Identity authentication method and device

A technology for identity authentication and authentication results, applied in the computer field, can solve problems such as large security risks, and achieve the effect of ensuring security and improving security

Active Publication Date: 2019-11-05
DATANG GAOHONG XINAN ZHEJIANG INFORMATION TECH CO LTD
View PDF9 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the above technical problems, the present invention provides an identity authentication method and device, which solves th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] Hereinafter, exemplary embodiments of the present invention will be described in more detail with reference to the accompanying drawings. Although exemplary embodiments of the present invention are shown in the drawings, it should be understood that the present invention can be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to enable a more thorough understanding of the present invention and to fully convey the scope of the present invention to those skilled in the art.

[0066] Such as figure 1 As shown, the embodiment of the present invention provides an identity authentication method applied to the server of an identity authentication system, including:

[0067] Step 11: Receive an identity registration request sent by the proxy client; the identity registration request includes: user identity information, device identity information, and device integrity information obtained thro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and device. The method is applied to a server of an identity authentication system, and comprises the following steps: performing identity registration according to user identity information and equipment identity information in an identity registration request, equipment integrity information reflecting an equipment operation state and thelike, and binding equipment and a user through identity registration to generate an authentication certificate; when a system access request exists, authenticating identities of a user and equipmentand equipment operation state information and realizing multi-level identity authentication; further, formulating multi-level and multi-combination access control strategy through comprehensively authenticating the identity and the equipment state, thus the network system safety is effectively increased. In the identity authentication method, the user identity is authenticated based on the multi-factor technology, the equipment identity is authenticated based on trusted computing, and the equipment integrity is authenticated, so that a zero-trust identity authentication system is realized, andthe security of the network system is effectively improved.

Description

Technical field [0001] The present invention relates to the field of computer technology, in particular to an identity authentication method and device. Background technique [0002] With the development of information technology, emerging applications such as cloud computing, mobile Internet, BYOD (Bring Your Own Device, office with your own device) and the popularization of mobile office methods, the boundaries between the internal and external networks have become blurred, and the existing In a border-centric network security architecture, assuming that the internal network can be trusted, identity authentication is based only on user identity information. This method only confirms the user identity without authenticating the security of the device. Once the identity of the trusted user is Misappropriation or fraudulent use by malicious users, or hidden security risks of the equipment used by users, will directly affect the security of internal network resources, causing losse...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/46
CPCH04L63/0823H04L63/0876H04L63/0884G06F21/46
Inventor 郑驰张佳建
Owner DATANG GAOHONG XINAN ZHEJIANG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products