User identity authentication method and equipment

A technology for user identity authentication and identity authentication, applied in the field of user identity authentication methods and equipment, can solve the problems of low security of identity authentication, and achieve the effects of improving security, flexibility and security

Inactive Publication Date: 2017-12-15
BEIJING SINOVOICE TECH CO LTD
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The invention provides a user identity authentication method and equipment to solve the problem of low identity authentication security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method and equipment
  • User identity authentication method and equipment
  • User identity authentication method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] figure 1 is a flow chart of steps of a user identity authentication method provided in Embodiment 1 of the present invention, such as figure 1 As shown, the method can include:

[0065] Step 101: Obtain a preset identity authentication mode; the identity authentication mode is preset by the user according to his own security requirements.

[0066] The identity authentication mode in this embodiment of the present invention may include a first authentication mode and a second authentication mode. The identity authentication mode may be preset by the user according to his own security requirements. Among them, in each authentication mode, the operation process of the terminal for user identity authentication is different.

[0067] Step 102: When the identity authentication mode is the first authentication mode, select an authentication mode from a preset authentication mode set to authenticate the user's identity.

[0068] The preset authentication method set in the e...

Embodiment 2

[0078] figure 2 is a flow chart of the steps of another user identity authentication method provided by the second embodiment of the present invention, such as figure 2 As shown, the method can include:

[0079] Step 201: Obtain a preset identity authentication mode.

[0080] Since the importance of the data in the terminal to be protected by each user is different, the user's own security requirements are also different. In this embodiment of the present invention, the user can preset a corresponding identity authentication mode according to his own security requirements, and when identity authentication is required, the terminal can obtain the preset identity authentication mode to authenticate the user.

[0081] Specifically, the user presets the identity authentication mode, which can be achieved by the following steps:

[0082] Step A: The user sends an identity registration request to the authentication server through the client set on the terminal.

[0083] Step B...

Embodiment 3

[0157] image 3 is a block diagram of a user identity authentication device provided in Embodiment 3 of the present invention, such as image 3 As shown, the device 30 may include:

[0158] The obtaining module 301 is configured to obtain a preset identity authentication mode; the identity authentication mode is preset by the user according to his own security requirements;

[0159] The first authentication module 302 is configured to select an authentication mode from a preset authentication mode set to authenticate the user identity when the identity authentication mode is the first authentication mode; the preset authentication mode set includes: Pattern authentication method, handwriting authentication method, face authentication method and certificate authentication method;

[0160] The second authentication module 303 is configured to, when the identity authentication mode is the second authentication mode, sequentially select the corresponding authentication mode pair...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of computer technology, and particularly relates to a user identity authentication method and equipment. According to the user identity authentication method and equipment disclosed by the invention, users can set different authentication modes according to the own security requirements, which means that the users perform identity authentication by adopting different authentication modes, the phenomenon that the scheme for performing identity authentication for the users can meet the security requirements of different users can be ensured, the flexibility and security of identity authentication can be improved, and meanwhile, the preset voiceprint, handwriting and face authentication methods are verified based on biological characteristics of the users, the security of identity authentication can be greatly improved as the biological characteristics of each person are different; and furthermore, the preset certificate authentication mode is verified based on identity authentication, as an identity card contains unique identity information of the user, the certificate authentication mode can refer to more comprehensive aspects when confirming the security during identity authentication, and the security of identity authentication can be greatly improved.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a user identity authentication method and device. Background technique [0002] With the rapid development of electronic technology and the rapid popularization of terminals, the functions of user terminals are becoming more and more perfect, and more and more data information is stored in user terminals. Therefore, it is particularly important to improve the security of data information stored in user terminals. . In order to improve the security of the data information stored in the user terminal, the user is generally authenticated, and the user can access the terminal only when the user's identity authentication is successful. [0003] The identity authentication method in the prior art generally performs identity authentication by manually inputting a dynamic password by a user. Specifically, after receiving the dynamic password provided by the terminal, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0861H04L63/0876
Inventor 李健王富田张连毅武卫东
Owner BEIJING SINOVOICE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products