Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method, device and equipment and computer storage medium

An authentication and weight value technology, which is applied in the field of network security, can solve problems such as the accuracy and completeness of authorization results, the restriction of update frequency, and the lack of self-updating ability of the behavior standard library, so as to improve the accuracy and flexibility of authentication. Accurate results, comprehensive feature analysis and accurate results

Active Publication Date: 2021-01-29
CHINA MOBILE GROUP ANHUI +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the behavior standard library stored in the user terminal does not have the ability to update itself, and the accuracy of authorization results is restricted by factors such as the completeness of the behavior standard library and the update frequency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and equipment and computer storage medium
  • Authentication method, device and equipment and computer storage medium
  • Authentication method, device and equipment and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present invention and to fully convey the scope of the present invention to those skilled in the art.

[0030] The embodiment of the present invention relates to an authentication method, such as figure 1 As shown in , it is a schematic diagram of the usage scenario of the method. During the authentication process, when the application client, that is, the user's mobile terminal, accesses the mobile application software / webpage, the application client will first send an authentication request to the authentication center, and then the authenticat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to the technical field of network security, and discloses an authentication method, device and equipment and a computer storage medium. The method comprises steps: periodically acquiring dynamic information of the user; generating and periodically updating feature attributes of the user according to the static information and the dynamic information; and authenticating the user according to the feature attribute and preset authority rule configuration. According to the embodiment of the invention, the authentication process can be more accurate and flexible.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of network security, in particular to an authentication method, device, equipment and computer storage medium. Background technique [0002] With the development of mobile communication technology and mobile terminal technology, a large number of mobile phone application software has also begun to be developed and put into the application market, and the security of mobile phone application software has gradually been paid attention to. Therefore, a scientific and reasonable supervisory mechanism is needed to control the use of mobile application software to authenticate users and determine whether users can use the mobile application software, thereby protecting the interests of both users and developers of mobile application software. [0003] In the process of realizing the embodiment of the present invention, the inventor found that: the authentication method disclosed in the pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/021H04W4/029H04W12/37H04W12/06H04W12/084
CPCH04W4/021H04W4/029H04W12/08
Inventor 修彬赵宁韩丽丽李波王景娴
Owner CHINA MOBILE GROUP ANHUI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products