Identity authentication method, equipment and system

A technology for identity authentication and analysis equipment, applied in the field of information security, can solve the problems of incompatibility between simplicity and security, low cost and security, etc.

Inactive Publication Date: 2016-10-05
CHINA MOBILE COMM GRP CO LTD
View PDF7 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Embodiments of the present invention provide an identity authentication method, device, and system to solve the problem that existing identity authentication methods cannot have both simplicity and security, or low cost and security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, equipment and system
  • Identity authentication method, equipment and system
  • Identity authentication method, equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0096] Embodiment 1 of the present invention provides an identity authentication method, such as figure 1 As shown, it is a schematic flow chart of the identity authentication method described in Embodiment 1 of the present invention, and the method may include the following steps:

[0097] Step 101: The user feature analysis device receives a user feature query request sent by the server, the user feature query request carries user behavior feature information of the logged-in user, wherein the user feature query request is determined by the server after determining the login user's username and After the password matches the user name and password of the login user reserved in the user name and password database, it is sent to the user characteristic analysis device.

[0098] It should be noted that the user name described in the embodiment of the present invention may be a user name in the traditional sense, that is, the unique identification of the user; the password descr...

Embodiment 2

[0145] Embodiment 2 of the present invention takes the action performer as an example to further describe the identity authentication method described in Embodiment 1 of the present invention, as follows Figure 4 As shown, it is a schematic flow chart of the identity authentication method described in Embodiment 2 of the present invention, and the method may include the following steps:

[0146] Step 401: The server obtains the user name and password of the login user, and obtains the user name and password of the login user after determining that the user name and password of the login user match the user name and password of the login user reserved in the user name and password database. User behavior characteristic information.

[0147] Specifically, after determining that the username and password of the login user match the username and password of the login user reserved in the username and password database, the server may issue a corresponding reminder to the login us...

Embodiment 3

[0161] Embodiment 3 of the present invention takes the action executor as the client as an example to further describe the identity authentication method described in Embodiment 1 of the present invention, as follows Figure 5 As shown, it is a schematic flow chart of the identity authentication method described in Embodiment 3 of the present invention, and the method may include the following steps:

[0162] Step 501: the client sends the user name and password of the login user to the server.

[0163] Specifically, when accessing the system login page, the client may input a corresponding user name and password to the server through the login page.

[0164] It should be noted that the user name described in the embodiment of the present invention may be a user name in the traditional sense, that is, the unique identification of the user; the password described is different from the password in the traditional authentication method, and is usually a simple and easy-to-remembe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method, equipment and system. The identity authentication method comprises the steps: user characteristic analysis equipment receives a user characteristic query request which is sent from a server when the server determines that the user name and the password of a login user are matched with the reserved user name and password of the login user, wherein the user characteristic query request carries the user behavior characteristic information of the login user; and the user characteristic analysis equipment matches the carried user behavior characteristic information of the login user with the reserved user behavior characteristic information of the login user so as to return an authentication response message to the server according to the matching degree between the carried user behavior characteristic information of the login user and the reserved user behavior characteristic information of the login user. In other words, for the scheme of the identity authentication method, equipment and system, based on traditional user-name+password authentication, the user behavior characteristic information is introduced to perform further authentication on the user identity, so that the dilemma of memorizing complicated passwords for the user is avoided; the difficulty in managing the passwords by the user is reduced; and the account number safety is improved. Besides, relative to the traditional authentication mode which requires hardware authentication equipment and the like, the scheme of the identity authentication method, equipment and system also has the advantage of reducing the identity authentication cost.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an identity authentication method, device and system. Background technique [0002] At present, user identity authentication methods can be mainly divided into three categories. The first type is based on user name + password. way; the third category is based on the user's innate biological characteristics, such as fingerprints, iris, voice, facial features, and other identity authentication methods. [0003] Among the above three types of identity authentication methods, the identity authentication method of the first type "username + password" has become the most widely used identity authentication method because it is easy to use and easy to remember. security risks. A study shows that 1% of user passwords can be guessed within 4 times, and there are many common passwords, such as 123456, 12345678, password, qwerty, etc. Even if users are lucky enough to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 李江张峰粟栗
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products