A security authentication method and device
A technology for security authentication and authentication server, applied in the field of security authentication methods and devices, can solve the problems of inability to ensure the security of the authentication process, the authentication method is cumbersome and troublesome, etc., and achieves the effect of the authentication process being safe and reliable, and the authentication method being simple and easy to implement.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0048] Embodiment 1 of the present invention provides a security authentication method, such as figure 1 As shown, the method includes the following steps:
[0049] Step 101: The authentication server receives a terminal use request sent by the first terminal, and the terminal use request includes: first identification information of the first terminal itself and second identification information of the second terminal;
[0050] In this step, the terminal use request is specifically a request to use the second terminal; the terminal use request includes the identification information of the terminal that initiated the request (that is, the first identification information of the first terminal itself), It also includes the identification information of the terminal requesting to use (that is, the second identification information of the second terminal).
[0051] The first terminal may be a portable mobile terminal such as a mobile phone or a tablet computer; the first identi...
Embodiment 2
[0119] Embodiment 2 of the present invention provides a security authentication device, which is located in the authentication server of the application system, such as image 3 As shown, the device includes: a request receiving module 31 and a judging module 32; wherein,
[0120] The request receiving module 31 is configured to receive a terminal use request sent by the first terminal, where the terminal use request includes: first identification information of the first terminal itself and second identification information of the second terminal;
[0121] The judging module 32 is configured to judge the legality of the first identification information and the second identification information, and determine that the authentication of the terminal use request is successful when the first identification information and the second identification information are legal at the same time.
[0122] Specifically, the terminal use request is specifically a request to use the second te...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


