Method for communication authentication between client terminal and charging device under security mechanism
A client terminal and charging device technology, which is applied in the field of communication authentication under the security mechanism, can solve the problems of key information leakage, loss of users and charging device enterprises, etc., to achieve high security, good experience, and solve the problem of identity authentication.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] Embodiment one: as attached figure 1 The charging facility shown is composed of a user terminal (usually a mobile phone), a charging device (charging pile) and a server. Before the user connects to the charging device through the client terminal to charge, the user needs to register through the client terminal. The registration process is attached figure 2 As shown in , since the client terminals often use mobile phones, the registration process is as follows:
[0030] 1) The user enters the phone number in the client terminal and sends it to the server;
[0031] 2) The server requests a verification code from the SMS gateway;
[0032] 3) The SMS gateway sends the verification code to the client terminal;
[0033] 4) After receiving the text message containing the verification code, the client terminal sends the verification code to the server;
[0034] 5) The server completes the verification according to the verification code sent by the client terminal, and crea...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 