Identity authentication method, terminal device, authentication server, and electronic device

An authentication server and terminal equipment technology, applied in digital data authentication, electrical components, digital transmission systems, etc., can solve the problem that the authenticator cannot be authenticated or authorized, so as to reduce the risk of theft, facilitate operation, and ensure security Effect

Active Publication Date: 2017-08-18
CLOUDMINDS SHANGHAI ROBOTICS CO LTD
View PDF7 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem mainly solved by the present invention is to provide a method of identity authentication, terminal equipment, authentication server and electronic equipment. , and when the authenticator's terminal device is not around, the authenticator cannot perform identity authentication or authorization through other terminal devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, terminal device, authentication server, and electronic device
  • Identity authentication method, terminal device, authentication server, and electronic device
  • Identity authentication method, terminal device, authentication server, and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] see figure 1 , figure 1 It is an application scenario diagram of identity authentication provided by the embodiment of the present invention. The identity authentication system 20 includes a terminal device 21 and an authentication server 22, wherein the terminal device 21 is configured with a biometric identification module, and the biometric identification module is used to identify a biometric feature, wherein a biometric feature refers to a unique identification of a user. Features. In this embodiment, the biological features may include features such as fingerprints, faces, irises, or palm prints. The terminal device 21 may be a smart phone, a tablet computer, a PDA (Personal Digital Assistant, handheld computer) and the like.

[0032]The terminal device 21 accepts the input of the first biometric feature of the first user, and acquires the account information of the first user and the device identification of the terminal device 21 . For example, in this embodi...

Embodiment 2

[0060] see image 3 , image 3 It is a schematic structural diagram of a terminal device provided in Embodiment 2 of the present invention. The terminal device 30 includes a biometric identification module 301, a first receiving module 302, a first acquiring module 303, a first sending module 304, a second receiving module 305, a third receiving module 306, a second sending module 307 and a fourth receiving module 308.

[0061]The biometric identification module 301 is configured to perform biometric identification. Wherein, the biometric feature refers to a feature that uniquely identifies the user. In this embodiment, the biometric feature may include features such as fingerprints, facial images, iris, or palm prints. The terminal device 21 may be a smart phone, a tablet computer, a PDA (Personal Digital Assistant, handheld computer) and the like.

[0062] The first receiving module 302 is configured to receive the inputted biometrics of the first user through the biomet...

Embodiment 3

[0075] see Figure 4 , Figure 4 It is a schematic diagram of an authentication server provided by Embodiment 3 of the present invention. The authentication server 40 includes a first receiving module 401 , a first returning module 402 , a second receiving module 403 , a generating module 404 and a second returning module 405 .

[0076] The first receiving module 401 is configured to receive identity authentication information sent by the terminal device, the identity authentication information carrying the account information of the first user, the first biometric feature of the first user and the device identification of the terminal device.

[0077] The first return module 402 is configured to return identity confirmation information to the terminal device after confirming the legal identity of the first user according to the identity authentication information.

[0078] The second receiving module 403 is configured to receive a verification request sent by the terminal d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method, a terminal device, an authentication server, and an electronic device. The method comprises the following steps: receiving biological features of a first user, and obtaining account number information of the first user and a device identity of the terminal device; sending an identity authentication request to the authentication server; receiving identity confirmation information returned by the authentication server; receiving input biological features of a second user; sending a verification request to the authentication server; and receiving a log-in code returned by the authentication server, and making the second user log in through the log-in code. In the above way, the terminal device, where the first user succeeds in authentication, serves as a device for the second user to carry out authentication and log-in, and identities of the first user and the second user are authenticated on the same device, so the second user can succeed in logging in only when the first user provides guarantee, thereby ensuring that the second user utilizes a secure device to log in and guaranteeing security and reliability.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an identity authentication method, terminal equipment, authentication server and electronic equipment. Background technique [0002] Mobile office refers to the office mode in which terminal equipment is wirelessly connected to the mobile communication network for office work. Because mobile office gets rid of the limitation of time and place, office staff can carry out portable company management and communication at any time, which greatly improves the efficiency of office staff. Therefore, mobile office is very popular. [0003] For fields with relatively high security requirements, such as the financial field, if office personnel use terminal devices for office work at will, the risk of financial confidentiality will increase. In order to improve the security of mobile office in the financial field, terminal devices are usually configured for office personnel who need to w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08G06F21/32
CPCG06F21/32H04L9/0863H04L63/08H04L63/0861H04L63/0876
Inventor 张站朝王振凯鄂鹏陈超李静李坤
Owner CLOUDMINDS SHANGHAI ROBOTICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products