User identity authentication method, device and equipment and storage medium

A technology of user identity authentication and user name, which is applied in user identity authentication methods, equipment and storage media, and device fields, and can solve problems such as increasing costs

Active Publication Date: 2021-04-09
BIGO TECH PTE LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The user biometric authentication method has a high degree of user friendliness, and its security is between user password authentication and user digital signature authentication, but additional hardware sensors are required, and a secure channel needs to be established between the hardware sensor and the computing system. Template information storage must be secured, which increases costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication method, device and equipment and storage medium
  • User identity authentication method, device and equipment and storage medium
  • User identity authentication method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The embodiments of the present invention will be further described in detail below in conjunction with the drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the embodiments of the present invention, rather than to limit the embodiments of the present invention. In addition, it should be noted that, for the convenience of description, the drawings only show some but not all structures related to the embodiments of the present invention.

[0047] figure 1 It is a flow chart of a user identity authentication method provided by the embodiment of the present invention. This embodiment is applicable to user identity authentication, and the method can be executed by a user identity authentication device, such as a client such as a mobile phone, a notebook, or a desktop computer. Specifically, Including the following steps:

[0048] Step S101, obtaining the input user name, and sending an authentication req...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a user identity authentication method, device and equipment and a storage medium, and the method comprises the steps: obtaining an input user name, and sending an authentication request to a server; receiving feedback information sent by the server side; reading locally stored authentication data associated with the user name; obtaining an input user password, calculating and generating a symmetric key according to the user name, the random number and the user password, and decrypting the ciphertext information through the symmetric key to obtain a signature private key; and calculating the user name, the hash value and the signature value of the feedback information through the signature private key, and sending the user name, the hash value and the signature value of the feedback information to the server. In the scheme, the eavesdropping attack, the replay attack and the dictionary attack of the user password can be effectively prevented, no extra hardware equipment is added, and the cost overhead is reduced.

Description

technical field [0001] The embodiments of the present application relate to the technical field of identity authentication, and in particular, to a user identity authentication method, device, device, and storage medium. Background technique [0002] Identity verification, also known as "verification" and "authentication", refers to the confirmation of the user's identity through certain means. At present, the main user identity authentication methods can be classified into three categories: user password authentication, user digital signature authentication, and user biometric (such as fingerprint, face, etc.) authentication. [0003] Among them, user password authentication is the most widely used login authentication method. The user first registers his user name and selected password on the server, and the server persistently stores the user name and password, and the password is often stored in an encrypted form. When the user performs password authentication to log i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/08H04L63/083H04L63/0442H04L9/3247H04L9/3226
Inventor 李岩
Owner BIGO TECH PTE LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products