An agile authentication access method for third-party effective identity hosting based on account concealment

A technology of identity trusteeship and identity authentication, applied in the field of identity verification, can solve problems such as unguaranteed security, inability to distinguish, and impact on company operations, so as to eliminate false network traffic and false access, prevent false traffic, and improve high security attributes Effect

Active Publication Date: 2021-03-16
上海同态信息科技有限责任公司
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 2. Existing Identity Authentication Mode
[0015] Third-party users themselves have the problem of false logins, that is, software robots can be used to register a large number of QQ numbers at one time, and at the same time manipulate these QQ numbers to log in to their applications. A large amount of false data seriously affects the company's operation
[0020] This mode can judge whether the user is a human or a machine, but it cannot judge whether it is operated by the user himself, and there are always new technologies that can break through the block verification of Geetest. Although Geetest has been upgrading its technology, it will still Detailed technical explanations and practical cases appear soon after each technical upgrade
[0021] 6. Login based on biometric information: The application party collects and stores the identity information of the registered user by calling the camera and fingerprint recognition device, and checks it every time it logs in. This method is more secure but still relatively big flaw
However, there is no report about this three-party effective identity hosting agile authentication access method.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An agile authentication access method for third-party effective identity hosting based on account concealment
  • An agile authentication access method for third-party effective identity hosting based on account concealment
  • An agile authentication access method for third-party effective identity hosting based on account concealment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The specific embodiments provided by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0073] Please refer to Figure 1-Figure 6 , this technical solution adopts the principle of "two minimums and one maximum". And to minimize the access to the operation data of the enterprise, only the account name in the enterprise account login system is required, and any other data about the user account will not be requested to obtain and store; to minimize the acquisition of user privacy data, only to obtain the user's registration The phone, mailbox and mobile phone hardware address are used for data docking, and any data of other users except high-authority authentication users will not be stored; it maximizes the access control security and operational security of access enterprises and enterprise users.

[0074] 1 Build an identity authentication service platform of "Ecology Security"

[0075] By building a unified "stat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a third-party effective identity escrow agile authentication access mode based on account concealment. The third-party effective identity escrow agile authentication access mode comprises the following steps: step S1, establishing an identity authentication service platform of 'state security; Step S2, realizing data communication with the access enterprise and user registration; 3, performing first escrow authorization verification for 'state security'; 4, login authentication of that access control of 'state security'; Step S5, replacing the traditional account password login operation with a one-time password login form. The advantages are as follows: By building a third-party authentication service platform, with 'state security ' APP as the carrier of user operation, a unified multi-factor interactive authentication interface is established and provided to all companies for open use, and the authentication service is provided to the access company and theuser authentication result is provided to the access company in a verifiable form, so that the user can be authenticated and logged in in a more convenient and efficient form.

Description

technical field [0001] The invention relates to the technical field of identity verification, in particular to a third-party effective identity trusteeship agile authentication access method based on account concealment. Background technique [0002] With the development of Internet companies, university research institutes, commercial companies, e-government, industrial control security, computer information systems, cloud computing platforms, enterprise-level system applications, web applications, APP mobile and other applications, the interaction in their login modules The identity verification technology and mode of the authentication mode and the access control mode are used to realize the overall access control. Therefore, the identity verification technology and mode become a research hotspot. [0003] In order to vividly understand the connotation of identity verification technology and mode, the following is presented in the form of an example, that is, a natural pe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0421H04L63/0838H04L63/0876
Inventor 李朋林屈玮华朱静熹王浩
Owner 上海同态信息科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products