Identity authentication method adopting multiple authentication, identity verification equipment and identity authentication system

An identity authentication and multi-authentication technology, which is applied in the field of multi-authentication identity authentication methods, identity verification equipment and identity authentication systems, can solve the problems of easy copying or stealing of verification, inconvenient application, low security, etc., and reduce communication The number of applications, the speed of authentication, and the effect of improving security

Pending Publication Date: 2019-02-05
孔德键
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, there are various authentication methods, such as passwords (withdrawal passwords, account login passwords, etc.), biological information (fingerprints, iris, sound waves, vein information, etc.), physical information (keys, smart cards, NFC, etc.) Verification applications; however, password verification is easy to be obtained by others through recording and monitoring, and the security is low; biometric verification may be cracked by simulation and copying, and biometric information is mainly stored by a single department or terminal and applied to different The terminal needs to be repeatedly entered, and the application is inconvenient; the verification of physical information is easy to be copied or stolen, or the application is invalid due to the loss of the corresponding verification tool; in summary, each identity verification method in the prior art has corresponding technical defects , there is a certain risk in the verification method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method adopting multiple authentication, identity verification equipment and identity authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The multi-authentication identity authentication method of the present invention is combined with an identity authentication device to be set and applied in an identity authentication system.

[0046] Specifically, the identity authentication system includes a verification device 10 and a plurality of terminals 20, the verification device includes a biometric module 1 for obtaining external biological information, and a read-only storage unit 2 that records independent physical information. , a temporary storage unit 3, a processing unit 4 and a data transmission module 5; the output end of the biometric identification module 1 is connected to the first input end of the processing unit 4; the output end of the read-only storage unit 2 is connected to the The second input end of the processing unit 4; the first output end of the processing unit 4 is connected to the input end of the temporary storage unit 3, and the second output end of the processing unit 4 is connected ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method adopting multiple authentication, identity verification equipment and an identity authentication system. The identity authentication method adopting multiple authentication effectively provides a convenient, rapid and safe identity authentication mode on the basis of a case that the verification equipment acquires and outputs multiple termsof verification encryption information to each terminal to meet application demands of different authentication decision passing conditions of different terminals. By the setting of not internally arranging a power supply, portability and safety of the identity verification equipment are effectively improved. According to the identity authentication system, by combining application of the identityauthentication method and the identity verification equipment and through a terminal with a multiple authentication mechanism, different safety levels are effectively set and applied according to different application situations, so that when the flexibility requirement of identity authentication is met, the safety requirement of the system is ensured.

Description

technical field [0001] The present invention relates to the technical field of identity authentication, in particular to a multi-authentication identity authentication method, identity authentication equipment and identity authentication system. Background technique [0002] In the prior art, there are various authentication methods, such as passwords (withdrawal passwords, account login passwords, etc.), biological information (fingerprints, iris, sound waves, vein information, etc.), physical information (keys, smart cards, NFC, etc.) Verification applications; however, password verification is easy to be obtained by others through recording and monitoring, and the security is low; biometric verification may be cracked by simulation and copying, and biometric information is mainly stored by a single department or terminal and applied to different The terminal needs to be repeatedly entered, and the application is inconvenient; the verification of physical information is ea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0428H04L63/0823H04L63/083H04L63/0861
Inventor 孔德键
Owner 孔德键
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products