Method and system for realizing agent certification based on identity authentication mode including random information

A technology of identity authentication and random information, which is applied in the field of information systems, can solve the problem that the user authentication mode cannot realize proxy authentication, etc., and achieve the effect of reducing manual input operations and strengthening security

Inactive Publication Date: 2008-04-30
许先才
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The present invention aims at the problem that the user authentication mode containing random information cannot realize proxy authentication, proposes a new reasonable technical implementation scheme, and realizes the proxy authentication function for the user authentication mode containing random information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing agent certification based on identity authentication mode including random information
  • Method and system for realizing agent certification based on identity authentication mode including random information
  • Method and system for realizing agent certification based on identity authentication mode including random information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Below in conjunction with the best embodiment shown in the accompanying drawings, it will be further described in detail.

[0039] Such as Figures 1 to 5 As shown, the method and system of the present invention realize proxy authentication for the user authentication mode containing random information, the identity authentication mode containing random information refers to an identity authentication mode, and the information used to identify the user identity includes the constant Parts of authentication information such as account numbers and passwords, and parts that change every time authentication: usually auxiliary authentication information related to a group of random numbers or characters; the system includes programs that run on general-purpose computing devices, and is characterized in that , the steps to implement proxy authentication include:

[0040] a The user submits the authentication scenario that needs to implement proxy authentication to the progra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a system to realize agent authentication aiming to an identity authentication mode including random information. The identity authentication mode including the random information is to authenticate user's identity information including a changeless part such as the account, the password and other changeable information during each authentication process. The system comprises a program operated in general computing devices. The agent authentication steps comprise that: a user starts an authentication flow, and the program picks up the random information relevant to the authentication and gives prompt to the user; the user inputs the assisted authentication information in accordance with the program prompt; the program submits the pre-stored authentication information and the assisted information of the authentication process to a corresponding authentication scene, and the authentication is then completed. The method and the system can significantly reduce the manual input operation in the authentication process and enhance the security of the authentication process.

Description

technical field [0001] The invention relates to information systems, in particular to agent authentication of information systems. Background technique [0002] For security and management reasons, current information systems generally involve user authentication to ensure that non-system users have no right to use system resources, or to allow different users to have different access rights after logging into the system. At present, most information systems, especially online service systems, mostly use account passwords to authenticate users. The process is generally that the user registers in advance and sets the account and password required to access the system; when the service provided by the system needs to be used, the user enters the user login interface, and the user enters the account password and other authentication information to complete the identity authentication , so as to have the authority to access the information system to obtain services. [0003] H...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/18G06F21/00H04L12/28G06F21/40
Inventor 许先才
Owner 许先才
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products