Identity authentication method and device

A technology for identity authentication and authentication request, applied in user identity/authority verification, secure communication device, key distribution, to achieve the effect of strong applicability, easy operation and easy promotion

Active Publication Date: 2018-12-14
BEIJING QIANXIN TECH
View PDF7 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present invention provides an identity authentication method and device to solve the defects of the identity authentication methods in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0040] figure 1 A schematic flowchart of an identity authentication method provided by an embodiment of the present invention is shown.

[0041] like figure 1 As shown, the identity authentication method provided by the embodiment of the present invention is applied to the client, and the method includes:

[0042] Step 101, sending a first auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an identity authentication method and a device. The method is applied to a client end. The method comprises the following steps: sending a first authenticationrequest carrying an identification number of a user identification SIM card of a terminal to a server, wherein the client is installed on the terminal; receiving a random number fed back by the server for the first authentication request; encrypting the random number to obtain a first ciphertext according to a first preset algorithm and a preset certificate public key in the SIM card; sending a second authentication request carrying the identification number and the first ciphertext to the server. The authentication process in the embodiment of the invention is simple and convenient to operate. As most communication terminals are provided with SIM card slots, the embodiment of the invention is easy to popularize, has strong applicability, and does not need to add other hardware equipment.

Description

technical field [0001] The embodiments of the present invention relate to the field of communication technologies, and in particular, to an identity authentication method and device. Background technique [0002] Identity authentication refers to the process of confirming the identity of the operator, so as to determine whether the user has access and use rights to certain resources, prevent attackers from impersonating legitimate users to obtain resource access rights, ensure system and data security, and authorize visitors legitimate interests. [0003] At present, the commonly used identity authentication methods mainly include three types: identity authentication methods based on user names and passwords, identity authentication methods based on biometric technology, and identity authentication methods based on Universal Serial Bus (Universal Serial Bus, USB) hardware devices. ; However, there are some defects in the above three identity authentication methods. [0004...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/0869H04L9/3268H04L63/0853
Inventor 杨智勇
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products