Identity authentication method and apparatus

An identity authentication and identity technology, applied in the field of identity authentication methods and devices, can solve problems that are not suitable for identity authentication, and achieve the effect of improving security and reducing bandwidth occupation

Inactive Publication Date: 2017-12-15
BEIJING YUANXIN SCI & TECH
View PDF12 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] There are currently various authentication methods, but none of these authentication methods are suitable for authentication in the Internet of Things environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and apparatus
  • Identity authentication method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0045] According to an embodiment of the method of the present invention, before using the method of the present invention for identity authentication, the traditional user name plus password verification method can also be used. After the authentication of the user name and password, the authentication of the method of the present invention is carried out to realize double authentication.

[0046] According to another embodiment of the method of the present invention, the method further includes, if the first end does not receive a feedback answer to the question from the second end within a predetermined time, then determine that the identity authentication has failed, and the second end cannot perform subsequent processing .

[0047] figure 2A schematic structural diagram of an embodiment of the present invention is shown. The device in this embodiment includes: a verification mode selection module 202, configured to, in response to authenticating the identity of the sec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and apparatus. The method includes that in response to the authentication of the identity of a second end, a first end randomly selects physical information verification or historical recording verification as a verification mode; based on the selected verification mode, the first end randomly selects one or more from the physical information or historical record corresponding to the selected verification mode as the question correct answer; a question is formed based on the correct answer, and a corresponding question request is issued to the second end; the feedback answer of the question returned by the second end is received; the feedback answer and the correction answer are compared; and in response to the feedback answer being consistent with the correct answer, the identity authentication is passed. The method and device occupy a small amount of data, have high authentication speed and high security, and are particularly suitable for an Internet of things system with a large terminal number and a narrow transmission bandwidth.

Description

technical field [0001] The application relates to the field of digital communication transmission, in particular to an identity authentication method and device. Background technique [0002] Identity authentication, also known as identity verification or authentication, refers to the process of confirming the identity of a user in a computer and computer network system, so as to determine whether the user has access and use rights to a certain resource, and then make the access to the computer and network system Policies can be executed reliably and effectively, preventing attackers from impersonating legitimate users to gain access to resources, ensuring system and data security, and legitimate interests of authorized visitors. [0003] Currently there are various identity authentication methods, but none of these identity authentication methods are suitable for identity authentication in the Internet of Things environment. Due to the large number of IoT terminals and nar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/0869H04L63/08H04L67/12
Inventor 姜哲
Owner BEIJING YUANXIN SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products