Safety authentication method and device
A technology of security authentication and security verification, applied in the field of security authentication methods and devices, can solve problems such as complicated installation, easy input errors, unusable certificates, etc., and achieve the effect of fast security verification and simplified verification process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040]According to the embodiment of the present application, an embodiment of a security authentication method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0041] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a hardware structure block diagram of a computer terminal of a security authentication method in the embodiment of this application. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processors 102 (the proce...
Embodiment 2
[0119] According to the embodiment of the present application, a security authentication method is also provided, Figure 16 It is the flow of the security authentication method according to Embodiment 2 of the present application Figure 1 , the method includes:
[0120] Step S1602, the trusted device of the specified account receives the security verification request sent by the server for requesting to verify the specified operation; wherein, the specified operation is a specified operation performed by the specified account; account, the trusted device includes: a first trusted device or a second trusted device, wherein the first trusted device is the trusted device registered with the master account, and the second trusted device is the sub Trusted device for account registration;
[0121] It should be noted that the above-mentioned specified operation may be a specified type of operation, and the specified type of operation may be a risky operation, such as a dangerous...
Embodiment 3
[0127] According to an embodiment of the present invention, a device for implementing the above security authentication method is also provided, Figure 17 is the structural frame of the security authentication device according to Embodiment 3 of the present application Figure 1 ,Such as Figure 17 As shown, the device includes:
[0128] The first receiving module 1702 is configured to receive an operation request sent by a designated account, where the operation request is used to instruct the designated account to perform a designated operation;
[0129] It should be noted that the above-mentioned specified operation may be a specified type of operation, and the specified type of operation may be a risky operation, such as a dangerous operation, etc., but may also be a non-risky operation, that is, a safe operation, but is not limited to this. Risky operations can refer to operations performed by the designated account with security issues, operations performed on a netw...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


