Authentication method, device and storage medium

An authentication method and authentication request technology, applied in the Internet field, can solve the problems of complex authentication process, poor user experience, and users do not have differentiated authentication, so as to improve user experience and achieve the effect of differentiated requirements.

Active Publication Date: 2021-12-14
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing related technologies, in a specific application scenario, the authentication method for the user is fixed; for example, in the online car-hailing application, the authentication method for the car owner is face recognition and ID card authentication. Since the credit has been good, these two methods of certification are required for each certification, which makes the certification process complicated; if the car owner has poor credit for a long time, the two methods of certification are used for the car owner, so that the car owner with poor credit can pass the certification smoothly
[0004] This authentication method in the prior art does not have differentiated authentication for users, cannot meet the differentiated requirements of identity authentication, and has poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and storage medium
  • Authentication method, device and storage medium
  • Authentication method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention. Obviously, the described embodiments are part of the implementation of the present invention. example, not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0054] The authentication method provided by the present invention is applicable to the authentication system, figure 1 A schematic diagram of the system architecture for the application of the authentication method provided by the present invention, such as figure 1 As shown, the authentication system provided by the present invention may include: an authentication devi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an authentication method, device, and storage medium, including: obtaining an authentication request, the authentication request carrying the identification of the user corresponding to the terminal; according to the authentication request, determining that the authentication request is not an authentication request obtained for the first time; Historical behavior data to determine the user's current authentication process; use the current authentication process to authenticate the user. The authentication method of the present invention can obtain the authentication process for each identity authentication according to the user's historical behavior data, can realize the differentiated requirements of identity authentication, and improve user experience.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to an authentication method, device and storage medium. Background technique [0002] Identity authentication refers to the process of confirming the identity of a user in a computer and computer network system, so as to determine whether the user has access and use rights, so that the access policy of the computer and network system can be executed reliably and effectively, preventing attackers from impersonating legitimate users Gaining access, keeping systems and data secure, and legitimate interests of authorized users. [0003] In the existing related technologies, in a specific application scenario, the authentication method for the user is fixed; for example, in the online car-hailing application, the authentication method for the car owner is face recognition and ID card authentication. Since the credit has been good for a long time, these two methods of certification ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/32
CPCG06F21/316G06F21/32
Inventor 翟京卿袁晓静
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products