Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and server

An authentication method and server technology, applied in the field of authentication method and server, can solve the problems of low security of payment environment, easy leakage of verification information, and low level of payment authentication.

Active Publication Date: 2016-04-06
LENOVO (BEIJING) CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, personal verification information is relatively easy to leak. If one person’s verification information is used for authentication, the security of the authentication is relatively poor, the security of the payment environment is not high, and the level of payment authentication is not high, resulting in final property loss.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and server
  • Authentication method and server
  • Authentication method and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to understand the characteristics and technical contents of the embodiments of the present invention in more detail, the implementation of the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. The attached drawings are only for reference and description, and are not intended to limit the embodiments of the present invention.

[0028] figure 1 It is a schematic flowchart of the authentication method in Embodiment 1 of the present invention. The authentication method in this example is applied to the server side, such as figure 1 As shown, the authentication method includes the following steps:

[0029] Step 101: Receive an authentication request sent by a first terminal.

[0030] In the embodiment of the present invention, the first terminal is bound with a bank card or an electronic wallet, and the first user sends an authentication request for the electronic payment to the server when perform...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method and a server. The method comprises the following steps: receiving an authentication request sent by a first terminal; determining at least a first sub authentication request and a second sub authentication request corresponding to the authentication request; sending the first sub authentication request to a second terminal, and sending the second sub authentication request to a third terminal; authenticating the first verification information and the second verification information while receiving the first verification information sent by the second terminal and the second verification information sent by the third terminal; and sending an authentication result to the first terminal, wherein the second terminal or the third terminal and the first terminal are the same terminal or different terminals.

Description

technical field [0001] The invention relates to authentication technology, in particular to an authentication method and a server. Background technique [0002] With the development of Internet technology, electronic payment is widely used in various fields. For example, online banking, online shopping, etc. At present, the way of electronic payment is to input the verification information of a certain individual, and the server completes the payment operation after the verification information is successfully authenticated. [0003] When using an electronic device such as a mobile phone or a computer to make electronic payment, generally one person can make an electronic payment after one authentication on an electronic device. However, personal verification information is relatively easy to leak. If one person’s verification information is used for authentication, the security of the authentication is relatively poor, the security of the payment environment is not high, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06Q20/40
CPCG06Q20/40975H04L63/0869G06Q20/40145G06Q20/405H04L63/083H04L63/0861G06Q20/401H04L63/04
Inventor 王娇岳冬亮
Owner LENOVO (BEIJING) CO LTD