A method and device for identity verification

An identity verification method and identity verification technology, applied in the field of identity verification methods and devices, can solve problems such as defrauding personal information, and achieve the effect of preventing password leakage

Active Publication Date: 2019-09-27
SICHUAN UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the deficiencies of the above-mentioned prior art, the present invention provides an identity verification method and device to solve the defects of the one-way verification verification method of the existing identity verification system. The user verifies whether the image set contains a preset image Judging whether the server to be accessed is a fake server, so as to avoid being deceived by the fake server for personal information, and verifying the eye movement data of the image by the user, without direct contact between the user and the device, the password is hidden in the image and is not easy to be peeped, thereby eliminating the password leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for identity verification
  • A method and device for identity verification
  • A method and device for identity verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described implementation Examples are some embodiments of the present invention, not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art wit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention provides an identity verification method and device, which relate to the field of network security. The client obtains the user's face image and uploads the face image to the server, the server receives the face image and sends an image set to the client, the image set includes a preset image associated with the face image, and the client displays Preset the image and obtain the eye movement data that the user responds to the preset image. The client uploads the obtained eye movement data to the server, and the server compares the eye movement data with the preset eye movement data. When the acquired When the eye movement data meets the preset rules, the identity verification is passed. The above method can solve the defects of the one-way verification method of the existing identity authentication system through the two-way authentication method, and judge whether the server to be accessed is a fake server by verifying whether the image set contains a preset image, so as to avoid being The fake server defrauds personal information, and the password is hidden in the image, which is not easy to be peeped.

Description

technical field [0001] The invention relates to the field of network security, in particular to an identity verification method and device. Background technique [0002] At present, the commonly used identity authentication system adopts a one-way check method for authentication, and the system establishes a paired user name and password for each user. When the user logs in to the system, the user is prompted to enter his user name and password, and the system performs identity verification by checking whether the user name and password entered by the user match the user name and password of the user in the system. [0003] However, this authentication method has natural security flaws. First of all, the security of identity authentication is only based on the confidentiality of user passwords, and user passwords are generally short and easy to guess, so this scheme cannot effectively resist password guessing attacks; in addition, attackers may eavesdrop on communication ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/32
Inventor 郑秀娟栗战恒敬雪平张昀池哲儒刘凯
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products