Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal course identity authentication method based on center authorization

An identity authentication and terminal technology, applied in the field of terminal equipment identification technology, network communication technology, and central server, can solve the problems of APP program theft, user damage, easy to be hacked, etc., to improve the authentication accuracy and prevent the loss of secrets.

Inactive Publication Date: 2015-07-29
王旭东
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Especially the user name / secret word authentication method, which is stored in the terminal device, is easy to be stolen by hackers and malicious APP programs
When the terminal device is lost, it will cause damage to the user
Moreover, in the process of data transmission such as wifi and mobile Internet, it is also very easy to cause users to lose their confidentiality.
Single physical authentication / biometric authentication of terminal devices cannot guarantee 100% accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal course identity authentication method based on center authorization
  • Terminal course identity authentication method based on center authorization
  • Terminal course identity authentication method based on center authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The object authentication system and method of the present invention will be further described in detail below in conjunction with the accompanying drawings and the implementation of the present invention.

[0045] attached figure 1 The authentication center generates a globally unique authorization code for each designated user process of the terminal device.

[0046] According to attached figure 1 The generated unique authorization code and device unique identification code are authorized by the user as user authentication for the mobile APP process.

[0047] According to attached figure 2 , in future user authentication, the terminal device does not store or transmit user authentication information, and only authenticates the authorized authorization code and the unique identifier of the terminal device. It greatly guarantees the security of the user's private authentication information.

[0048] attached image 3 In order to improve the security and accuracy o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for conducting user identity authentication on different user processes of terminal devices (including a mobile phone, a tablet computer, a smart television, a wearable terminal device and the like). According to the method, user private authentication information like secret keys (secret words, biological characteristic recognition and the like) of common users is not stored locally (by the terminal), private secret authentication information secrecy disclosure and the like caused by loss, and short-term off-line state, network transmission and the like are avoided effectively. Meanwhile, a center server is adopted to conduct authentication and cancel authentication. When the terminal device is lost and transferred, the problem of identity mismatching can be solved quickly. By means of the method, different user processes in a user operation system (OS) can be subjected to different authentications, and the method supports different identity authentications of multiple users in corresponding processes.

Description

technical field [0001] The present invention relates to terminal equipment identification technology, network communication technology and center server technology, especially a technology based on center authorization authentication process and additional authentication combination. Background technique [0002] The existing identity authentication technology usually adopts the combination method of user name / secret word. Or simple physical methods, bioinformatics methods, etc. Especially the user name / secret word authentication method, which is stored in the terminal device, is easy to be stolen by hackers and malicious APP programs. When the terminal device is lost, it will cause damage to the user. Moreover, during the data transmission process such as wifi and mobile Internet, it is also very easy to cause user confidentiality. A single physical authentication / biometric authentication of a terminal device cannot guarantee 100% accuracy. Contents of the invention ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 王旭东
Owner 王旭东