Unlock instant, AI-driven research and patent intelligence for your innovation.

A kind of identity authentication method, device and related equipment

An identity authentication and identity technology, applied in the computer field, can solve problems such as user information security threats

Active Publication Date: 2022-07-29
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when multiple identity authentication systems are federated, they only need to use a single authentication credential to pass the verification. If a single authentication credential is leaked, an attacker can use the services of multiple SPs through the identity credential of a single system. User information security will be seriously threatened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of identity authentication method, device and related equipment
  • A kind of identity authentication method, device and related equipment
  • A kind of identity authentication method, device and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to help those skilled in the art better understand the technical solutions of the present application, some concepts involved in the embodiments of the present application are first introduced.

[0048] Multi-factor authentication (MFA) is a computer access control method. Users need to pass two or more authentications before they can obtain authorization and use computer resources.

[0049]The time-based one-time password algorithm is an algorithm that calculates a one-time password based on the key and the current time. The TOTP algorithm uses a cryptographic hash function to combine the key and the current timestamp to generate a one-time password. The TOTP algorithm is mostly used in MFA systems. When the user logs in to a system, the user obtains the verification code to be confirmed generated by the virtual MFA device or the physical MFA device through the TOTP algorithm, and the user terminal sends the verification code to be confirmed input by the user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present application provide an identity authentication method, apparatus, and related equipment, wherein the method includes: a server of a service provider receives a message that the user identity of a user has been authenticated by the server of the identity provider, and the message includes a verification method bound by the user information; the server of the service provider sends a verification request to the user terminal according to the verification method information; the server of the service provider receives the verification code sent by the user terminal, and verifies the verification code; the server of the service provider verifies the verification code If the verification is passed, the server of the service provider generates the access credential corresponding to the user, and sends the access credential to the user terminal, where the access credential indicates that the user has the right to access the server of the service provider. By implementing the above method, in the process of realizing federal identity authentication, the identity of the user is confirmed through multi-factor authentication, so as to prevent the risk of user data security from leakage of identity credentials of a single system.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular, to an identity authentication method, apparatus and related equipment. Background technique [0002] With the development of network technology, users often need to use services provided by different service providers (service providers, SPs), but each SP generally has its own independent identity authentication system. When users need to use services provided by different SPs , you need to pass the authentication of each SP's identity authentication system to use the service. [0003] Currently, the identity authentication systems of different SPs can be federated, and the authentication in a single identity authentication system can be realized through the single sign on (SSO) technology. Serve. However, when multiple identity authentication systems implement federation, only a single authentication credential is needed to pass the authentication. If a single au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/33
CPCH04L63/0815H04L63/0807H04L63/083H04L63/105H04L9/0863H04L9/321G06F21/31G06F2221/2115H04L2463/082G06F21/33H04L9/3242
Inventor 韩长垚周迪超
Owner HUAWEI CLOUD COMPUTING TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More