Internet safety identification method
A security authentication and Internet technology, applied in the field of Internet security authentication, to achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] Fig. 1 is a step diagram of an embodiment of the present invention, wherein, the user's first application object is a user network terminal, and the user's second application object is a mobile terminal or an instant messaging terminal, and the steps are:
[0027] 1) The user network terminal requests access to the system;
[0028] 2) The system generates a random symbol sequence as authentication information;
[0029] 3) The system sends the authentication information to the user's network terminal;
[0030] 4) The user sends the authentication information to the system through a mobile terminal or a network instant messaging terminal;
[0031] 5) The system checks whether the received authentication information is consistent with the authentication information generated by itself, and if they are consistent, the authentication is passed.
[0032] Between step 2) and step 3) of this embodiment may also include: the system generates a time stamp, and step 5) is perfor...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 