Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identity authentication device and method thereof

An identity authentication device and identity authentication technology, applied in the field of identity authentication devices, can solve the problems of not reflecting the real identity of users, waste of resources, damage to public safety, etc., and achieve the effects of ensuring safety, solving waste, and ensuring safety.

Inactive Publication Date: 2012-11-07
WWTT TECH CHINA
View PDF6 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Current social network platforms can store user information such as user names, passwords, pictures, addresses, ID numbers, emails, etc. However, these information cannot reflect the real identity of users
[0003] Network users can create an unlimited number of network accounts. Many users often create multiple different accounts repeatedly because they forget their usernames or passwords, resulting in a waste of resources.
[0004] At the same time, this will not only lead to waste of resources, but also may cause damage to public safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication device and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0032] A method for identity authentication, which includes the following steps:

[0033] A) Registration phase:

[0034] Extract the user's fingerprint through the collection and identification device of the fingerprint sensor, and generate a pair of corresponding public key and private key;

[0035] Store the private key in the memory of the fingerprint sensor;

[0036] Send the public key to the identity authentication server through the host, and store the public key in the identity authentication server while generating a new registered user;

[0037] Send a confirmation message encrypted by the private key;

[0038] Use the public key to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An identity authentication device comprises a client and a background. The client comprises a plurality of terminal devices and fingerprint sensors connected with the terminal device in interaction mode. Each fingerprint sensor comprises a collection recognition device used collecting fingerprint information and a storage used for storing fingerprint information and user information of corresponding users of the fingerprint information. The background comprises an identity authentication server in interaction connection with the terminal devices and a plurality of application servers in interaction connection with the identity authentication device. The terminal devices are used for registering or determining the fingerprint information received by the finger sensor to recognize user identity and transferring registering or determining results to the identity authentication server at the background, and the identity authentication device determines the authority limit on the plurality of application servers of users according to the results.

Description

technical field [0001] The invention relates to an identity authentication device and an identity authentication method. Background technique [0002] Current social network platforms can store user information such as user names, passwords, pictures, addresses, ID numbers, emails, etc. However, these information cannot reflect the real identity of users. [0003] Network users can create an unlimited number of network accounts, and many users often create multiple different accounts repeatedly because they forget their usernames or passwords, resulting in a waste of resources. [0004] At the same time, this will not only lead to waste of resources, but also may cause damage to public safety. For example, some Internet users may use different identity information to create multiple false accounts to provide pornographic services or defraud property. Contents of the invention [0005] The object of the present invention is to provide an identity authentication device and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06G06K9/00
CPCH04L9/3231G06F21/32H04L63/0838H04L63/0861
Inventor 王国芳程佩仪
Owner WWTT TECH CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products