A security authentication method, network equipment and system
A technology of network equipment and security authentication, applied in the field of communication, can solve the problem of not receiving short messages, and achieve the effect of improving the user experience, shortening the distance, and reducing the delay
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0057] The embodiment of the present invention provides an authentication method, which is applied to network equipment, such as figure 1 As shown, the method includes:
[0058] Step 101: Receive a first request from a terminal device within coverage, the first request is a request for obtaining a verification code for a first application;
[0059] Step 102: When it is determined that the terminal device is legal according to the first request, generate a first verification code, and send the first verification code to the terminal device;
[0060] Step 103: receiving a second request sent by the terminal device, the second request carrying the second verification code sent by the terminal device and the operation for the target object in the first application;
[0061] Step 104: Verify according to the second verification code in the second request, and when the verification is passed, send the second request to the server, so that the server can target the first application...
Embodiment 2
[0081] The embodiment of the present invention provides an authentication method, which is applied to network equipment, such as figure 2 As shown, the method includes:
[0082] Step 201: receiving a third request from the terminal device, the third request being a login request of the terminal device for the first application;
[0083] Step 202: Send the third request to the server, so that the server performs identity verification according to the third request, and obtains an identity verification result;
[0084] Step 203: receiving the identity verification result sent by the server, when the identity verification result is identity verification passed, adding the identification information of the terminal device to the service list;
[0085] Step 204: receiving a first request from the terminal device, the first request is a request for obtaining a verification code for the first application;
[0086] Step 205: When it is determined that the terminal device is legal a...
Embodiment 3
[0124] An embodiment of the present invention provides a network device, such as Figure 5 shown, including:
[0125] The first communication unit 51 is configured to receive a first request from the terminal device within the coverage area, where the first request is a request for obtaining a verification code for the first application;
[0126] The authentication unit 52 is configured to generate a first verification code when determining that the terminal device is legal according to the first request, and send the first verification code to the terminal device through the first communication unit; according to the second The second verification code in the request is verified, and when the verification is passed, the second request is sent to the server through the second communication unit, so that the server, according to the target object in the first application in the second request The operation is processed;
[0127] The second communication unit 53 is configured ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


