Login verification method and terminal device

A technology for login verification and target terminal, which is applied in the field of login verification methods and terminal equipment, can solve the problems of inability to guarantee the security of login accounts, account theft, etc., and achieve the effect of ensuring security and reducing the risk of theft

Inactive Publication Date: 2018-06-19
SHENZHEN MAIMAITI INFORMATION TECH CO LTD
View PDF10 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method of only verifying the login through one login information, the login verification process is too simple, cannot guarantee the security of the login account, and there is a risk of account theft

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login verification method and terminal device
  • Login verification method and terminal device
  • Login verification method and terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0032] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0033] It ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of communications, and provides a login verification method and a terminal device. The method comprises the following steps: receiving a login request sentby a target terminal, wherein the login request carries target account information and a target terminal device identifier; judging whether the target terminal device identifier exists in a pre-stored terminal device identifier; if it is judged that the target terminal device identifier does not exist in the pre-stored terminal device identifier, obtaining user identity information correspondingto the target account information; generating identity authentication prompt information according to the user identity information; sending the identity authentication prompt information to the target terminal; receiving identity authentication information returned by the target terminal, and judging whether the identity authentication information is matched with the identity information; and ifit is judged that the identity authentication information is matched with the identity information, allowing the target terminal to log in a server. As the login verification needs to be performed onthe login device for multiple times, the security of the login account is ensured, and the steal risk of the login account is reduced.

Description

technical field [0001] The invention belongs to the technical field of communications, and in particular relates to a login verification method and terminal equipment. Background technique [0002] With the development of Internet technology, the network has become inseparable from people's life, and more and more people choose the network as a tool for communication, entertainment and shopping. During the sales process of financial products, sales users need to log in to the background server through terminal devices, such as mobile phones and tablet computers (Personal Digital Assistant, PDA), to handle financial services. [0003] At present, the method for sales users to verify the device through the background server of the central terminal device is mainly that the terminal device sends a login request to the background server, and the background server judges whether the login information carried in the login request is correct. If it is correct, the login is allowed....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/12
Inventor 游昌永秦溪罗爱军封文进郭巧佳
Owner SHENZHEN MAIMAITI INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products