Terminal authentication method, device and system

A terminal and authentication technology, applied in the Internet field, can solve problems such as insufficient intelligence in authentication operations, and achieve the effect of improving intelligence

Active Publication Date: 2015-10-14
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a terminal authentication method, device, and system, aiming to solve the problem that terminal authentication operations are not intelligent enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal authentication method, device and system
  • Terminal authentication method, device and system
  • Terminal authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0050] Such as image 3 As shown, a first embodiment of a terminal authentication method of the present invention is proposed, and the terminal authentication method includes:

[0051] Step S10, when receiving an authentication event triggered based on a preset application, the first terminal acquires authentication information from the first server based on the user identification information corresponding to the preset application;

[0052] In this embodiment, the preset application can be an application run by the first terminal simulating a mobile device, or some application specially developed for the second terminal, or an application run by the first terminal in the state of mobile communication. Authorization events can be operations such as login and payment. The user's identification information may be the login information used by the user to log in to the application, such as the user's login account; or, the ID information preset by the user. Multiple sets of us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal authentication method. The terminal authentication method comprises the following steps that: when an authentication event triggered based on a preset application is received, a first terminal acquires authentication information from a first server based on user identification information corresponding to the preset application; when the authentication information is acquired, the first terminal generates an authentication request based on the acquired authentication information and the user identifier information; and the first terminal sends the authentication request to a second server in order that the second server transmits the authentication information and the user identification information in the authentication request to an authentication server for authentication operation. The invention also discloses a terminal authentication device. When the first terminal is used for authenticating, manual input or acquisition through the second terminal which is connected with the first terminal is not required, so that the intellectualization during authentication operation of the first terminal is enhanced.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a terminal authentication method, device and system. Background technique [0002] Many existing applications often involve authentication operations during operation. For example, when performing payment operations or login operations, an authentication server is often required to perform authentication operations to ensure the security of the entire operation. Some applications for mobile terminals , the authentication information is often stored in the mobile terminal. When the user runs the application through the PC, if authentication operation is required, the mobile device needs to be connected to the PC, and the PC accesses the authentication information stored on the mobile terminal. Authorization information for authentication operations. [0003] The above solution saves the authentication information of the mobile terminal in time in the PC, but because ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 薛鹏赵自明
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products