Dynamic identity authentication method and device, server and storage medium

A technology for identity authentication and identity authentication results, which is applied in the fields of dynamic identity authentication methods, servers and storage media, and devices, and can solve the problems of complex terminals and unsuitable authentication.

Active Publication Date: 2021-04-13
北京指掌易科技有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the simple user password authentication mechanism currently on the market, the more complicated one triggers account or IP lockout policies based on the number of user access failures, etc.
[0004] But these are usually fixed policies. After zero trust is widely concerned and introduced, the visitors at the access entrance can be other illegal users such as other hacking software besides users, and the terminals accessed are becoming more and more complex.
Traditional certification obviously cannot meet the requirements of the current complex use environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic identity authentication method and device, server and storage medium
  • Dynamic identity authentication method and device, server and storage medium
  • Dynamic identity authentication method and device, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] figure 1 It is a flow chart of a dynamic identity authentication method provided by Embodiment 1 of the present invention. This embodiment can be applied to perform identity authentication on the obtained login behavior, and judge whether to allow login according to the identity authentication result. This method can be implemented by dynamic The identity authentication device can be implemented by means of software and / or hardware. The device can be configured in the server. Such as figure 1 As shown, the method includes:

[0029] Step S110, obtain the user agent information in the identity authentication request corresponding to the login behavior, obtain the trust score and weight value corresponding to the user agent information, and calculate the total score of the identity authentication request according to each trust score and the corresponding weight value.

[0030] The login behavior may be a behavior generated based on a user account logging into the appli...

Embodiment 2

[0051] figure 2 It is a flow chart of another dynamic identity authentication method provided by Embodiment 2 of the present invention. This embodiment is optimized on the basis of the above embodiments, as shown in figure 2 As shown, the method includes:

[0052] Step S201. Obtain the user agent information in the identity authentication request corresponding to the login behavior, obtain the trust score and weight value corresponding to the user agent information, and calculate the total score of the identity authentication request according to each trust score and the corresponding weight value.

[0053] Wherein, the user agent information is determined based on login information and application attribute information.

[0054] Step S202, determine whether the total score is lower than the trust threshold, if yes, execute step S203, otherwise, execute step S204.

[0055] Step S203, determining that the identity authentication result of the login behavior is that the iden...

Embodiment 3

[0103] image 3 It is a schematic structural diagram of a dynamic identity authentication device provided by Embodiment 3 of the present invention. The device can be implemented by software and / or hardware, and generally can be integrated in a server, and can implement dynamic identity authentication for login behavior by implementing a dynamic identity authentication method, thereby improving the security of identity authentication. Such as image 3 As shown, the device includes:

[0104] The score calculation module 310 is configured to obtain user agent information in the identity authentication request corresponding to the login behavior, obtain trust scores and weight values ​​corresponding to the user agent information, and calculate the described trust scores and corresponding weight values ​​according to each of the trust scores and corresponding weight values. A total score of identity authentication requests, wherein the user agent information is determined based o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a dynamic identity authentication method and device, a server and a storage medium. The method comprises the steps of obtaining user agent information in an identity authentication request corresponding to a login behavior, obtaining corresponding trust scores and weight values, and calculating a total score of the identity authentication request; if the total score is lower than a trust threshold, triggering an authentication mode corresponding to a score segment to which the total score belongs; updating the trust score of each dimension in the user agent information according to the authentication result and a preset score adjustment model, and recalculating the total score according to each adjusted trust score and the corresponding weight value, wherein the score adjustment model is used for indicating configuration information for adjusting the trust score of each dimension in the user agent information according to the authentication result; and determining an identity authentication result of the login behavior according to a comparison result of the recalculated total score and the trust threshold and the authentication result. According to the embodiment of the invention, dynamic identity authentication is carried out on the login behavior, so that the security of identity authentication is improved.

Description

technical field [0001] The embodiment of the present invention relates to identity authentication technology, and in particular to a dynamic identity authentication method, device, server and storage medium. Background technique [0002] All software systems are inseparable from identity authentication, and identity authentication needs to take into account both security and convenience. To a certain extent, this puts forward higher requirements for identity authentication. [0003] The traditional authentication system adopts the mechanism of strong factor authentication (such as face) or multi-factor authentication, and the information security level protection system also clearly requires the use of two or more combinations of passwords, cryptography, biometrics and other authentication technologies to identify users. authentication, and at least one of the authentication techniques shall be implemented using cryptographic techniques. For example, the simple user passwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W4/14
CPCH04L63/08H04L63/083H04L63/0838H04L63/0861H04L63/18H04W4/14
Inventor 桂艳峰王伟
Owner 北京指掌易科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products