Security authentication method, system and computer-readable storage medium

A technology of security authentication and authentication system, applied in the field of systems and computer-readable storage media, and security authentication methods, and can solve the problems of poor user experience and low security authentication coefficient.

Active Publication Date: 2020-11-06
BANK OF CHINA
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a security authentication method to solve the technical problems of low security authentication coefficient and poor user experience in the prior art
[0005] The embodiment of the present invention also provides a computer-readable storage medium to solve the technical problems of low security authentication coefficient and poor user experience in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method, system and computer-readable storage medium
  • Security authentication method, system and computer-readable storage medium
  • Security authentication method, system and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0015] In an embodiment of the present invention, a security authentication method is provided, such as figure 1 As shown, the method includes:

[0016] Step 101: Before the security authentication, collect the user information of the user who logs in to the authentication system and the first preset device hardware information of the mobile terminal used by the user to log in to the authentication system for binding, and combine the user information and the first One-to-one binding storage of preset device hardware information;

[0017] Step 102: During the security authentication process, c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a security authentication method, system, and computer-readable storage medium, wherein the method includes: before security authentication, collecting user information of a user who logs in to the authentication system and binding the user information to the user login authentication system The hardware information of the first preset device of the mobile terminal, and store the user information and the hardware information of the first preset device in a one-to-one binding; The second preset device hardware information of the terminal instructs the communication device to send a SMS verification code to the mobile terminal used for authentication by the user, and store the SMS verification code; receive the verification code input by the user; When the preset device hardware information matches successfully and the verification code entered by the user matches the SMS verification code successfully, the authentication is passed.

Description

technical field [0001] The invention relates to the technical field of financial transactions, in particular to a security authentication method, system and computer-readable storage medium. Background technique [0002] With the popularization of mobile Internet financial products, security incidents of financial transactions on mobile terminals occur frequently. Financial interbank products usually use SMS verification code authentication or independent security authentication devices such as Token and CA. The transaction security authentication methods used by financial transaction products (systems) are roughly divided into three categories: the first type is verification codes, such as mobile phone SMS Verification code, telephone voice verification code, graphic verification code, etc.; the second type is hardware device authentication, such as E-Token, digital certificate CA authentication, etc.; the third type is based on the combination of the previous two types of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W4/14H04W12/06
CPCH04L63/08H04L63/0876H04W4/14H04W12/06
Inventor 庞健
Owner BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products