Authentication method, device and system

A technology of identity authentication and authentication server, applied in the field of devices and systems, and identity authentication methods, can solve problems such as poor security, insecure user accounts, and easy malicious use by others, so as to improve security and authentication efficiency effect

Active Publication Date: 2015-05-20
SHENZHEN TENCENT COMP SYST CO LTD
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, it is mainly to verify and authorize a single user on a one-to-one basis, such as through mobile phone software, SMS, etc. to interact with the user to complete the verification, and the verification method is mainly through the sharing of verification codes, etc. Security, if the verification code is stolen or leaked, it is easy to be maliciously used by others, and the security is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and system
  • Authentication method, device and system
  • Authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0050] refer to image 3 , the method of this embodiment includes the following steps:

[0051] Step 301, sending the identity authentication request to the authentication server;

[0052] When the user wants to obtain a certain authorization, he needs to request the authorization from the authentication server 101, and after receiving the user's request, the first client 103 sends the identity authentication request to the authentication server 101, and requests the authentication server 101 to The user side performs identity authentication.

[0053] Step 302, receiving the identity authentication information sent by the authentication server;

[0054] After the authentication server 101 receives the identity authentication request sent by the first client 103, it sends identity authentication information to the first client 103, and the identity authentication information may be to request the authenticator to return a confirmation for identity authentication information,...

no. 2 example

[0059] see Figure 4 , Figure 4 is a schematic diagram of the second embodiment of the identity authentication method in the embodiment of the present invention, and image 3 The difference of the first embodiment of the shown identity authentication method is that, in step 303, sharing the identity authentication information to multiple other clients via NFC includes:

[0060] Step 403, identifying the target client end with the NFC function turned on;

[0061] After the first user terminal 103 enables the NFC function, it can identify a target user terminal with the NFC function enabled, and the target user terminal is the user terminal with the NFC function enabled.

[0062] Step 404, establishing a client group for all identified target clients;

[0063] Within a certain distance, the first user terminal 103 can identify multiple target user terminals through NFC, and establish a user terminal group for all the identified target user terminals. For example, if the cli...

no. 3 example

[0068] see Figure 5 , Figure 5 is a schematic diagram of the third embodiment of the identity authentication method in the embodiment of the present invention, and image 3 The difference of the first embodiment of the identity authentication method shown is that this embodiment may further include:

[0069] Step 504, sending confirmation information for identity authentication to the authentication server for user identity authentication.

[0070] The first client terminal 103 sends confirmation information for identity authentication to the authentication server 101 for user identity authentication.

[0071] The execution sequence of step 504 in this embodiment is not limited by the description of the embodiment, and may be executed before sharing the identity authentication information with multiple other client terminals through NFC.

[0072] In the embodiment of the present invention, a user terminal shares the identity authentication information sent by the authenti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authentication method, device and system. According to one embodiment, the method includes: sending an authentication request to an authentication server, receiving authentication information sent by the authentication server, sharing the authentication information with other user terminals through near field communication, and allowing the other user terminal to send confirming information to the authentication server according to the authentication information. The authentication method, device and system has the advantages that groups are authenticated at the same time through the NFC (near field communication) technique and authentication efficiency is improved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an identity authentication method, device and system. Background technique [0002] Identity authentication, also known as "authentication" and "verification", refers to completing the confirmation of the user's identity through certain means and granting corresponding rights. [0003] In the existing technology, it is mainly to verify and authorize a single user on a one-to-one basis, such as through mobile phone software, SMS, etc. to interact with the user to complete the verification, and the verification method is mainly through the sharing of verification codes, etc. Security, if the verification code is stolen or leaked, it is easy to be maliciously used by others, and the security is poor. Contents of the invention [0004] In view of this, the present invention provides an identity authentication method, device and system, which can realize group simult...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04B5/00H04W12/47H04W12/69
CPCH04W4/80H04W12/06
Inventor 胡育辉喻欣王小叶芦姗
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products