Identity authentication method and its identity authentication system
An identity authentication and algorithm technology, applied in the field of identity authentication system, can solve the problems of right holder infringement, loss, password user password leakage, etc., and achieve the effect of reducing the probability of illegal theft, improving security and the effectiveness of authentication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] The present invention will be described in further detail below through specific embodiments and in conjunction with the accompanying drawings.
[0021] like figure 1 , figure 2 As shown, the method and system of the present invention in web-based applications:
[0022] The functions of the data processing device and the random code generating device are realized by a server system for network identity authentication, such as a server equipped with server systems such as Windows Server and Unix. Its function is to generate a random password after receiving the application request and transmit the random password to the personal computer terminal through the public data network, and then the computer terminal will use the input code of the random password and the identity authentication fixed password through the preset algorithm operation or directly send the random password and the fixed password for identity authentication are transmitted back to the server, and th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 