Security authentication method, equipment and system

A technology of security authentication and equipment, applied in the field of security authentication, can solve the problems of paying to the wrong object, overpaying, etc., to achieve the effect of ensuring security, reducing the possibility of tampering, and improving the difficulty of cracking

Inactive Publication Date: 2013-09-04
BEIJING NETQIN TECH
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, by displaying the falsified information to the user and sending the falsified object, amount, etc. to the trading platform that is the same or different from the user's expectation, it is possible to overpay and pay to the wrong object without the user's awareness. various situations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method, equipment and system
  • Security authentication method, equipment and system
  • Security authentication method, equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings, and unnecessary details and functions for the present invention will be omitted during the description to avoid confusing the understanding of the present invention. Hereinafter, the present invention is described in detail by taking the scenario where the present invention is applied to a wireless mobile communication system as an example. But the present invention is not limited thereto, and the present invention can also be applied to a fixed communication system, a wired communication system, or any hybrid structure of a wireless mobile communication system, a fixed communication system, a wired communication system, and the like. As far as the mobile communication system is concerned, the present invention is not limited to the specific communication protocols of the various mobile communication terminals involved, and may include (but no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security authentication method, which comprises the steps: (a) sending data related to an authentication client-side to an authentication server; (b) receiving client-side data formed by the authentication server based on the data related to the authentication client-side and authentication data returned by a target server from the authentication server; (c) using an executable code included in the client-side data to verify the safety of the authentication client-side; and (d) under the condition of determining the safety of the authentication client-side, using the authentication data to log in the target server.

Description

technical field [0001] The present invention relates to the field of secure communication, and more particularly relates to a method, device and system for security authentication using an authentication client. Background technique [0002] With the development of network communication technology, network transactions have become an important part of economic activities in today's society. However, with that comes various issues related to the security of network transactions. For example, when a user uses a mobile terminal to make transaction payment, the transaction client software used may be fake transaction client software modified by a malicious third party. Since this kind of fake transaction client software usually has a similar or even the same interface as the normal transaction client software, users are easily deceived and use the fake transaction client software to make transaction payments, resulting in the loss of the user's personal information, credit card...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06Q20/32H04L29/06
Inventor 施华国杨威曹阳
Owner BEIJING NETQIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products