Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method, device and equipment and storage medium

A storage medium and identity technology, applied in the field of information security, can solve the problems of high degree of dependence, inability to authenticate users, and affect user login system, etc., and achieve the effect of reducing dependence

Active Publication Date: 2019-05-31
北京三快云计算有限公司 +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this solution relies heavily on the terminal device (for example, the user's smart phone, etc.) bound to the account.
When the user forgets to carry the terminal device, or the SMS verification code cannot be received due to the failure of the terminal device, the user's identity cannot be authenticated, which affects the user's login system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and equipment and storage medium
  • Identity authentication method, device and equipment and storage medium
  • Identity authentication method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0048] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method and device, equipment and a storage medium, and the method comprises the steps: outputting a first authentication interface, and obtaining first authentication information input by a current user based on the first authentication interface; If the obtained first authentication information passes the verification, outputting a second authentication interface; Obtaining second authentication information returned by the associated user of the current user based on the second authentication interface; And authenticating the identity of the current user based on the obtained second authentication information. The identity of the current user can be authenticated based on the second authentication information returned by the associated user of the current user; The dependence of the identity authentication scheme on the associated terminal equipment can be reduced, and the identity authentication process of the user can still be completed when the user forgets to carry the terminal equipment or the terminal equipment fails and cannot receive the authentication information.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular to a method, device, equipment and storage medium for authenticating an identity. Background technique [0002] For the purpose of information security, existing enterprise management systems and other software usually use a scheme that combines account numbers, passwords and SMS verification codes for identity authentication. However, this solution relies heavily on the terminal device (for example, the user's smart phone, etc.) bound to the account. When the user forgets to carry the terminal device, or the SMS verification code cannot be received due to the failure of the terminal device, the user's identity cannot be authenticated, which affects the user's login system. Contents of the invention [0003] In view of this, the present application provides an identity authentication method, device, device and storage medium, which can solve the problem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
Inventor 王鹤李丽萌
Owner 北京三快云计算有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products