Threat level-based multi-factor identity authentication method

An identity authentication and threat level technology, applied in the field of identity authentication, can solve the problems of inflexible authentication methods, hidden dangers, endangering system security, etc., to achieve a good user experience, user convenience, and flexible authentication process.

Inactive Publication Date: 2019-03-08
SICHUAN JIUZHOU ELECTRIC GROUP
View PDF9 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the existing identity authentication schemes, a single account password identity authentication method is widely used. The password is a string of static data set by the user himself. , but in other links of the authentication process, it is easy to be intercepted and cracked by hackers, and there are security risks such as theft, brute force cracking, and replay attacks. Once the password is leaked, it may be impersonated by illegal nodes
In addition, when users have multiple account passwords, they need to change passwords regularly, which will increase the complexity of user use and maintenance
[0006] 2. In the identity authentication method using the PKI/CA public key system, there is a certificate authority (CertificateAuthority, CA) that may issue an illegal certificate, which may cause a security risk of a man-in-the-

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threat level-based multi-factor identity authentication method
  • Threat level-based multi-factor identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0033] A multi-factor identity authentication method based on threat level, the following steps are performed:

[0034] A. Establish an identity authentication model, which includes a business activity part, a threat detection and processing part, and a multi-factor identity authentication part, such as figure 1 As shown, it is a schematic diagram of the composition of the identity authentication model based on the threat level. The model is mainly composed of the business activity part, the threat detection and processing part, and the multi-factor identity authentication part. The main functions of each part are as follows:

[0035]The business activity part is used to analyze system architecture, security boundaries, business processes, and key modules, formulate evaluation methods, identify functional modules that require identity authentication, perform threat identification, threat level classification, and threat quantification on modules, and provide The threat detecti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a threat level-based multi-factor identity authentication method, which comprises the following steps: building an identity authentication model; performing service activity threat analysis; generating an authentication strategy; and performing security authentication. The invention provides the threat level-based multi-factor identity authentication method for defects of acurrent identity authentication mode. During application, a corresponding identity authentication strategy method is formulated according to different security threat levels in an application scene;a multi-factor identity authentication model with a flexible mechanism is provided according to the identity authentication strategy; the model adopts a modularized design, and can be flexibly replaced as required; an authentication template method is provided according to parameter weights in the authentication strategy; the method takes a comprehensive consideration of the threat level, the authentication strength, the computing cost, the time, the convenience and other factors to adaptively dynamically select corresponding authentication modules; and multi-factor identity authentication meeting requirements at different security levels is flexibly performed through standard interface design and integration.

Description

technical field [0001] The invention relates to identity authentication, in particular to a threat-level-based multi-factor identity authentication method. Background technique [0002] With the rapid development of cyberspace-related technologies, the security situation is becoming more and more severe. According to research, 81.1% of security incidents are related to identity, and activities such as identity theft, destruction, and identity forgery are becoming more and more frequent. However, in the traditional network identity authentication methods, the authentication methods used are often single and simple. Facing the increasing network computing power and various network attacks, some original security solutions have relatively large security risks. , it is increasingly difficult to meet the current security application requirements. Therefore, as identity authentication is a key component and security cornerstone of information systems, more efficient and secure id...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/1416H04L63/205
Inventor 刘斌陈玉忠杨杰唐召胜马康红
Owner SICHUAN JIUZHOU ELECTRIC GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products