CN106534076A - Identity authentication method - Google Patents
Identity authentication method Download PDFInfo
- Publication number
- CN106534076A CN106534076A CN201610899914.5A CN201610899914A CN106534076A CN 106534076 A CN106534076 A CN 106534076A CN 201610899914 A CN201610899914 A CN 201610899914A CN 106534076 A CN106534076 A CN 106534076A
- Authority
- CN
- China
- Prior art keywords
- information
- user
- proprietary
- people
- proprietary information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/302—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information gathering intelligence information for situation awareness or reconnaissance
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Evolutionary Computation (AREA)
- Technology Law (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention provides an identity authentication method. The identity authentication method includes the steps: step 101, a user uses first authentication information to log in; step 103, prompting the user to input first personal proprietary information to carry out authentication; and step 105, according to the operation of the user, carrying out the corresponding action. The identity authentication method can provide relatively more real user information for a department which needs personal identity information, thus being able to track the user who uses the related system more easily, and providing guarantee for preventing various telecommunication and financial fraud.
Description
Technical field
The present invention relates to data authentication field, more particularly to a kind of identity authentication method.
Background technology
Today's society swindles row, and especially in recent years, telecommunication fraud is occurred frequently, and these swindle molecules are often hided in darkness
Place, it is very difficult to find. it also is difficult to collect their evidence of crime.Every kind of Verification System, has respective Data Source simultaneously.And
Do not have intercommunication between each Data Source.Even if so certification passes through in the system of a certain type, in other systems not
Can the certification user verity.In order to effectively hit these crimes, it would be desirable to there is a kind of effective method to come to user
It is authenticated.
The content of the invention
The purpose of the present invention is achieved through the following technical solutions.
The present invention proposes a kind of identity authentication method, and which includes:
Step 101, user are logged in using the first authentication information;
Step 103, prompting user input first man proprietary information are authenticated;
Step 105, corresponding actions are carried out according to user operation.
Wherein, first authentication information is user's registration information, and which at least includes username and password.
Wherein, also registered using the first authentication information including user before the step 101.
Wherein, the first man proprietary information is the exclusive personal information that professional institution is user's distribution, and which includes body
Part card number, cell-phone number, degree's diploma number, educational background card number, Bank Account Number, social security account or one of account of managing money matters.
Wherein, the step 105 also includes:If user is not input into first man proprietary information and is authenticated, do not allow
User uses system.
Wherein, the step 105 also includes:If the first proprietary information of user input is authenticated, inquiry user is
Second people's proprietary information of no input.
Wherein, if second people's proprietary information of user input, by the first man proprietary information with described second
People's proprietary information is associated, and searches for all related to the first man proprietary information and second people's proprietary information
Other people's proprietary informations, and will be these people's proprietary informations associated with each other.
Wherein, if user is not input into second people's proprietary information, search for all related to first man proprietary information
Other people's proprietary informations, and will be these people's proprietary informations associated with each other.
Wherein, after personal proprietary information each other is associated with each other, once receiving any one personal proprietary information, then adjust
Take related information to be authenticated the verity of user.
By the authentication method of the present invention, more can really use to need the department using personally identifiable information to provide
Family information, is so easier to track the user using related system, and the swindle to prevent various telecommunications, financial class provides guarantor
Barrier.
Description of the drawings
By the detailed description for reading hereafter preferred implementation, various other advantages and benefit are common for this area
Technical staff will be clear from understanding.Accompanying drawing is only used for the purpose for illustrating preferred implementation, and is not considered as to the present invention
Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
The flow chart that accompanying drawing 1 shows a kind of authentication method according to embodiment of the present invention.
Specific embodiment
The illustrative embodiments of the disclosure are more fully described below with reference to accompanying drawings.Although showing in accompanying drawing public
The illustrative embodiments opened, it being understood, however, that may be realized in various forms the disclosure and the reality that should not be illustrated here
The mode of applying is limited.On the contrary, there is provided these embodiments are able to be best understood from the disclosure, and can be by this public affairs
What the scope opened was complete conveys to those skilled in the art.
According to the embodiment of the present invention, a kind of identity authentication method is proposed, as shown in Figure 1, which includes:
Step 101, user are logged in using the first authentication information.
Wherein, also registered using the first authentication information including user before the step 101.
The registration process of user is as the registration of general system or website.Using the unique user of the internal system
Name, and the password known to user registered.Can also be tested using the mode of image, the identifying code of figure if desired
Card.
Wherein, first authentication information is user's registration information, and which at least includes username and password.
