Identity authentication method, apparatus, computer readable storage medium and device

A technology for identity authentication and to-be-authenticated, applied in the security field, can solve problems such as being easily cracked, and achieve the effect of ensuring security and ensuring security

Inactive Publication Date: 2019-01-04
CHINA MOBILE COMM GRP CO LTD
View PDF8 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problems existing in the prior art, the embodiment of the present invention provides an identity authentication method, device, computer-readable storage medium and device, which solves the problem that the information used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, apparatus, computer readable storage medium and device
  • Identity authentication method, apparatus, computer readable storage medium and device
  • Identity authentication method, apparatus, computer readable storage medium and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0077] An embodiment of the present invention provides an identity authentication method, referring to figure 1 As shown, the method includes the following steps:

[0078] Step 101, receiving an authentication request for identity authentication.

[0079] Specifically, receiving an authentication request for identity authentication in step 101 may be implemented by an identity authentication device. The identity authentication device can be a terminal, such as a mobile phone, a tablet computer, a computer, etc.; wherein, the authentication request can be generated when the user operates an application program on the terminal, for example, it can be generated when a payment operation is performed through an application program and used to authenticate the identity of the user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the present invention disclose an identity authentication method. The method includes the following steps that: an authentication request for performing identity authentication is received; the biometric information of an object to be authenticated is collected in response to the authentication request; signature information is generated on the basis of the biometric informationand an encrypted private key; and the identity identifier of the object to be authenticated and the signature information are sent to a server, wherein the identity identifier and the signature information are used by the server to authenticate the identity of the object to be authenticated, and the identity identifier is stored in a terminal in advance. The embodiments of the invention also disclose an identity authentication apparatus, a computer readable storage medium and an identity authentication device.

Description

technical field [0001] The present invention relates to the field of security technology, in particular to an identity authentication method, device, equipment and computer-readable storage medium. Background technique [0002] With the promotion of terminals and the rapid development of Internet technologies such as the 4th Generation mobile communication technology (4G) and wireless local area network (Wi-Fi) technologies, terminals have more and more influence on users' work, entertainment and life. Big. Users often use terminals to perform money-related operations such as online shopping, online transfer, online financial management, or red envelope entertainment. In order to ensure the security of these operations, it is usually necessary to authenticate the identity of the user using the terminal. There are mainly two existing user identity authentication methods: one is the mode of password + mobile phone verification code; the other is the mode of password + digital...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/0822H04L9/0825H04L9/0866H04L9/3231H04L9/3247H04L9/3263H04L63/0823H04L63/0861H04L63/0876
Inventor 邱勤张滨赵刚袁捷
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products