CN106534076A - Identity authentication method - Google Patents

Identity authentication method Download PDF

Info

Publication number
CN106534076A
CN106534076A CN201610899914.5A CN201610899914A CN106534076A CN 106534076 A CN106534076 A CN 106534076A CN 201610899914 A CN201610899914 A CN 201610899914A CN 106534076 A CN106534076 A CN 106534076A
Authority
CN
China
Prior art keywords
information
user
proprietary
people
proprietary information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610899914.5A
Other languages
Chinese (zh)
Inventor
李首峰
陈放
孟欣欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guozhengtong Polytron Technologies Inc
Original Assignee
Guozhengtong Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guozhengtong Polytron Technologies Inc filed Critical Guozhengtong Polytron Technologies Inc
Priority to CN201610899914.5A priority Critical patent/CN106534076A/en
Publication of CN106534076A publication Critical patent/CN106534076A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/302Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information gathering intelligence information for situation awareness or reconnaissance

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Evolutionary Computation (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides an identity authentication method. The identity authentication method includes the steps: step 101, a user uses first authentication information to log in; step 103, prompting the user to input first personal proprietary information to carry out authentication; and step 105, according to the operation of the user, carrying out the corresponding action. The identity authentication method can provide relatively more real user information for a department which needs personal identity information, thus being able to track the user who uses the related system more easily, and providing guarantee for preventing various telecommunication and financial fraud.

