Identity authentication method and system, terminal and storage medium

A technology for identity authentication and verification of passwords, applied in the field of network security, can solve problems such as insecurity and cumbersome operations, and achieve the effect of improving security and simplifying the process

Active Publication Date: 2018-06-22
上海方付通科技服务股份有限公司
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides an identity authentication method, system, terminal and storage medium, which solves the problem of cumbersome and unsafe operations of smart terminals in software transactions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system, terminal and storage medium
  • Identity authentication method and system, terminal and storage medium
  • Identity authentication method and system, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] figure 1 It is a flowchart of an identity authentication method provided in Embodiment 1 of the present invention. The technical solution of this embodiment can be applied to the situation where the input device performs identity authentication. The method can be performed by an identity authentication system provided by an embodiment of the present invention. The system can be implemented in the form of software and / or hardware, and configured for application in a smart terminal with an input device. The smart terminal can be, for example, a smart Mobile phones, computers, tablets, smart watches or smart bracelets, etc. The method specifically includes the following operations:

[0047] S110. When the first communication channel and the second communication channel are established, the input device outputs an identity authentication request through the first communication channel.

[0048] The input device may be, for example, an IMS (Input Method Service, input met...

Embodiment 2

[0063] image 3 It is a flow chart of an identity authentication method provided in Embodiment 2 of the present invention. On the basis of the foregoing embodiments, the embodiment of the present invention adds operations before the input device receives the identity authentication information corresponding to the identity authentication request through the first communication channel. Correspondingly, the method of this embodiment includes:

[0064] S210. When the first communication channel and the second communication channel are established, the input device outputs an identity authentication request through the first communication channel.

[0065] S220. The input device receives the verification password input by the user on the input device, and sends the verification password input by the user to the security device.

[0066] The input device generates an identity authentication request, which is sent to the security device, and the security device retrieves the veri...

Embodiment 3

[0073] Figure 4 It is a flowchart of an identity authentication method provided by Embodiment 3 of the present invention. On the basis of the foregoing embodiments, the embodiment of the present invention adds operations before the input device outputs an identity authentication request through the first communication channel. Correspondingly, the method of this embodiment includes:

[0074] S310. The input device receives trigger information input by the user, where the trigger information is used to trigger the input device to generate an identity authentication request.

[0075] Exemplarily, the trigger information may be transaction-related information, including transaction type, transaction counterparty name, transaction account number, transaction bank, transaction amount, transaction time, electronic contract or electronic signature, and the like. Wherein, the transaction type may include transferring money or sending red envelopes, etc. The user inputs trigger inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an identity authentication method and system, a terminal and a storage medium. The identity authentication method comprises the following steps: an input device outputs an authentication request through a first communication channel under the circumstance that the first communication channel and a second communication channel are set up; the input device receives the identity authentication information corresponding to the identity authentication request through the first communication channel; and the input device outputs the identity authentication information through the second communication channel. According to the embodiment of the invention, the identity authentication request is received through the input device, and the identity authentication information is output through the input device, therefore, the security of the identity authentication is improved, and the identity authentication process is simplified.

Description

technical field [0001] The embodiments of the present invention relate to network security technology, and in particular to an identity authentication method, system, terminal and storage medium. Background technique [0002] At the moment when smart terminals are popular all over the world, electronic transactions using smart terminals are gradually replacing cash transactions with high efficiency and convenience. However, electronic transactions are vulnerable to attacks by criminals in a complex network environment. How to ensure the security of electronic transactions is a hot research topic at present. [0003] When users use software to conduct electronic transactions, the software needs to be authenticated to be authorized to conduct transactions. Authentication includes interface authentication and user identity authentication. At present, there are multiple softwares in each smart terminal of the user, and each software needs to be authenticated separately to condu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/18
Inventor 闵晓琼
Owner 上海方付通科技服务股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products