Security authentication method and system

A security verification and security chip technology, applied in the field of security verification methods and systems, can solve problems such as hidden dangers, inability to guarantee security, and imperfect security verification mechanisms, and achieve the effect of ensuring communication and improving verification capabilities.

Inactive Publication Date: 2017-01-04
SHENZHEN GIONEE COMM EQUIP
View PDF3 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, smart terminal devices such as smart phones are widely popularized. When users use the application software of these smart terminals for the first time, they usually need to register first. High, such as application software that communicates through secure encryption chips, but the existing registration process security verification mechanism is not perfect. If the user identification card in the smart terminal device is illegally stolen, illegal users can also illegally use these application software, resulting in More and more security incidents of smart terminals have occurred, so the security of users using smart terminals to communicate cannot be guaranteed, and there are potential safety hazards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method and system
  • Security authentication method and system
  • Security authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] see figure 1 , figure 1 It is a schematic flow chart of a security verification method provided in Embodiment 1 of the present invention. The execution subject of this embodiment includes a client and a server, wherein the client may be a terminal, and specifically it may be a mobile phone or other smart terminals. figure 1 The shown security verification method may include the following steps:

[0036] S101. If the client detects a registration request containing the registration number input by the user, it obtains the registration information, wherein the registration information includes the serial number of the security chip, the identification code of the user identification card, and the communication information corresponding to the user identification card. Number.

[0037] Users need to register before using the application software of the client. For an APP that uses a security chip for encrypted communication, the user binds the user identification card co...

Embodiment 2

[0053] see figure 2 , figure 2 It is a schematic flow chart of a security verification method provided in Embodiment 2 of the present invention. The execution subject of this embodiment includes a client and a server, where the client may be a terminal, specifically a mobile phone or other smart terminals. figure 2 The shown security verification method may include the following steps:

[0054] S201. If the client detects a registration request containing the registration number input by the user, it obtains the registration information, wherein the registration information includes the serial number of the security chip, the identification code of the user identification card, and the communication information corresponding to the user identification card. Number.

[0055] Users need to register before using the application software of the client. For an APP that uses a security chip for encrypted communication, the user binds the user identification card corresponding t...

Embodiment 3

[0103] see image 3 , image 3 It is a schematic block diagram of a security verification system provided by Embodiment 3 of the present invention. For ease of description, only parts related to the embodiments of the present invention are shown. image 3 The example security verification system 300 may be the subject of execution of the security verification method provided in the first embodiment. image 3 The example security verification system 300 mainly includes a client 31 and a server 32, and the client 31 and the server 32 are connected through a network.

[0104] The client 31 mainly includes: a registration request unit 311 , a binding request unit 312 , a real-time acquisition unit 313 and a successful verification unit 314 . The details of each unit are as follows:

[0105] The registration request unit 311 is configured to obtain registration information if a registration request containing a registration number input by the user is detected, wherein the regi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a security authentication method and system. The method comprises the following steps: a client obtains registration information if detecting a registration request containing a registration number; the client uses the registration number and the registration information to apply for a server to bind a user identity identification card corresponding to the registration number with the client; the client obtains the registration information in real time if detecting that the user triggers to carry out communication through a security chip, and sends the registration information to the server; the server verifies whether the user identity identification card identified by the registration information is legally bound with the client, and allows the users to carry out the communication through the security chip if the verification is passed. According to the security authentication method and system disclosed by the embodiment of the invention, the user identity identification card corresponding to the registration number is bound with the client, so that the unique correspondence of the intelligent terminal and the user identity identification card can be realized, thereby improving the ability of the intelligent terminal to verify the legality of the user and guaranteeing the legal user to use the intelligent terminal to carry out communication.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a safety verification method and system. Background technique [0002] At present, smart terminal devices such as smart phones are widely popularized. When users use the application software of these smart terminals for the first time, they usually need to register first. High, such as application software that communicates through secure encryption chips, but the existing registration process security verification mechanism is not perfect. If the user identification card in the smart terminal device is illegally stolen, illegal users can also illegally use these application software, resulting in More and more security incidents of smart terminals have occurred, so the security of users using smart terminals to communicate cannot be guaranteed, and there are potential safety hazards. Contents of the invention [0003] The embodiments of the present invention provide a sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0876
Inventor 刘岩王三新徐黎
Owner SHENZHEN GIONEE COMM EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products