Wherein, the first man proprietary information is the exclusive personal information that professional institution is user's distribution, and which includes body
Part card number, cell-phone number, degree's diploma number, educational background card number, Bank Account Number, social security account or one of account of managing money matters.
These people's proprietary informations are usually government organs, financial institution, educational institution to the personal certificate provided, account
Etc. information.For example, to the personal identity card provided, there are identification card number in government organs, mainly public security department, in addition thereon
There are the information such as certificates handling mechanism, address, these information can also be verified as personal proprietary information.Information can be encrypted,
The form of unique binary code can also be converted into.
The account of financial institution just compares many.For example, bank has Bank Account Number, social security account, the information of work unit,
And the information of the account of dealing etc..Security organization just has the financing account of individual, information of stock etc..
The personal information of educational institution, typically educational background card, the card information of degree's diploma.
In addition, generally cell-phone number is also and identity card hook.Therefore, if it is known that cell-phone number, corresponding its identity
Card number also can be by what internal system information was called.
Step 103, prompting user input first man proprietary information are authenticated.
Generally, the mode for pointing out user input is the optional form of user carrying out.User can select input, it is also possible to
Selection is not input into.According to the different choice of user, into different processing modes.
Step 105, corresponding actions are carried out according to user operation.
Wherein, the step 105 also includes:If user is not input into first man proprietary information and is authenticated, do not allow
User uses system.
This is in order at the protection to system, if user is not input into one of personal proprietary information, just not allowing user to use should
System.Because if not being input into, system still can be used, it is then unfair for the user that those have input personal proprietary information
.Of course for the popularization of system, and it is also possible to not being input into user's open portion function of personal proprietary information.
Wherein, the step 105 also includes:If the first proprietary information of user input is authenticated, inquiry user is
Second people's proprietary information of no input.
The purpose of inquiry second people's proprietary information of user input is to be more accurately located user.That is know
The personal proprietary information of user is more, then the information of the user is clearer.Just as draw portrait it is the same, it is known that feature get over
It is many, then the people for drawing just more like.So know that the personal proprietary information of user is more, then it is accurate when verifying to user
Degree is higher.So in verification process, the personal information for obtaining user is more, then for user, may be safer.
Wherein, if second people's proprietary information of user input, by the first man proprietary information with described second
People's proprietary information is associated, and searches for all related to the first man proprietary information and second people's proprietary information
Other people's proprietary informations, and will be these people's proprietary informations associated with each other.
Wherein, if user is not input into second people's proprietary information, search for all related to first man proprietary information
Other people's proprietary informations, and will be these people's proprietary informations associated with each other.
Wherein, after personal proprietary information each other is associated with each other, once receiving any one personal proprietary information, then adjust
Take related information to be authenticated the verity of user.
The association of information, is not simple association, is the association based on big data.For example, when user uses a certain
When bank card is consumed, then use when obtaining the subscriber identity information related to the bank card, such as user's application bank card
Identity card, on the certificate such as officer's identity card such as, the information such as identification card number, officer's identity card number.By the identification card number, officer's identity card
Number, obtain it is all with the officer's identity card number, identification card number be according to handle bank card, cell-phone number, then by these cell-phone numbers,
Bank's card number, can obtain the scope of your current consumption and activity, and can determine that its financial field, education sector, medical field
Related identification information.
Equally, the data mining of relatedness as above when user sees a doctor, during using social security card, can similarly be made.
The above, the only present invention preferably specific embodiment, but protection scope of the present invention is not limited thereto,
Any those familiar with the art the invention discloses technical scope in, the change or replacement that can be readily occurred in,
Should all be included within the scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of the claim
Enclose and be defined.
Claims (9)
1. a kind of identity authentication method, which includes:
Step 101, user are logged in using the first authentication information;
Step 103, prompting user input first man proprietary information are authenticated;
Step 105, corresponding actions are carried out according to user operation.
2. as claimed in claim 1 a kind of identity identifying method, wherein first authentication information is user's registration information, which is extremely
Include username and password less.
3. as claimed in claim 1 a kind of identity identifying method, wherein also using first including user before the step 101
Authentication information is registered.
4. as claimed in claim 1 a kind of identity identifying method, wherein the first man proprietary information is use for professional institution
The exclusive personal information of family distribution, which includes identification card number, cell-phone number, degree's diploma number, educational background card number, Bank Account Number, social security account
Number or financing one of account.
5. as claimed in claim 1 a kind of identity identifying method, wherein the step 105 also includes:If user is not input into first
Personal proprietary information is authenticated, then do not allow user to use system.
6. as claimed in claim 1 a kind of identity identifying method, wherein the step 105 also includes:If user input is the first
Proprietary information is authenticated, then ask the user whether to be input into second people's proprietary information.
