Identity authentication method and system and computer readable storage medium

A technology of identity authentication and computer programs, applied in the field of computer networks, to achieve the effect of ensuring security and avoiding cracking

Active Publication Date: 2018-12-07
PUHUA YUNCHUANG TECH (BEIJING) CO LTD
View PDF10 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The main purpose of the present invention is to provide an identity authentication method, identity authentication system and computer-readable storage medium, aiming to provide a user identity information that can be hidden, and ordinary users or tools are not easy to find; another aspect can solve the non-network condition Authentication Mechanisms under the Problem of User Authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system and computer readable storage medium
  • Identity authentication method and system and computer readable storage medium
  • Identity authentication method and system and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0041] In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating description of the present invention, and has no specific meaning by itself. Therefore, 'module', 'part' or 'unit' may be used in combination.

[0042] Please refer to figure 1 , figure 1 It is a schematic diagram of the hardware structure of the identity authentication system 100 in various embodiments of the present invention. The identity authentication system 100 may be a server 20 for identity authentication, or a mobile terminal 30 for identity authentication.

[0043] The identity authentication system 100 includes components such as a communication module 11 , a memory 21 , and a processor 31 . Wherein, the processor 31 is respectively connected to the memory 21 and the com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an identity authentication method. The method comprises the steps of: performing encryption of device code information according to encryption algorithm information, storing encryption strings after secondary encryption into a preset encryption storage area, and storing the device code information to a preset non-encryption storage area; when identity authenticationis performed, performing operation of the device code information according private keys to obtain authentication password strings; reading the encryption strings to obtain corresponding decryption stings; determining whether the authentication password strings are matched with the decryption strings or not; and performing verification of the validity of an identity authentication request of a current user. The identity authentication method does not depend on a server, and fully hides the identity information so as to effectively avoid the risk of crack based on the identity information files and achieve separation of three portions of hardware, encryption strings and the identity authentication program. The present invention further provides an identity authentication system and a computer readable storage medium.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to an identity authentication method, an identity authentication system and a computer-readable storage medium. Background technique [0002] With the widespread use of Internet technology, network security issues have become an important factor that plagues the development of the network. For ordinary users, in order to use the network safely, the verification of customer identity is mostly concentrated on the medium and password, which has great limitations in identifying whether the customer is himself or not. Once the medium is lost and / or the password is leaked, the network side cannot Accurately determine the real identity of the customer in this operation. The main problem at present is that the security is too dependent on the user's own network knowledge. For users with poor security concepts, their passwords are easy to be stolen. Hackers may obtain customer pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3226H04L63/0442H04L63/0478H04L63/083
Inventor 翟红鹰
Owner PUHUA YUNCHUANG TECH (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products