Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, system, medium and equipment for identity authentication through code scanning

A technology of identity authentication and user identity authentication, applied in the direction of digital data authentication, electromagnetic radiation induction, etc., can solve the problems of incompatibility, increase investment cost, increase the difficulty of implementation, etc., to increase the use scene, improve the difficulty of use, and broaden the application range effect

Pending Publication Date: 2022-04-12
BEIJING HAITAI FANGYUAN HIGH TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the existing code-scanning identity authentication scheme, the two-dimensional code is generated by adding URL (Uniform Resource Locator, Uniform Resource Locator) on the basis of random numbers, so that the server must increase the processing of the URL. For scenarios where traditional identity authentication exists, it will inevitably involve modification of the server side to be applicable to this type of code scanning authentication method, which inevitably increases investment costs and increases the difficulty of implementation, and is not compatible with traditional identity authentication schemes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system, medium and equipment for identity authentication through code scanning
  • Method, system, medium and equipment for identity authentication through code scanning
  • Method, system, medium and equipment for identity authentication through code scanning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the technical solutions and advantages in the embodiments of the present application clearer, the exemplary embodiments of the present application will be further described in detail below in conjunction with the accompanying drawings. Apparently, the described embodiments are only part of the embodiments of the present application, and Not an exhaustive list of all embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0030] As introduced in the background technology, the existing code-scanning authentication method needs to be modified on the server end, which increases the difficulty of implementation, and is incompatible with traditional identity authentication methods, and has a small scope of application.

[0031] In view of the above problems, the present invention provides a method, client, system, medium and equipment fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for performing identity authentication through code scanning, the method is applied to a client which runs an application for providing service for an authenticated user based on identity authentication and has a display function, and the method comprises the following steps: generating an authentication identifier related to user identity authentication in response to a demand of the user for obtaining the application service; generating a two-dimensional code for performing identity authentication on the user according to the authentication identifier related to the user identity authentication and the IP address of the client where the application is located; displaying a two-dimensional code for performing identity authentication on the user to the user, and indicating the user to scan the two-dimensional code and perform authentication signature by using the signature private key; and verifying the authentication signature of the user to realize identity authentication of the user. By adopting the method for realizing the code scanning identity authentication, the server does not need to be transformed, the use difficulty of a code scanning mode is not improved, the use scene of the code scanning identity authentication is enlarged, the method can be compatible with a traditional identity authentication method, and the application range is greatly widened.

Description

technical field [0001] The present invention relates to the field of information security, specifically, to the technical field of identity authentication in information security, and more specifically, to a method, system, medium and equipment for identity authentication by scanning codes. Background technique [0002] For information security, identity authentication is required in many application service fields. In traditional identity authentication, a random number generated by the server for identity authentication is sent to the client, and the client uses its own signature private key to verify the random number. Sign and send the signature and user ID to the server for authentication. With the development of technology, for some specific scenarios, based on the consideration of ease of use and security, the way of scanning codes (mainly scanning QR codes) will be used for identity authentication. [0003] However, in the existing code-scanning identity authenticat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36G06F21/44G06K7/14
Inventor 安晓江蒋红宇胡伯良
Owner BEIJING HAITAI FANGYUAN HIGH TECH