Unlock instant, AI-driven research and patent intelligence for your innovation.

Interactive identity authentication method between terminals

An identity authentication and terminal technology, applied in the field of interactive identity authentication between terminals, can solve the problems of inability to truly confirm user identity, confidential information, technical secrets, privacy leakage, unreliability, etc. And the scope of authority, the effect of system security

Active Publication Date: 2016-05-18
SHANTOU INST OF UITRASONIC INSTR CO LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This identity authentication method uses a fixed user name and a fixed password to protect the system, which is not reliable. Anyone who knows the user name and password can enter the system. This identity authentication method cannot really confirm the identity of the user.
When the password is leaked, others can enter the system with the password, resulting in the leakage of confidential information, technical secrets, privacy, etc., resulting in irreparable losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interactive identity authentication method between terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Further description will be given below in conjunction with the accompanying drawings and preferred embodiments of the present invention.

[0018] Such as figure 1 As shown, this interactive identity authentication method between terminals includes the following steps:

[0019] (1) An encrypted QR code is displayed on the terminal to be entered;

[0020] (2) The user uses the smart terminal registered in the system to take pictures of the two-dimensional code to be displayed on the terminal, where the two-dimensional code is a real-time two-dimensional code dynamically generated by the system with a certain time limit;

[0021] (3) The smart terminal decrypts the captured QR code to form terminal identification data, and then performs secondary encryption combined with the smart terminal's own ID, user ID, and key to synthesize a request message, and sends the request message to the system server. , the key is a dynamic key, and the dynamic key is an instant key with ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an interactive identity authentication method between terminals. The method comprises the steps of displaying an encrypted two-dimensional code by a to-be-enter terminal; shooting the two-dimensional code displayed by the to-be-enter terminal by an intelligent terminal; synthesizing the two-dimensional code, the ID of the intelligent terminal, a user ID and a secret key into a request message by the intelligent terminal itself, and sending the request message to a system server; judging whether the access request of a user is legitimate or not by the system server according to the content of the request message, and then further judging the competence extent of the user; according to the competence extent of the user, enabling the corresponding permission of the to-be-enter terminal by the system server. According to the technical scheme of the invention, the system simultaneously judges whether the user has the permission, knows the secret key and carries an already registered intelligent terminal to access the system via a specified terminal or not. Based on the dynamic and integrated authentication method of the two-dimensional code, the ID of the intelligent terminal, the user ID and the secret key, the identity of the user and the permission of the user can be better confirmed. Therefore, the system is safer.

Description

technical field [0001] The invention relates to an identity authentication method, in particular to an interactive identity authentication method between terminals. Background technique [0002] At present, the method of user name and password is generally used to enter the system through the terminal. Only when the user name and password are correct, the system is allowed to enter the system to prevent illegal intrusion. This identity authentication method uses a fixed username and a fixed password to protect the system, which is unreliable. Anyone who knows the username and password can enter the system. This identity authentication method cannot really confirm the identity of the user. When the password is leaked, others can enter the system with the password, resulting in the leakage of confidential information, technical secrets, privacy, etc., resulting in irreparable losses. Contents of the invention [0003] The technical problem to be solved by the present invent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 李德来林国臻廖晓燕张晓娜赵榉云
Owner SHANTOU INST OF UITRASONIC INSTR CO LTD