Unlock instant, AI-driven research and patent intelligence for your innovation.

A security authentication method, network equipment and system

A technology of network equipment and security authentication, applied in the field of communication, can solve the problem of not receiving short messages, and achieve the effect of improving the user experience, shortening the distance, and reducing the delay

Active Publication Date: 2019-01-01
CHINA MOBILE COMM GRP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the dynamic password is used for identity authentication through mobile phone SMS, it often happens that the SMS cannot be received.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security authentication method, network equipment and system
  • A security authentication method, network equipment and system
  • A security authentication method, network equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] The embodiment of the present invention provides an authentication method, which is applied to network equipment, such as figure 1 As shown, the method includes:

[0058] Step 101: Receive a first request from a terminal device within coverage, the first request is a request for obtaining a verification code for a first application;

[0059] Step 102: When it is determined that the terminal device is legal according to the first request, generate a first verification code, and send the first verification code to the terminal device;

[0060] Step 103: receiving a second request sent by the terminal device, the second request carrying the second verification code sent by the terminal device and the operation for the target object in the first application;

[0061] Step 104: Verify according to the second verification code in the second request, and when the verification is passed, send the second request to the server, so that the server can target the first application...

Embodiment 2

[0081] The embodiment of the present invention provides an authentication method, which is applied to network equipment, such as figure 2 As shown, the method includes:

[0082] Step 201: receiving a third request from the terminal device, the third request being a login request of the terminal device for the first application;

[0083] Step 202: Send the third request to the server, so that the server performs identity verification according to the third request, and obtains an identity verification result;

[0084] Step 203: receiving the identity verification result sent by the server, when the identity verification result is identity verification passed, adding the identification information of the terminal device to the service list;

[0085] Step 204: receiving a first request from the terminal device, the first request is a request for obtaining a verification code for the first application;

[0086] Step 205: When it is determined that the terminal device is legal a...

Embodiment 3

[0124] An embodiment of the present invention provides a network device, such as Figure 5 shown, including:

[0125] The first communication unit 51 is configured to receive a first request from the terminal device within the coverage area, where the first request is a request for obtaining a verification code for the first application;

[0126] The authentication unit 52 is configured to generate a first verification code when determining that the terminal device is legal according to the first request, and send the first verification code to the terminal device through the first communication unit; according to the second The second verification code in the request is verified, and when the verification is passed, the second request is sent to the server through the second communication unit, so that the server, according to the target object in the first application in the second request The operation is processed;

[0127] The second communication unit 53 is configured ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security authentication method, a network device and a system. The method includes the following steps that: a first request sent by a terminal device in a coverage range is received, wherein the first request is a request for obtaining a verification code for a first application; when the terminal device is determined as valid according to the first request, a first verification code is generated, and the first verification code is sent the terminal device; a second request sent by the terminal device is received, wherein the second request carries a second verification code sent by the terminal device and operation for a target object in the first application; when verification is carried out according to the second verification code in the second request, when the verification is successful, the second request is sent to a server, so that the sever can be made to perform processing according to the operation for the target object in the first application in the second request.

Description

technical field [0001] The invention relates to secure transmission technology in the communication field, in particular to a security authentication method, network equipment and system. Background technique [0002] With the intelligentization of mobile terminals and the rapid development of the mobile Internet, mobile shopping has gradually become popular. Products such as e-commerce client and mobile wallet client also emerged at the same time. In order to ensure operational security, user identity authentication is an essential technical means when using the above clients for transactions. Among them, SMS dynamic password is a common identity authentication method for mobile payment, which can be used for login and transaction authentication. SMS dynamic password is a dynamic password generated by the server, which is sent to the user's bound mobile phone through SMS. The user can enter the password and send it to the server for verification to achieve the purpose of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 刘婧雯
Owner CHINA MOBILE COMM GRP CO LTD