Authentication method and relevant device

An authentication and equipment technology, applied in the field of communication, can solve the problems of affecting the accuracy of authentication, authentication failure, inconvenient use, etc., and achieve the effect of saving authentication time, simplifying the authentication process, and improving flexibility

Active Publication Date: 2012-11-28
MEIZU TECH CO LTD
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to improve the security of data services, many authentication methods have been proposed in the prior art. The so-called authentication refers to a technology for checking the legitimacy and validity of data services used by users. And in practice, the inventors of the present invention found that the existing authentication methods require the user to manually input authentication information on the terminal device, such as inputting a password or other authentication information, etc., and then the terminal device manually The input authentication information is authenticated. This method is not only time-consuming and inconvenient to use, but also prone to failure of authentication due to temporary operation errors by authorized users, which affects the accuracy of authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and relevant device
  • Authentication method and relevant device
  • Authentication method and relevant device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] This embodiment will be described from the perspective of a first terminal, where the first terminal may serve as an NFC initiating device, specifically a personal computer (PC, Personal Computer), a tablet computer, or a mobile phone.

[0065] An authentication method, comprising: sending an authentication request message of a current service to a second terminal through NFC; receiving authentication information returned by the second terminal through NFC according to the authentication request message; business authentication.

[0066] Such as figure 1 As shown, the specific process can be as follows:

[0067] 101. The first terminal sends an authentication request message of the current service (that is, the current service of the first terminal) to the second terminal through NFC;

[0068] Wherein, the second terminal may serve as an NFC target device, specifically, a terminal such as a personal computer (PC, Personal Computer), a tablet computer, or a mobile phon...

Embodiment 2

[0080] This embodiment will be described from the perspective of a second terminal, where the second terminal may serve as an NFC target device, specifically a terminal such as a PC, a tablet computer, or a mobile phone.

[0081] An authentication method, comprising: receiving an authentication request message of the first terminal's current service sent by the first terminal through NFC, obtaining authentication information according to the authentication request message, and sending the authentication information to the first terminal through NFC , so that the first terminal authenticates the current service according to the authentication information.

[0082] Such as figure 2 As shown, the specific process can be as follows:

[0083] 201. The second terminal receives an authentication request message for the current service of the first terminal sent by the first terminal through NFC;

[0084] Wherein, the first terminal may serve as an NFC initiating device. Specifica...

Embodiment 3

[0107] According to the methods described in Embodiment 1 and Embodiment 2, the following examples will be used to describe in detail.

[0108] In this embodiment, the first terminal is specifically a PC, and the second terminal is specifically a mobile phone for illustration. Both the PC and the mobile phone have an NFC module, that is, have an NFC function. The so-called NFC function refers to the possibility of data transmission through NFC.

[0109] Such as image 3 As shown, the specific process can be as follows:

[0110] 301. The PC sends an authentication request message of the current service to the mobile phone of the user through NFC, so as to obtain authentication information.

[0111] Wherein, the authentication request message may carry the identity information of the user, and may also carry information such as the service identifier of the current service. Identity information may include user identification, user name (such as user's nickname, etc.) and / or ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an authentication method and a relevant device. The authentication method is characterized in that when a current service is authenticated, an authentication request message is transmitted to a second terminal through near field communication (NFC), the authentication information which is returned by the second terminal through the NFC according to the authentication request message is received, and then the current service is authenticated according to the authentication information, so that the trouble for manually inputting the authentication information by users can be omitted, the authentication process is simplified, and not only is the authentication time saved and the authentication flexibility improved, but also the misoperation rate can be reduced, and the authentication accuracy can be improved.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an authentication method and related equipment. Background technique [0002] With the development of communication technology, there are more and more types of data services, and the relationship between various data services and people's daily life is becoming more and more close. Therefore, how to ensure the security of data services has become a growing concern The problem. [0003] In order to improve the security of data services, many authentication methods have been proposed in the prior art. The so-called authentication refers to a technology for checking the legitimacy and validity of data services used by users. And in practice, the inventors of the present invention found that the existing authentication methods require the user to manually input authentication information on the terminal device, such as entering a password or other authentication information,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04B5/00
Inventor 梁东明
Owner MEIZU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products