User authentication method, device and system

A user authentication and user technology, applied in the communication field, can solve problems such as account management server and authentication server bottlenecks

Active Publication Date: 2018-05-22
CHINA MOBILE COMM LTD RES INST +1
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a user authentication method, device and system to solve the problem that the access efficiency of existing users is largely affected by the bottleneck of the account management server and the authentication server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method, device and system
  • User authentication method, device and system
  • User authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0087] An embodiment of the present invention provides a user authentication system, the system includes: an application server and at least two authentication servers; wherein,

[0088] At least two authentication servers, configured to receive the identity authentication information broadcast by the mobile terminal, judge whether the verification information of the user is stored locally according to the user identification information carried in the identity authentication information, and if so, according to the Verifying the information and the identity authentication information to authenticate the user, and if the authentication is passed, sending authentication confirmation information to the application server;

[0089] The application server is configured to receive authentication confirmation information sent by the authentication server, determine whether the number of authentication servers sending authentication confirmation information for the user reaches a set ...

Embodiment 2

[0101] In the prior art, the authentication information of all users is stored in the account management node and stored in plain text. If the account management node is cracked, it means that the authentication information of all users in the user authentication system has been leaked. , so that the security of user authentication information is greatly reduced. In order to improve the security of user identity authentication information, on the basis of the above-mentioned embodiments, in the embodiments of the present invention,

[0102] The at least two authentication servers are used to receive the identity authentication information encrypted by the private key broadcast by the mobile terminal, and determine whether the identity authentication information encrypted by the private key of the user is stored locally, and if so, use the The saved public key decrypts the identity authentication information encrypted by the user's private key stored locally and the received id...

Embodiment 3

[0109] In order to improve the security of user authentication information, on the basis of the above-mentioned embodiments, in the embodiment of the present invention, the user authentication system further includes:

[0110] The digital certificate server is configured to receive the registration identity information sent by the mobile terminal, wherein the registration identity information carries the identification information of the user, generates a public key and a private key according to the registration identity information, and converts the public key and the private key sending information to the mobile terminal;

[0111] The at least two authentication servers are further configured to receive the public key sent by the mobile terminal and the registered identity information encrypted with the private key, save the registered identity information as identity authentication information, and The authentication information holds the public key.

[0112] In order to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user authentication method, device and system. The system comprises an application server and at least two authentication servers, wherein the at least two authentication servers are used for receiving identity authentication information broadcast by a user, judging whether verification information of the user is stored locally according to user identification informationcarried in the identity authentication information, if yes, performing authentication on the user according to the verification information and the identity authentication information, and if the authentication is passed, sending authentication confirmation information to the application server; and the application server is used for receiving the authentication confirmation information sent by the at least two authentication servers and judging whether the user, judging whether the number of the authentication servers sending the authentication confirmation information reaches a set frequency threshold value or not, and if yes, determining that the user authentication is passed and providing a corresponding service for the user. According to the method, the device and the system, a bottleneck problem of centralized authentication server processing when the user has too large concurrent page views is solved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a user authentication method, device and system. Background technique [0002] The user authentication function is an indispensable function in every system at present. At present, the realization of the user authentication function is concentrated in the authentication server, and the user account management, authentication management, authorization management and security audit are realized through the authentication server, such as figure 1 As mentioned above, the user authentication in the prior art is specifically that after the authentication server receives the identity authentication information of the user, it sends a query user information to the account management server, and according to the query result of the user information returned by the account management server, the authentication server determines the existence of the user information. user and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 程宇
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products