Authentication method, system and authentication server

An authentication server and server technology, applied in the transmission system, electrical components, etc., can solve the problems of waste of resources, long processing time, etc., achieve simple and effective legality judgment, realize legality judgment, avoid long processing time and The effect of wasting resources

Active Publication Date: 2015-09-16
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The embodiment of the present invention provides an authentication method and system, and an authentication server, which are used to solve the problems of long processing time and waste of resources caused by judging the legality of user operations through repeated input of account numbers and passwords, and can effectively Judging the legality of user operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, system and authentication server
  • Authentication method, system and authentication server
  • Authentication method, system and authentication server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The embodiment of the present invention provides an authentication method and system, and an authentication server, which are used to solve the problems of long processing time and waste of resources caused by judging the legality of user operations through repeated input of account numbers and passwords, and can effectively Judging the legality of user operations.

[0027] see figure 1 , is a structural diagram of the authentication system in the embodiment of the present invention, including an authentication server, a service server, and a user terminal, where the service server and the user terminal can perform data interaction, and the service server can also perform data exchange with the authentication server. interact.

[0028] Wherein, the service server is used to receive the operation data of the user operation and the authentication value of the user operation sent by the client, and send the authentication value of the user operation to the authentication ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method, an authentication system and an authentication server. The authentication system includes an authentication server, a service server and a user end; the service server is used for receiving the operation data of user operation and the authentication value of the user operation which are transmitted by the user end, and transmitting the authentication value of the user operation to the authentication server, the authentication server is used for determining whether the user operation passes through authentication according to the authentication value of the user operation, and transmitting an authentication result to the service server, and the service server is further used for processing the operation data of the user operation according to the authentication result. Based on the authentication server, the validity of the user operation is judged through utilizing the authentication value, and therefore, problems of long processing time and resource waste caused by repeated input of accounts and passwords can be effectively avoided, and judgment on the validity of the user operation can be realized simply and effectively.

Description

technical field [0001] The invention relates to a mobile communication system, in particular to an authentication method and system, and an authentication server. Background technique [0002] When users use data services, in order to ensure the safety of user operations, it is necessary to judge the legality of user operations. In the prior art, most of the judgments on the legality of user operations are based on the user being in the login state, where the login state is After the user enters the account number and password, there is no need to re-enter the account number and password for a period of time. When the user is in the login state, when the user performs some special operations such as transfer, remittance, payment, etc., the system will The user is required to enter the account number and password every time this type of operation is performed to ensure the legality of the user's operation. However, the method of checking the legality of the user's operation t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 蔡伟林
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products