Description

A kind of identity authentication method
Technical field
The present invention relates to data authentication field, more particularly to a kind of identity authentication method.
Background technology
Today's society swindles row, and especially in recent years, telecommunication fraud is occurred frequently, and these swindle molecules are often hided in darkness Place, it is very difficult to find. it also is difficult to collect their evidence of crime.Every kind of Verification System, has respective Data Source simultaneously.And Do not have intercommunication between each Data Source.Even if so certification passes through in the system of a certain type, in other systems not Can the certification user verity.In order to effectively hit these crimes, it would be desirable to there is a kind of effective method to come to user It is authenticated.
The content of the invention
The purpose of the present invention is achieved through the following technical solutions.
The present invention proposes a kind of identity authentication method, and which includes:
Step 101, user are logged in using the first authentication information;
Step 103, prompting user input first man proprietary information are authenticated;
Step 105, corresponding actions are carried out according to user operation.
Wherein, first authentication information is user's registration information, and which at least includes username and password.
Wherein, also registered using the first authentication information including user before the step 101.
Wherein, the first man proprietary information is the exclusive personal information that professional institution is user's distribution, and which includes body Part card number, cell-phone number, degree's diploma number, educational background card number, Bank Account Number, social security account or one of account of managing money matters.
Wherein, the step 105 also includes:If user is not input into first man proprietary information and is authenticated, do not allow User uses system.
Wherein, the step 105 also includes:If the first proprietary information of user input is authenticated, inquiry user is Second people's proprietary information of no input.
Wherein, if second people's proprietary information of user input, by the first man proprietary information with described second People's proprietary information is associated, and searches for all related to the first man proprietary information and second people's proprietary information Other people's proprietary informations, and will be these people's proprietary informations associated with each other.
Wherein, if user is not input into second people's proprietary information, search for all related to first man proprietary information Other people's proprietary informations, and will be these people's proprietary informations associated with each other.
Wherein, after personal proprietary information each other is associated with each other, once receiving any one personal proprietary information, then adjust Take related information to be authenticated the verity of user.
By the authentication method of the present invention, more can really use to need the department using personally identifiable information to provide Family information, is so easier to track the user using related system, and the swindle to prevent various telecommunications, financial class provides guarantor Barrier.
Description of the drawings
By the detailed description for reading hereafter preferred implementation, various other advantages and benefit are common for this area Technical staff will be clear from understanding.Accompanying drawing is only used for the purpose for illustrating preferred implementation, and is not considered as to the present invention Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
The flow chart that accompanying drawing 1 shows a kind of authentication method according to embodiment of the present invention.
Specific embodiment
The illustrative embodiments of the disclosure are more fully described below with reference to accompanying drawings.Although showing in accompanying drawing public The illustrative embodiments opened, it being understood, however, that may be realized in various forms the disclosure and the reality that should not be illustrated here The mode of applying is limited.On the contrary, there is provided these embodiments are able to be best understood from the disclosure, and can be by this public affairs What the scope opened was complete conveys to those skilled in the art.
According to the embodiment of the present invention, a kind of identity authentication method is proposed, as shown in Figure 1, which includes:
Step 101, user are logged in using the first authentication information.
Wherein, also registered using the first authentication information including user before the step 101.
The registration process of user is as the registration of general system or website.Using the unique user of the internal system Name, and the password known to user registered.Can also be tested using the mode of image, the identifying code of figure if desired Card.
Wherein, first authentication information is user's registration information, and which at least includes username and password.
Wherein, the first man proprietary information is the exclusive personal information that professional institution is user's distribution, and which includes body Part card number, cell-phone number, degree's diploma number, educational background card number, Bank Account Number, social security account or one of account of managing money matters.
These people's proprietary informations are usually government organs, financial institution, educational institution to the personal certificate provided, account Etc. information.For example, to the personal identity card provided, there are identification card number in government organs, mainly public security department, in addition thereon There are the information such as certificates handling mechanism, address, these information can also be verified as personal proprietary information.Information can be encrypted, The form of unique binary code can also be converted into.
The account of financial institution just compares many.For example, bank has Bank Account Number, social security account, the information of work unit, And the information of the account of dealing etc..Security organization just has the financing account of individual, information of stock etc..
The personal information of educational institution, typically educational background card, the card information of degree's diploma.
In addition, generally cell-phone number is also and identity card hook.Therefore, if it is known that cell-phone number, corresponding its identity Card number also can be by what internal system information was called.
Step 103, prompting user input first man proprietary information are authenticated.
Generally, the mode for pointing out user input is the optional form of user carrying out.User can select input, it is also possible to Selection is not input into.According to the different choice of user, into different processing modes.
Step 105, corresponding actions are carried out according to user operation.
Wherein, the step 105 also includes:If user is not input into first man proprietary information and is authenticated, do not allow User uses system.
This is in order at the protection to system, if user is not input into one of personal proprietary information, just not allowing user to use should System.Because if not being input into, system still can be used, it is then unfair for the user that those have input personal proprietary information .Of course for the popularization of system, and it is also possible to not being input into user's open portion function of personal proprietary information.
Wherein, the step 105 also includes:If the first proprietary information of user input is authenticated, inquiry user is Second people's proprietary information of no input.
The purpose of inquiry second people's proprietary information of user input is to be more accurately located user.That is know The personal proprietary information of user is more, then the information of the user is clearer.Just as draw portrait it is the same, it is known that feature get over It is many, then the people for drawing just more like.So know that the personal proprietary information of user is more, then it is accurate when verifying to user Degree is higher.So in verification process, the personal information for obtaining user is more, then for user, may be safer.
Wherein, if second people's proprietary information of user input, by the first man proprietary information with described second People's proprietary information is associated, and searches for all related to the first man proprietary information and second people's proprietary information Other people's proprietary informations, and will be these people's proprietary informations associated with each other.
Wherein, if user is not input into second people's proprietary information, search for all related to first man proprietary information Other people's proprietary informations, and will be these people's proprietary informations associated with each other.
Wherein, after personal proprietary information each other is associated with each other, once receiving any one personal proprietary information, then adjust Take related information to be authenticated the verity of user.
The association of information, is not simple association, is the association based on big data.For example, when user uses a certain When bank card is consumed, then use when obtaining the subscriber identity information related to the bank card, such as user's application bank card Identity card, on the certificate such as officer's identity card such as, the information such as identification card number, officer's identity card number.By the identification card number, officer's identity card Number, obtain it is all with the officer's identity card number, identification card number be according to handle bank card, cell-phone number, then by these cell-phone numbers, Bank's card number, can obtain the scope of your current consumption and activity, and can determine that its financial field, education sector, medical field Related identification information.
Equally, the data mining of relatedness as above when user sees a doctor, during using social security card, can similarly be made.
The above, the only present invention preferably specific embodiment, but protection scope of the present invention is not limited thereto, Any those familiar with the art the invention discloses technical scope in, the change or replacement that can be readily occurred in, Should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of the claim Enclose and be defined.

Claims (9)

