Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cross-terminal permission authentication method and system and internet bank server, and mobile server

A technology of mobile server and authentication method, applied in the field of mobile server, cross-terminal authorization authentication method, system and online banking server, can solve the problems of increasing inconvenience, downloading plug-in network speed requirements, insufficient optimization, etc., to improve security and Ease of use, reducing restrictions on carrying items, ensuring timeliness and safety effects

Inactive Publication Date: 2018-07-03
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While security controls bring users security, they also greatly increase the inconvenience of use:
[0005] (1) If it is used in a new environment, the user must install the control, which increases the operation time and steps, and the download of the plug-in also has certain requirements for the network speed;
[0006] (2) Due to insufficient optimization, security controls sometimes have an impact on browser performance, causing inconvenience to users;
[0007] (3) If the newly released browser contains some security controls that do not support or conflict functions, the user cannot use the new version of some mainstream browsers to log in to online banking
Using these verification media can effectively protect customer information, but it also brings some inconvenience:
[0009] (1) These media are not commonly used items by users, and they will not be carried with them. Once they need to do transactions related to signature verification, they will be helpless, which limits the scenarios for users to use PC-side applications;
[0010] (2) Some emerging authentication methods cannot be introduced into PC-side applications or require additional equipment, such as fingerprints, face recognition, voiceprint, etc., which is inconvenient for customers to operate, and also makes PC-side applications lag behind the technological development trend of the times

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-terminal permission authentication method and system and internet bank server, and mobile server
  • Cross-terminal permission authentication method and system and internet bank server, and mobile server
  • Cross-terminal permission authentication method and system and internet bank server, and mobile server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0033]Those skilled in the art know that the embodiments of the present invention can be implemented as a system, device, device, method or computer program product. Therefore, the present disclosure may be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0034] The principle and spirit of the present invention will be explained in detail below wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cross-terminal permission authentication method and system and an internet bank server, and a mobile server; the method comprises the following steps: receiving an authentication request from a PC end; parsing the authentication request, forming authentication application information according to application identification information contained in the authentication request, and sending the authentication application information to the mobile end; receiving authorization feedback information returned by the mobile end and containing an authentication code; comparing the authorization feedback information returned by the mobile end with an authentication code inputted on the PC end by the user, if said codes are consistent, the verification passes, thus finishing authorization on the PC end. The method can easily use PC end applications at will without being limited by the network environment and computer environment, thus reducing belonging limitations; the mobile end participates in the verification, thus enriching user interactive modes, and improving the system safety and easy usability; in addition, the method can ensure the time efficiency and safety,thus fundamentally preventing third party from maliciously gaining user information or other modes from harming users.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a cross-terminal authorization authentication method, system, online banking server, and mobile server. Background technique [0002] For a long time, PC-side applications have played a pivotal role in e-banking. In recent years, with the development of the mobile Internet, the usage ratio of mobile clients has increased significantly. Even so, PC-side applications cannot be replaced due to their unique advantages. The main reasons include: larger display screens can display information more comprehensively; convenient input devices can input more complex information; convenient and other application software to interact. [0003] However, as users have increasingly demanding product experience, some problems with PC-side applications have seriously affected users' more frequent use. [0004] First of all, in order to prevent users from logging in in an unsafe networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40H04L29/06
CPCG06Q20/4014H04L63/08
Inventor 吴迪张兴伟胡培玥冯丽
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products