Authentication method, server, and terminal

An authentication method and server technology, applied in the field of servers, terminals, and authentication methods, can solve problems such as low security, hidden dangers, and inability to confirm the real identity of users, and achieve the effect of improving security and eliminating hidden dangers.

Inactive Publication Date: 2016-05-04
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF8 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of realizing the present invention, the inventor found that there are at least the following problems in the prior art: since the existing verification code is plain code, when other people intercept the verification code by intercepting the verification code, other people

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, server, and terminal
  • Authentication method, server, and terminal
  • Authentication method, server, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0042] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0043] figure 1 This is a flowchart of the first embodiment of an authentication method provided by an embodiment of the present invention. In the embodiment of the present invention, the authentication method is applied to a server, and the server can be used to provide an identity authentication function. The user uses a terminal to access the server through the network, and completes operations such as transfer and payment through inte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an authentication method, a server, and a terminal. The authentication method comprises: when an identity authentication request sent by a terminal is received, a verification code is sent to the terminal, wherein the verification code is obtained by encrypting source verification information by using pre-stored valid user biological feature information; a to-be-checked code inputted by the terminal based on the verification code and biological feature information, inputted by the terminal, of a to-be-authenticated user are received; the inputted to-be-checked code is decrypted by using the biological feature information of the to-be-authenticated user to obtain target verification information; and the target verification information and the source verification information are compared and an identity authentication result of the to-be-authenticated user is determined based on the comparison result. According to the embodiment of the invention, on the basis encryption and decryption on the verification code, security is improved and the identity of the user can be confirmed conveniently and accurately.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to an authentication method, server and terminal. Background technique [0002] Existing terminals often use a verification code when it comes to identity authentication and other links, such as when performing operations such as payment and transfer. The server sends the verification code to the terminal, and the terminal user enters the verification code. Verification, in order to verify user identity and improve security. [0003] In the process of realizing the present invention, the inventor found that the prior art has at least the following problems: Since the existing verification code is plain code, when other people intercept the verification code by intercepting the verification code, other people can pass the verification code. code to complete the corresponding identity authentication, and then perform payment, transfer and other operations. Therefore, u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0861
Inventor 郑礼良林荣辉
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products