Multiple-factor authentication method and device

An authentication method, multi-factor technology, applied in the communication field

Active Publication Date: 2015-09-02
XIAOMI INC
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the explosive development of the Internet and the continuous enrichment of user application scenarios, the current multi-factor authentication method can no longer meet the actual needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multiple-factor authentication method and device
  • Multiple-factor authentication method and device
  • Multiple-factor authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0056] The terminology used in the present disclosure is for the purpose of describing particular embodiments only, and is not intended to limit the present disclosure. As used in this disclosure and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multiple-factor authentication method. The multiple-factor authentication method comprises the steps of: conducting preliminary identity verification based on login information of a user; generating authentication prompting information according to user information associated with the login information after the preliminary identity verification is passed; sending the authentication prompting information to a client of the user, and outputting the authentication prompting information to the user in a login interface via the client; and sending an authenticated notification message to the client when receiving authentication information which is input by the user under the prompt of the authentication prompting information and matched with the authentication prompting information. According to the multiple-factor authentication method and a multiple-factor authentication device provided by the invention, the authentication prompting information is generated according to the user information associated with the login information of the user, and the user can complete the identity verification process spontaneously based on facts known by himself without introducing an authentication method of a third party, thereby enhancing user experience and reducing service cost of a server.

Description

technical field [0001] The present disclosure relates to the communication field, in particular to a multi-factor authentication method and device. Background technique [0002] In order to ensure the privacy of users' personal data, almost all Internet services currently require users to log in before providing services to users. At present, the most common login method is to require the user to enter the user name and password, and the server verifies the user's identity by verifying the legality of the user name and password entered by the user. However, in practical applications, since the user may be in several different Internet service providers. The same user name and password are used, so once one of the user names and passwords is leaked, the other companies will all face serious security risks. In order to solve this problem, the industry has proposed a multi-factor authentication method. The so-called multi-factor authentication method means that the user enters...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3218H04L63/08
Inventor 王熙刘洋河徐胜强王伟伟
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products