Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and system

An identity authentication and user authentication technology, applied in the field of identity authentication, can solve the problems of inability to verify whether the identity authentication device is the owner, the identity authentication level is low, and the security is low, so as to reduce the risk of being cracked and avoid being hacked. The effect of malicious theft

Pending Publication Date: 2022-06-28
联想长风科技(北京)有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides an identity authentication method and system, which is used to solve the technical problems of low level of identity authentication in the prior art, unable to verify whether the person using the identity authentication device is the owner, and low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system
  • Identity authentication method and system
  • Identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] like figure 1 As shown, the embodiment of the present application provides an identity authentication method, and the method includes:

[0031] Step S100: Obtain user input information and user authentication device information, wherein the user authentication device information has preset verification information;

[0032] Further, the user input information includes fingerprint information and password information.

[0033] Specifically, the user input information is collected according to the verification information set by the user authentication device, including fingerprint information, password information, or other verification information. Among them, fingerprint information is preferred.

[0034] Step S200: judging whether the user input information is the same as the preset verification information;

[0035] Step S300: when the same, obtain first pass information, the first pass information is used to pass the authentication of the user authentication devi...

Embodiment 2

[0063] Based on the same inventive concept as an identity authentication method in the foregoing embodiment, as shown in FIG. 2, the present application provides an identity authentication system, wherein the system includes:

[0064] a first obtaining unit 11, the first obtaining unit 11 is configured to obtain user input information and user authentication device information, wherein the user authentication device information has preset verification information;

[0065] a first judging unit 12, the first judging unit 12 is used to judge whether the user input information is the same as the preset verification information;

[0066] The second obtaining unit 13, the second obtaining unit 13 is configured to obtain first pass information when the same send an authentication request;

[0067] a first sending unit 14, where the first sending unit 14 is configured to send a first authentication request to a server through the user authentication device;

[0068] The first execu...

Embodiment 3

[0094] Based on the same inventive concept as the identity authentication method in the foregoing embodiment, the present application further provides a computer-readable storage medium, where a computer program is stored on the storage medium, and when the computer program is executed by a processor, the The method in Example 1.

[0095] Exemplary Electronics

[0096] Reference below image 3 to describe the electronic device of this application,

[0097] Based on the same inventive concept as the identity authentication method in the foregoing embodiment, the present application further provides an identity authentication system, including: a processor, the processor is coupled with a memory, the memory is used for storing a program, and when all the When the program is executed by the processor, the device is made to execute the steps of the method in the first embodiment.

[0098] The electronic device 300 includes: a processor 302 , a communication interface 303 , and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method and system, and the method comprises the steps: obtaining first passing information for passing the authentication of a user authentication device when user input information is the same as preset verification information, and allowing the user authentication device to send an authentication request to a server; the user authentication device sends a first authentication request to the server; according to the first authentication request, the server obtains a first return authentication fingerprint, the first return authentication fingerprint is any fingerprint information in a user pre-stored fingerprint database, and a first input fingerprint is obtained based on a received verification instruction of the first return authentication fingerprint; if the first input fingerprint is the same as the first return authentication fingerprint, the identity authentication is passed. The technical problems that an existing identity authentication level is low, whether a person using an identity authentication device is an owner or not cannot be verified, and safety is low are solved. The technical effects that the actual user is accurately positioned through multi-password verification and server dynamic fingerprint passwords, and the cracking risk is reduced are achieved.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to an identity authentication method and system. Background technique [0002] With the rapid development of science and technology in modern society, while computers have made great contributions to human beings, computer security is also facing extremely high risks. How to ensure the security of the user's information in the computer, it is necessary to authenticate the user's identity, to ensure that the user authentication device is used by the user, and to avoid being stolen. Currently, when user identity authentication is performed, after the user's identity authentication device is inserted into the computer, the user can directly obtain the corresponding computer operation authority as long as the user passes the authentication. It cannot be confirmed whether the person using the identity authentication device is the owner of the identity authentication devi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 张世豪吴杰融志强
Owner 联想长风科技(北京)有限公司