Identity authentication method, user equipment and server
A technology of identity authentication and user equipment, applied in the field of authentication, can solve problems such as security risks, achieve the effect of improving security, improving authentication security, and avoiding risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0075] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0076] A kind of identity authentication method provided by the present invention, the basic idea is based on the existing FIDO standard system architecture, introduces the equipment authentication server (or equipment authentication center), the specific architecture is as follows: Figure 10 shown. Before and during the user's registration, the final user authentication key is obtained based on the interaction between the device authentication server, the user device (ie, the identity authentication client), and the identity authentication server, which is used to authenticate the identity of the end user.
[0077] It should be understood that, in the existing FIDO authentication standard, taking the UAF architecture as an example...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com