Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and device, computer equipment and storage medium

An identity authentication and identity verification technology, applied in the field of network security, can solve the problems of low identity authentication security, low complexity of static passwords, and easy leakage of static passwords, so as to avoid leakage and improve security.

Active Publication Date: 2021-08-17
天津赢达信科技有限公司
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the traditional identity authentication method, due to the low complexity of the static password, the static password is easy to leak after being attacked by "drag database", "crash database", "dictionary blasting", etc. Fake, low identity authentication security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device, computer equipment and storage medium
  • Identity authentication method and device, computer equipment and storage medium
  • Identity authentication method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0079] First of all, before specifically introducing the technical solution of the embodiment of the present application, the technical background or technological evolution context of the embodiment of the present application is firstly introduced. Usually, in the field of network security technology, the current technical background is: when a user logs in to the network, the authentication password used to uniquely authenticate the current user's identity is obtained in any form, resulting in the impersonation of the user's identity, which in turn leads to network safe ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication method and device, computer equipment and a storage medium. The method comprises the following steps: in response to a login request sent by a client, obtaining a static password corresponding to the client; generating a dynamic password according to a preset dynamic password generation strategy; establishing a corresponding relation between the dynamic password and the static password, generating a dynamic password table containing the corresponding relation, wherein the dynamic password table is used for the client to input an identity verification password corresponding to the static password based on the dynamic password table; and receiving an identity authentication password, and performing identity authentication according to the identity authentication password. By adopting the method, the security of identity authentication can be improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to an identity authentication method, device, computer equipment and storage medium. Background technique [0002] In the information world under the network environment, network identity is a kind of identification that is different from other individuals. The authentication of network identity can guarantee the uniqueness of user identification and the security of personal data information. [0003] The traditional identity authentication method is usually that the user stores the user name and static password in the authentication server in the form of registration. When the user logs in, the user enters the static password through the client to initiate user identity authentication. Whether the password is consistent with the pre-stored user name and static password is used to determine whether the user identity is correct. [0004] However, in the traditiona...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
CPCG06F21/64
Inventor 张秋璞彭竹贾小恒
Owner 天津赢达信科技有限公司