Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety authentication method and device

A technology of security authentication and security verification, applied in the field of security authentication methods and devices, can solve problems such as complicated installation, easy input errors, unusable certificates, etc., and achieve the effect of fast security verification and simplified verification process

Active Publication Date: 2020-05-12
ALIBABA GRP HLDG LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In related technologies, the security verification scenario of sellers mainly uses certificates for security prevention and control. The certificate itself has certain experience problems, such as complicated installation, browser operating system compatibility issues, etc.
In the future, the browser may not support the control, resulting in the unusable certificate, and it cannot be used normally for active sellers and sub-accounts on the entire network
2. Receive text messages or dynamic passwords through a terminal (such as a mobile phone), and then enter the received information on the PC to pass the verification. The disadvantage is that verification is required every time, and it is necessary to switch between the PC and the mobile phone and manually enter the information. The steps are lengthy Cumbersome and prone to typos
[0003] For the above problems, no effective solution has been proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety authentication method and device
  • Safety authentication method and device
  • Safety authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040]According to the embodiment of the present application, an embodiment of a security authentication method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0041] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a hardware structure block diagram of a computer terminal of a security authentication method in the embodiment of this application. Such as figure 1 As shown, the computer terminal 10 may include one or more (only one is shown in the figure) processors 102 (the proce...

Embodiment 2

[0119] According to the embodiment of the present application, a security authentication method is also provided, Figure 16 It is the flow of the security authentication method according to Embodiment 2 of the present application Figure 1 , the method includes:

[0120] Step S1602, the trusted device of the specified account receives the security verification request sent by the server for requesting to verify the specified operation; wherein, the specified operation is a specified operation performed by the specified account; account, the trusted device includes: a first trusted device or a second trusted device, wherein the first trusted device is the trusted device registered with the master account, and the second trusted device is the sub Trusted device for account registration;

[0121] It should be noted that the above-mentioned specified operation may be a specified type of operation, and the specified type of operation may be a risky operation, such as a dangerous...

Embodiment 3

[0127] According to an embodiment of the present invention, a device for implementing the above security authentication method is also provided, Figure 17 is the structural frame of the security authentication device according to Embodiment 3 of the present application Figure 1 ,Such as Figure 17 As shown, the device includes:

[0128] The first receiving module 1702 is configured to receive an operation request sent by a designated account, where the operation request is used to instruct the designated account to perform a designated operation;

[0129] It should be noted that the above-mentioned specified operation may be a specified type of operation, and the specified type of operation may be a risky operation, such as a dangerous operation, etc., but may also be a non-risky operation, that is, a safe operation, but is not limited to this. Risky operations can refer to operations performed by the designated account with security issues, operations performed on a netw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security authentication method and device. The method comprises the following steps: receiving an operation request sent by a specified account, wherein the operation request is used for instructing the specified account to execute a specified operation; acquiring the type of the specified account; when the specified account is a sub-account belonging to a main account, sending a security verification request for requesting to authenticate the specified operation to first trusted equipment or second trusted equipment, wherein the first trusted equipment is trusted equipment to which the main account is registered, and the second trusted equipment is trusted equipment to which the sub-account is registered; and receiving a verification result returned after the first trusted equipment or the second trusted equipment performs one-click verification on the security verification request, wherein the one-click verification is a verification process triggered after a special button on the trusted equipment receives a trigger instruction.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular, to a security authentication method and device. Background technique [0002] In related technologies, there are mainly two ways for the security verification of high-risk operations on the PC side of the user: 1. The current terminal (such as a computer) installs a digital certificate to become a trusted device. The disadvantage is that it can only be operated on the current terminal. If the device is replaced, it needs to be reset Only after installing a digital certificate can relevant operations be performed. and. In related technologies, the security verification scenario of sellers mainly uses certificates for security prevention and control. The certificate itself has certain experience problems, such as complicated installation and browser operating system compatibility issues. In the future, the browser may not support the control, resulting in the unusable ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/0892H04L65/1073
Inventor 邓青申军立张尧陈龙付若尘
Owner ALIBABA GRP HLDG LTD