Unlock instant, AI-driven research and patent intelligence for your innovation.

A security authentication method and device

A technology for security authentication and authentication server, applied in the field of security authentication methods and devices, can solve the problems of inability to ensure the security of the authentication process, the authentication method is cumbersome and troublesome, etc., and achieves the effect of the authentication process being safe and reliable, and the authentication method being simple and easy to implement.

Active Publication Date: 2021-01-15
ZTE CORP
View PDF18 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 1. Implementation at the application layer cannot ensure the security of the authentication process;
[0010] 2. The authentication method is cumbersome;
[0011] For example, if you use the USBKEY method, you must carry an additional USBKEY; another example is the method of using a dynamic SMS password, which is also more troublesome. First, you need to wait for 5 to 20 seconds, and then enter the SMS password according to the SMS notification.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security authentication method and device
  • A security authentication method and device
  • A security authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Embodiment 1 of the present invention provides a security authentication method, such as figure 1 As shown, the method includes the following steps:

[0049] Step 101: The authentication server receives a terminal use request sent by the first terminal, and the terminal use request includes: first identification information of the first terminal itself and second identification information of the second terminal;

[0050] In this step, the terminal use request is specifically a request to use the second terminal; the terminal use request includes the identification information of the terminal that initiated the request (that is, the first identification information of the first terminal itself), It also includes the identification information of the terminal requesting to use (that is, the second identification information of the second terminal).

[0051] The first terminal may be a portable mobile terminal such as a mobile phone or a tablet computer; the first identi...

Embodiment 2

[0119] Embodiment 2 of the present invention provides a security authentication device, which is located in the authentication server of the application system, such as image 3 As shown, the device includes: a request receiving module 31 and a judging module 32; wherein,

[0120] The request receiving module 31 is configured to receive a terminal use request sent by the first terminal, where the terminal use request includes: first identification information of the first terminal itself and second identification information of the second terminal;

[0121] The judging module 32 is configured to judge the legality of the first identification information and the second identification information, and determine that the authentication of the terminal use request is successful when the first identification information and the second identification information are legal at the same time.

[0122] Specifically, the terminal use request is specifically a request to use the second te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety authentication method. An authentication server receives a terminal use request sent by a first terminal, and the terminal use request includes: first identification information of the first terminal itself and second identification information of the second terminal; the authentication server The legality of the first identification information and the second identification information is judged, and when the first identification information and the second identification information are legal at the same time, it is determined that the authentication of the terminal use request is successful. The invention also discloses a safety authentication device at the same time.

Description

technical field [0001] The invention relates to the field of information communication, in particular to a security authentication method and device. Background technique [0002] With the rapid development of the global information and communication technology (ICT, Information Communication Technology) industry, user identity authentication has increasingly become one of the core topics that people pay attention to. How to carry out reliable and credible identity authentication to protect key information, finance, business, etc. Information security in the field of communication has become one of the most important technologies in the communication and information industries. [0003] At present, there are many popular identity authentication methods in the industry. The most basic methods can be summarized as the following four security mechanisms: [0004] 1. User name + password (including: static password and dynamic password), wherein dynamic password usually include...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/06
CPCH04L9/40
Inventor 孙枕戈岳旭鹏
Owner ZTE CORP