Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and device

An identity authentication device and identity authentication technology, applied in the field of identity authentication methods and devices, can solve the problems of low security, easy to be peeped by others, password leakage, etc., and achieve the effect of high security

Inactive Publication Date: 2017-03-29
ALIBABA GRP HLDG LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the identity authentication method of the prior art, when the user enters the password, it is easy to be peeped by others, which leads to the leakage of the password, so the security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0052] In order to facilitate the understanding of the embodiments of the present application, the following will further explain and illustrate with specific embodiments in conjunction with the accompanying drawings, and the embodiments do not constitute a limitation to the embodiments of the present application.

[0053] figure 1 It is a flow chart...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to an identity authentication method and device. The method comprises the following steps: acquiring a first password input by a user when identity authentication is performed on the user; finding a second password from a mapping table according to the first password; and transmitting the second password to a server, and performing identity authentication on the user by the server according to the second password. As can be seen, in the embodiment of the invention, the identity authentication is performed on the user by the second password found according to the first password instead of direct adoption of the first password input by the user, so that other persons cannot acquire the second password or pass identity authentication even if the first password is leaked since the other persons peep at the first password when the user inputs the first password. Compared with a conventional identity authentication method, the identity authentication method has higher security.

Description

technical field [0001] This application relates to the field of computers, in particular to an identity authentication method and device. Background technique [0002] At present, there are more and more occasions where passwords are required to authenticate users. For example, when a user logs in to an application program through a terminal, or when a user makes electronic payment through a terminal, the user needs to enter a password through the terminal, and then the terminal sends the password Send it to the server, and then the server will verify whether the password is correct. If the password is correct, it will confirm that the identity authentication is successful, otherwise, it will confirm that the identity authentication has failed. [0003] In the identity authentication method in the prior art, when the user enters the password, it is easy to be peeped by others, which leads to the leakage of the password, so the security is low. Contents of the invention ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 魏永冬
Owner ALIBABA GRP HLDG LTD