Terminal course identity authentication method based on center authorization
An identity authentication and terminal technology, applied in the field of terminal equipment identification technology, network communication technology, and central server, can solve the problems of APP program theft, user damage, easy to be hacked, etc., to improve the authentication accuracy and prevent the loss of secrets.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] The object authentication system and method of the present invention will be further described in detail below in conjunction with the accompanying drawings and the implementation of the present invention.
[0045] attached figure 1 The authentication center generates a globally unique authorization code for each designated user process of the terminal device.
[0046] According to attached figure 1 The generated unique authorization code and device unique identification code are authorized by the user as user authentication for the mobile APP process.
[0047] According to attached figure 2 , in future user authentication, the terminal device does not store or transmit user authentication information, and only authenticates the authorized authorization code and the unique identifier of the terminal device. It greatly guarantees the security of the user's private authentication information.
[0048] attached image 3 In order to improve the security and accuracy o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 