Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identity authentication method, identity authentication device, and server

An identity authentication, the same location technology, applied in user identity/authority verification, key distribution, can solve problems such as system or user loss, inability to guarantee sensitive data and operational security, lack of

Inactive Publication Date: 2016-08-03
中国移动通信集团陕西有限公司
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. At present, there is a lack of multi-person co-management technology for accounts and sensitive operations. 4A (Account, Authentication, Authorization, Audit, referred to as 4A) accounts can pass through the digital certificate authentication of a single user, and some accounts with greater authority are performing sensitive operations. When data is operated, there is a lack of supervision, and it is easy to cause losses to the system or users due to personal intentional or unintentional operations
[0005] 2. At present, for the treasury authentication triggered by sensitive operations, after the authentication is triggered, only one person can pass the approval. There is a certain risk. If this person is negligent and the operator is unsupervised during the operation, it cannot be guaranteed. Security of Sensitive Data and Operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, identity authentication device, and server
  • Identity authentication method, identity authentication device, and server
  • Identity authentication method, identity authentication device, and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] According to an aspect of the embodiments of the present invention, an identity authentication method is provided. In this method, firstly, the account information of the user to be accessed and the corresponding electronic key are obtained; then, the account information of the user to be accessed and the corresponding electronic key are acquired. The electronic key is compared with the pre-saved account information and the corresponding electronic key; finally, when the comparison is consistent, an operation instruction is generated.

[0078] like figure 1 As shown, the method includes:

[0079] Step S11, acquiring the account information of the user to be accessed and the corresponding electronic key.

[0080] Among them, the account information includes: account number, user name, account password, key password and account application time. Of course, it can be understood that in the identity authentication method of the embodiment of the present invention, the spe...

Embodiment 2

[0145] According to another aspect of the embodiments of the present invention, an identity authentication device is also provided, such as figure 2 As shown, the device 200 includes:

[0146] An acquisition module 203, configured to acquire the account information of the user to be accessed and the corresponding electronic key;

[0147] A comparison module 205, configured to compare the acquired account information and corresponding electronic key of the user to be accessed with the pre-saved account information and corresponding electronic key;

[0148] The operation module 207 is configured to generate an operation instruction when the comparison is consistent.

[0149] Optionally, the account information includes: account number, user name, account password, key password and account application time.

[0150] Optionally, the corresponding electronic key is generated according to the account password and key password.

[0151] Optionally, the device 200 also includes: ...

Embodiment 3

[0198] According to another aspect of the embodiments of the present invention, there is also provided a server, which includes a database, and also includes the above-mentioned identity authentication device.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method, an identity authentication device, and a server. The method comprises the following steps: acquiring the account information of an account to be accessed and a corresponding electronic key; comparing the acquired account information of the account to be accessed and the acquired corresponding electronic key with pre-stored account information and a pre-stored corresponding electronic key respectively; and generating an operation instruction if the acquired account information of the account to be accessed and the acquired corresponding electronic key are consistent with the pre-stored account information and the pre-stored corresponding electronic key. According to the scheme of the invention, a method combining single-user authentication and multi-user authentication is adopted, joint authentication of multiple users is needed for the access and operation of only a few sensitive data, authentication of a single user is needed for generation operation, the efficiency of daily work is not affected, and the safety of sensitive data and operation is ensured.

Description

technical field [0001] The invention relates to the field of communication security and encryption, in particular to an identity authentication method, device and server. Background technique [0002] At present, the method of treasury authentication is adopted for the sensitive operations of the account. When the user triggers the treasury authentication when performing sensitive operations, it needs to be approved by relevant personnel and receive SMS verification before continuing to operate. However, it is difficult to ensure the monitoring and effective management of sensitive core data operations based on vault certification alone, and it is also difficult to ensure data security and operational supervision by means of SMS verification. [0003] Therefore, the existing technology has the following weak links in the protection and monitoring of sensitive data and operations: [0004] 1. At present, there is a lack of multi-person co-management technology for accounts a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08G06F21/62
Inventor 韩萌姚知力高芳冯瑞曾强
Owner 中国移动通信集团陕西有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products