7. as claimed in claim 6 a kind of identity identifying method, if wherein second people's proprietary information of user input, will be described
First man proprietary information is associated with second people's proprietary information, and searches for all with the exclusive letter of the first man
Breath other people proprietary informations related to second people's proprietary information, and will be these people's proprietary informations associated with each other.
8. as claimed in claim 6 a kind of identity identifying method, if wherein user is not input into second people's proprietary information, searching for
All other people proprietary informations related to first man proprietary information, and will be these people's proprietary informations associated with each other.
9. a kind of identity identifying method as described in claim 7 or 8, wherein after personal proprietary information each other is associated with each other,
Once receiving any one personal proprietary information, then transfer related information and the verity of user is authenticated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610899914.5A CN106534076A (en) | 2016-10-14 | 2016-10-14 | Identity authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610899914.5A CN106534076A (en) | 2016-10-14 | 2016-10-14 | Identity authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106534076A true CN106534076A (en) | 2017-03-22 |
Family
ID=58331948
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610899914.5A Pending CN106534076A (en) | 2016-10-14 | 2016-10-14 | Identity authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106534076A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101599832A (en) * | 2008-06-05 | 2009-12-09 | 北京思创银联科技有限公司 | A kind of personal identification method and system that realize the network system login |
CN103327490A (en) * | 2013-07-02 | 2013-09-25 | 中国农业银行股份有限公司四川省分行 | Business outlet Internet WIFI access system and method thereof |
CN104392368A (en) * | 2014-10-21 | 2015-03-04 | 中国建设银行股份有限公司 | Method and device for user system management in e-commerce platform |
CN104717073A (en) * | 2015-03-19 | 2015-06-17 | 张文 | Personal information sharing, personal information sharing method and identity authentication method |
-
2016
- 2016-10-14 CN CN201610899914.5A patent/CN106534076A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101599832A (en) * | 2008-06-05 | 2009-12-09 | 北京思创银联科技有限公司 | A kind of personal identification method and system that realize the network system login |
CN103327490A (en) * | 2013-07-02 | 2013-09-25 | 中国农业银行股份有限公司四川省分行 | Business outlet Internet WIFI access system and method thereof |
CN104392368A (en) * | 2014-10-21 | 2015-03-04 | 中国建设银行股份有限公司 | Method and device for user system management in e-commerce platform |
CN104717073A (en) * | 2015-03-19 | 2015-06-17 | 张文 | Personal information sharing, personal information sharing method and identity authentication method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230129693A1 (en) | Transaction authentication and verification using text messages and a distributed ledger | |
US10749681B2 (en) | Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features | |
US20180253539A1 (en) | Robust system and method of authenticating a client in non-face-to-face online interactions based on a combination of live biometrics, biographical data, blockchain transactions and signed digital certificates. | |
US12050676B2 (en) | Digital identity authentication and verification system, method, and device | |
US9202083B2 (en) | Systems and methods for verifying uniqueness in anonymous authentication | |
US8468355B2 (en) | Multi-dimensional credentialing using veiled certificates | |
US7690032B1 (en) | Method and system for confirming the identity of a user | |
US20070175986A1 (en) | System and method for nameless biometric authentication and non-repudiation validation | |
KR102360386B1 (en) | A system, method and server computer system for transforming an original entity into a verifiable and verifiable entity in a heterogeneous communication network environment | |
US11562349B2 (en) | Risk mitigation for a cryptoasset custodial system using data points from multiple mobile devices | |
US20060010487A1 (en) | System and method of verifying personal identities | |
US20210365584A1 (en) | Portable reputation brokering using linked blockchains and shared events | |
CN108140152A (en) | Computer implemented tracking mechanism and data management | |
US20160328815A1 (en) | Multimodal biometric profiling | |
WO2019209291A1 (en) | Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features | |
KR20230126220A (en) | Methods and systems for obtaining, controlling, accessing and/or displaying personal genetic identification information | |
CN112785410A (en) | Relying party risk adjustment indicator systems and methods | |
Blue et al. | A review of identity, identification and authentication | |
CN108234126A (en) | For the system and method remotely opened an account | |
Gasson et al. | D3. 2: A study on PKI and biometrics | |
CN106534076A (en) | Identity authentication method | |
Nair et al. | Multibiometric cryptosystem based on decision level fusion for file uploading in cloud | |
US20130275753A1 (en) | System and method for verifying credentials | |
US11468525B2 (en) | Coordination platform for generating and managing authority tokens | |
De Andrade et al. | Electronic Identity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170322 |
|
RJ01 | Rejection of invention patent application after publication |