodiment 2

[0045] The embodiment of the present invention provides a method for authenticating a user, such as Figure 4 shown, including:

[0046] Step 201: The user terminal sends an access request message to the service platform.

[0047] The access request message includes the user ID, access time, and the like. The user ID is the unique identifier of the user's identity, which may be the user's mobile phone number.

[0048] Step 202: The service platform sends an authentication request message to the authenticated user device.

[0049] The authentication request message includes a user ID and a service ID. The service identifier is the service identifier corresponding to the service accessed by the user.

[0050] Step 203: The authenticated user device determines whether the service identifier is pre-stored.

[0051] If the service identifier is not pre-stored, step 204 is performed.

[0052] If the service identifier is pre-stored, step 206 is executed.

[0053] Step 204: Th...

Embodiment 3

[0112] The embodiment of the present invention provides an authentication user device 30, such as Image 6 shown, including:

[0113] a receiving unit 301, configured to receive an authentication request message, where the authentication request message includes a user identifier and a service identifier;

[0114] a processing unit 302, configured to obtain the trust degree between the user identifier and the service identifier;

[0115] The processing unit 302 is further configured to compare the trust degree with a preset trust threshold to obtain an authentication service level;

[0116] The processing unit 302 is further configured to authenticate the user identified by the user according to the authentication service level to obtain an authentication result.

[0117] Compared with the prior art, the authentication is simply performed according to the user name and login password provided by the user. The present invention dynamically authenticates the user according to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a user authentication method and device, relates to the field of communication, and can authenticate credibility of a user and credibility of user access business and enhance security of a user access business platform. An authentication request message, including user identification and business identification, is received; trust degree between the user identification and the business identification is acquired; trust degree and the preset trust threshold are compared so that an authentication service grade is acquired; and the user of the user identification is authenticated according to the authentication service grade so that an authentication result is acquired. The user authentication method and device are used for user identity authentication.

Description

technical field [0001] The present invention relates to the field of communications, and in particular, to a method and device for authenticating users. Background technique [0002] At present, the number of resources and services provided by the Internet is huge and growing rapidly, and it has become the main channel for users to obtain information and services. Usually, users need to pass user name and login password authentication before they can access services provided by the service platform, such as QQ account login, Weibo account login, email login, etc. [0003] In the prior art, in order to reduce risks such as leakage of user information, a third-party authentication system is used to uniformly manage user names and login passwords of users. When the user terminal accesses the business platform, the third-party authentication system performs authentication based on the user name and login password provided by the user. When the user name and password are correct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 汤雅妃王志军张尼刘镝王笑帝
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products