Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and device, equipment, storage medium and computer program product

A computer program and identity authentication technology, which is applied in the computer field, can solve problems such as information leakage and insufficient security of identity authentication, and achieve the effect of improving security

Pending Publication Date: 2022-02-18
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, traditional authentication methods usually use user name and password for authentication, or SMS verification code authentication, etc., but this authentication method may have the risk of information leakage, and there is a problem that the security of identity authentication is not high enough.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device, equipment, storage medium and computer program product
  • Identity authentication method and device, equipment, storage medium and computer program product
  • Identity authentication method and device, equipment, storage medium and computer program product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0063] The identity authentication method provided by the embodiment of this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 communicates with the server 104 through a network, and the terminal 102 communicates with the hardware authentication device 106 through a communication link. The data storage system can store data that needs to be processed by the server 104 . The data storage system can be integrated on the server 104, or placed on the cloud or other network servers. Specifically, the terminal and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication method and device, equipment, a storage medium and a computer program product for use in the field of information security. The method comprises the following steps: in response to an identity authentication operation, initiating an identity authentication request to a server; receiving first random information fed back by the server in response to the identity authentication request, and encrypting the first random information based on a terminal encryption key provided in a card simulation mode to obtain a first ciphertext; transmitting the first ciphertext to hardware authentication equipment through a communication link, so as to enable the hardware authentication equipment to encrypt the first ciphertext based on the hardware encryption key to obtain a second ciphertext; receiving the second ciphertext fed back by the hardware authentication equipment through the communication link; and sending the second ciphertext to the server, so as to enable the server to decrypt the second ciphertext according to a terminal decryption key corresponding to the terminal encryption key and a hardware decryption key corresponding to the hardware encryption key, and determining an identity authentication result based on a decryption result. By adopting the method, the security of identity authentication can be improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to an identity authentication method, device, computer equipment, storage medium and computer program product. Background technique [0002] With the rapid development of the mobile Internet, people use mobile terminals in more and more scenarios, such as payment, business operations, or authorized operations through mobile payment. In these different usage scenarios, more and more terminal applications have high security authentication requirements. [0003] At present, traditional authentication methods usually use user name and password for authentication, or SMS verification code authentication, etc., but this authentication method may have the risk of information leakage, and there is a problem that the security of identity authentication is not high enough. Contents of the invention [0004] Based on this, it is necessary to provide an identity authentication me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/08G06F21/60
CPCH04L63/08H04L63/083H04L9/0869G06F21/602
Inventor 张腾宇刘一佟秦乐天李虹位刘静龚承敏
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products