Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Remote identity authentication method

An identity authentication and ID card technology, applied in user identity/authority verification, digital transmission systems, electrical components, etc., can solve problems such as external leakage, information leakage, and unreliability

Inactive Publication Date: 2020-06-05
吴德松
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] When smart mobile terminals access public cloud or private cloud servers, unreliable access will inevitably bring security risks or security problems, leading to information leakage or leakage, bringing unnecessary losses to companies or individuals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The technical solution of the present invention is described in detail below for easy understanding.

[0021] A remote identity authentication method comprising:

[0022] The electronic cryptographic device signs the information to be signed, and sends the signed data obtained by signing to the terminal;

[0023] The terminal sends an access link authentication request to the cloud server;

[0024] After the cloud server receives the access link authentication request from the incoming terminal, after comparing the identity and password attributes of the terminal to confirm that it is a legal access, it returns an access link authentication response, allowing both parties to establish a link connection;

[0025] The terminal sends an identity verification request to the cloud server, wherein the identity verification request carries the signature data and the ID card information of the user;

[0026] The cloud server receives the identity verification request, and ver...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a remote identity authentication method, which comprises the following steps that: a cloud server firstly determines the legality of a terminal, and then judges whether the stored identity card information of a user is matched with the identity card information carried in an identity authentication request sent by the terminal or the identity card information in to-be-signed information, so that the identity authentication security of the user is improved.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to a remote identity authentication method. Background technique [0002] With the increasing popularity of smart wireless mobile terminals based on Apple IOS systems (Iphone, Ipad, MACbook) and Android systems, the demand for smart mobile terminals to access public cloud servers and private cloud servers is becoming more and more urgent. [0003] When smart mobile terminals access public cloud or private cloud servers, unreliable access will inevitably bring security risks or security issues, leading to information leakage or leakage, and unnecessary losses to companies or individuals. [0004] In view of this, the present invention is proposed. Contents of the invention [0005] The purpose of the present invention is to provide a new remote identity authentication method to overcome the above-mentioned deficiencies. [0006] In order to achieve the above objec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3247H04L63/08H04L63/0861H04L63/0876
Inventor 不公告发明人
Owner 吴德松
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products