1. a kind of identity authentication method, which includes:
Step 101, user are logged in using the first authentication information;
Step 103, prompting user input first man proprietary information are authenticated;
Step 105, corresponding actions are carried out according to user operation.
2. as claimed in claim 1 a kind of identity identifying method, wherein first authentication information is user's registration information, which is extremely Include username and password less.
3. as claimed in claim 1 a kind of identity identifying method, wherein also using first including user before the step 101 Authentication information is registered.
4. as claimed in claim 1 a kind of identity identifying method, wherein the first man proprietary information is use for professional institution The exclusive personal information of family distribution, which includes identification card number, cell-phone number, degree's diploma number, educational background card number, Bank Account Number, social security account Number or financing one of account.
5. as claimed in claim 1 a kind of identity identifying method, wherein the step 105 also includes:If user is not input into first Personal proprietary information is authenticated, then do not allow user to use system.
6. as claimed in claim 1 a kind of identity identifying method, wherein the step 105 also includes:If user input is the first Proprietary information is authenticated, then ask the user whether to be input into second people's proprietary information.
7. as claimed in claim 6 a kind of identity identifying method, if wherein second people's proprietary information of user input, will be described First man proprietary information is associated with second people's proprietary information, and searches for all with the exclusive letter of the first man Breath other people proprietary informations related to second people's proprietary information, and will be these people's proprietary informations associated with each other.
8. as claimed in claim 6 a kind of identity identifying method, if wherein user is not input into second people's proprietary information, searching for All other people proprietary informations related to first man proprietary information, and will be these people's proprietary informations associated with each other.
9. a kind of identity identifying method as described in claim 7 or 8, wherein after personal proprietary information each other is associated with each other, Once receiving any one personal proprietary information, then transfer related information and the verity of user is authenticated.
CN201610899914.5A 2016-10-14 2016-10-14 Identity authentication method Pending CN106534076A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610899914.5A CN106534076A (en) 2016-10-14 2016-10-14 Identity authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610899914.5A CN106534076A (en) 2016-10-14 2016-10-14 Identity authentication method

Publications (1)

Publication Number Publication Date
CN106534076A true CN106534076A (en) 2017-03-22

Family

ID=58331948

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610899914.5A Pending CN106534076A (en) 2016-10-14 2016-10-14 Identity authentication method

Country Status (1)

Country Link
CN (1) CN106534076A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101599832A (en) * 2008-06-05 2009-12-09 北京思创银联科技有限公司 A kind of personal identification method and system that realize the network system login
CN103327490A (en) * 2013-07-02 2013-09-25 中国农业银行股份有限公司四川省分行 Business outlet Internet WIFI access system and method thereof
CN104392368A (en) * 2014-10-21 2015-03-04 中国建设银行股份有限公司 Method and device for user system management in e-commerce platform
CN104717073A (en) * 2015-03-19 2015-06-17 张文 Personal information sharing, personal information sharing method and identity authentication method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101599832A (en) * 2008-06-05 2009-12-09 北京思创银联科技有限公司 A kind of personal identification method and system that realize the network system login
CN103327490A (en) * 2013-07-02 2013-09-25 中国农业银行股份有限公司四川省分行 Business outlet Internet WIFI access system and method thereof
CN104392368A (en) * 2014-10-21 2015-03-04 中国建设银行股份有限公司 Method and device for user system management in e-commerce platform
CN104717073A (en) * 2015-03-19 2015-06-17 张文 Personal information sharing, personal information sharing method and identity authentication method

Similar Documents

Publication Publication Date Title
US20230129693A1 (en) Transaction authentication and verification using text messages and a distributed ledger
US10749681B2 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
US20180253539A1 (en) Robust system and method of authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates.
US12050676B2 (en) Digital identity authentication and verification system, method, and device
US9202083B2 (en) Systems and methods for verifying uniqueness in anonymous authentication
US8468355B2 (en) Multi-dimensional credentialing using veiled certificates
US7690032B1 (en) Method and system for confirming the identity of a user
US20070175986A1 (en) System and method for nameless biometric authentication and non-repudiation validation
KR102360386B1 (en) A system, method and server computer system for transforming an original entity into a verifiable and verifiable entity in a heterogeneous communication network environment
US11562349B2 (en) Risk mitigation for a cryptoasset custodial system using data points from multiple mobile devices
US20060010487A1 (en) System and method of verifying personal identities
US20210365584A1 (en) Portable reputation brokering using linked blockchains and shared events
CN108140152A (en) Computer implemented tracking mechanism and data management
US20160328815A1 (en) Multimodal biometric profiling
WO2019209291A1 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
KR20230126220A (en) Methods and systems for obtaining, controlling, accessing and/or displaying personal genetic identification information
CN112785410A (en) Relying party risk adjustment indicator systems and methods
Blue et al. A review of identity, identification and authentication
CN108234126A (en) For the system and method remotely opened an account
Gasson et al. D3. 2: A study on PKI and biometrics
CN106534076A (en) Identity authentication method
Nair et al. Multibiometric cryptosystem based on decision level fusion for file uploading in cloud
US20130275753A1 (en) System and method for verifying credentials
US11468525B2 (en) Coordination platform for generating and managing authority tokens
De Andrade et al. Electronic Identity

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170322

RJ01 Rejection of invention patent application after publication