Identity authentication method, equipment and system
A technology for identity authentication and analysis equipment, applied in the field of information security, can solve the problems of incompatibility between simplicity and security, low cost and security, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0096] Embodiment 1 of the present invention provides an identity authentication method, such as figure 1 As shown, it is a schematic flow chart of the identity authentication method described in Embodiment 1 of the present invention, and the method may include the following steps:
[0097] Step 101: The user feature analysis device receives a user feature query request sent by the server, the user feature query request carries user behavior feature information of the logged-in user, wherein the user feature query request is determined by the server after determining the login user's username and After the password matches the user name and password of the login user reserved in the user name and password database, it is sent to the user characteristic analysis device.
[0098] It should be noted that the user name described in the embodiment of the present invention may be a user name in the traditional sense, that is, the unique identification of the user; the password descr...
Embodiment 2
[0145] Embodiment 2 of the present invention takes the action performer as an example to further describe the identity authentication method described in Embodiment 1 of the present invention, as follows Figure 4 As shown, it is a schematic flow chart of the identity authentication method described in Embodiment 2 of the present invention, and the method may include the following steps:
[0146] Step 401: The server obtains the user name and password of the login user, and obtains the user name and password of the login user after determining that the user name and password of the login user match the user name and password of the login user reserved in the user name and password database. User behavior characteristic information.
[0147] Specifically, after determining that the username and password of the login user match the username and password of the login user reserved in the username and password database, the server may issue a corresponding reminder to the login us...
Embodiment 3
[0161] Embodiment 3 of the present invention takes the action executor as the client as an example to further describe the identity authentication method described in Embodiment 1 of the present invention, as follows Figure 5 As shown, it is a schematic flow chart of the identity authentication method described in Embodiment 3 of the present invention, and the method may include the following steps:
[0162] Step 501: the client sends the user name and password of the login user to the server.
[0163] Specifically, when accessing the system login page, the client may input a corresponding user name and password to the server through the login page.
[0164] It should be noted that the user name described in the embodiment of the present invention may be a user name in the traditional sense, that is, the unique identification of the user; the password described is different from the password in the traditional authentication method, and is usually a simple and easy-to-remembe...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com