Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method

A technology for identity authentication and verification failure, applied in the field of identity authentication, it can solve problems such as hidden dangers of information system security, and achieve the effect of improving security and accurate verification.

Active Publication Date: 2019-01-04
HUBEI UNIV OF ARTS & SCI
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current identity authentication method still has defects in ensuring that the operator who operates with a digital identity is the legal owner of the corresponding digital identity, which leads to potential security risks in the information system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method
  • Identity authentication method
  • Identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] Identity authentication technology is a technology that can identify the real identity of the information sender and receiver. It is the first door to protect the security of network information resources. Its task is to identify and verify the legitimacy and authenticity of user identities in network information systems. Access system resources and keep illegal visitors out. With the continuous popularization of today's network, network security has become more and more important in information systems. How to ensure the operator who operates with a digital identity is one of the important factors for the legal owner of this digital identity to ensure the reliability of authentication. However, the existing identity authentication methods cannot accurately guarantee that the physical identity of the operator corresponds to the digital identity. In addition, it is difficult to track information about illegal logins that have occurred, which makes the information system ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an identity authentication method, which is applied to a server communicatively connected with a user terminal. The method comprises the following steps: receiving a login request sent by the user terminal; generating information to be answered corresponding to the login request and sending the information to the user terminal; receiving a reply block sentby the user terminal; generating a verification block corresponding to the information to be answered; the answering block being authenticated with the authentication block, and if the authenticationis successful, the login request being allowed, and if the authentication is unsuccessful, the login request being rejected. As a result, it is possible to reliably judge whether the login is legal ornot, and the login security is improved.

Description

technical field [0001] The invention relates to the field of identity authentication, in particular to an identity authentication method. Background technique [0002] With the continuous popularization of today's network, network security has become more and more important in information systems. One of the important attributes of network security is authenticity, and identity authentication is the process of identifying whether an identity is real and valid. [0003] Identity authentication technology is an effective solution to confirm the operator's identity in the computer network. All information in the computer network world, including the user's identity information, is represented by a specific set of data. Computers can only identify the user's digital identity, and all authorizations to users are also authorizations for the user's digital identity. The current identity authentication method still has defects in ensuring that the operator who operates with a digi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31H04L29/06
CPCG06F21/31H04L63/08
Inventor 文松程虹王敏徐德刚
Owner HUBEI UNIV OF ARTS & SCI
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More