Interactive identity authentication method between terminals
An identity authentication and terminal technology, applied in the field of interactive identity authentication between terminals, can solve the problems of inability to truly confirm user identity, confidential information, technical secrets, privacy leakage, unreliability, etc. And the scope of authority, the effect of system security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] Further description will be given below in conjunction with the accompanying drawings and preferred embodiments of the present invention.
[0018] Such as figure 1 As shown, this interactive identity authentication method between terminals includes the following steps:
[0019] (1) An encrypted QR code is displayed on the terminal to be entered;
[0020] (2) The user uses the smart terminal registered in the system to take pictures of the two-dimensional code to be displayed on the terminal, where the two-dimensional code is a real-time two-dimensional code dynamically generated by the system with a certain time limit;
[0021] (3) The smart terminal decrypts the captured QR code to form terminal identification data, and then performs secondary encryption combined with the smart terminal's own ID, user ID, and key to synthesize a request message, and sends the request message to the system server. , the key is a dynamic key, and the dynamic key is an instant key with ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 