Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and authentication device

An authentication device and identity authentication technology, applied in the field of communications, can solve the problems of inconvenience, interception of personal account numbers and passwords, cumbersome input, etc., and achieve the effects of improving convenience, improving convenience, and improving security.

Active Publication Date: 2018-06-08
HENGBAO
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most websites and APPs use account passwords and auxiliary verification codes to log in, but this method is easy to be intercepted by Internet Trojans, and it is also very inconvenient and cumbersome to input.
[0003] In addition, since most people have many website accounts at present, it is difficult for people to remember the passwords and accounts of each website. If they are all set to the same one, there will be a greater account risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and authentication device
  • Identity authentication method and authentication device
  • Identity authentication method and authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] Such as figure 2 Shown is a login flowchart of a client, and its specific steps include:

[0046] Step S210: the client initiates a login request of an application or website to the authentication server, and the login request includes information data required for login.

[0047] As an embodiment, the login information data includes necessary information such as application or website ID and user ID, random numbers generated in response to the login request, and optional information such as personal security information questions.

[0048] Step S220: the authentication server receives the login request and sends the address of the authentication server to the client.

[0049] Step S230: the client receives the address of the authentication server, and sends the address of the authentication server and login information data to the authentication device connected to the client.

[0050] As an embodiment, the terminal with the client is connected to the authentication d...

Embodiment 2

[0065] This embodiment provides an optimized client login solution, such as image 3 Shown is another client login flow chart, and its specific steps include:

[0066] Step S310: the client initiates a login request of an application or website to the authentication server; the login request includes information data required for login;

[0067] Step S320: the authentication server receives the login request and sends the address of the authentication server to the client. Specifically, the registered information data is the information data including the user's voice provided during registration.

[0068] Step S330: the client receives the address of the authentication server, and sends the address of the authentication server and login information data to the authentication device connected to the client.

[0069] As an embodiment, data transmission is performed between the client and the authentication device through a Bluetooth interface, WIFI and / or NFC.

[0070] Prefe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses an identity authentication method and an authentication device. The method specifically comprises the following steps: the authentication receives an authentication server address and login information data sent from a client; the authentication device searches a website or application ID in the login information data and a private key corresponding to the user ID; if theprivate key is searched, the to-be-logged website ID or application ID is displayed on a visual screen for the confirming of a user; the authentication device performs the signature of the private key on the authentication server address and the login information data; the authentication device sends the signed data to an authentication server, thereby enabling the authentication server to realize the one-key login of the website or the application in response to the successful verification on the signature by a public key; the authentication device disclosed by the application stores accounts and keys of multiple websites, when the user wants to login, the one-key login can be realized without memorizing and inputting the passwords of multiple websites as long as the verification is performed through the authentication device, and the convenience for the user login is improved.

Description

technical field [0001] This application relates to the field of communication technology, in particular to an identity authentication method and authentication device Background technique [0002] With the enrichment of Internet applications, e-commerce is becoming more and more popular, and online account and identity authentication are becoming more and more popular. At present, most websites and APPs log in through account passwords and auxiliary verification codes, but this method is easy to be intercepted by Internet Trojan horses, and it is also very inconvenient and cumbersome to input. [0003] In addition, since most people have many website accounts at present, it is difficult for people to remember the passwords and account numbers of each website. If they are all set to the same one, there will be a greater account risk. Contents of the invention [0004] An identity authentication method, including user login and user registration, the user login specifically...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/0815H04L63/0876H04L65/1073
Inventor 梅海鹏陆道如
Owner HENGBAO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products