A Server-Based User Authentication Method

A user authentication and server technology, applied in the field of information security, can solve the problems of increasing the difficulty of application development and the complicated process of obtaining mapping information collection, so as to save the time of user authentication, increase the retention rate of users, and ensure the effect of business

Active Publication Date: 2022-03-18
ZHEJIANG MEIRI HUDONG NETWORK TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this verification method only realizes the rapid verification of users of a specific application program on the mobile device, and the process of obtaining the mapping information set is relatively complicated, which increases the difficulty of application development

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Server-Based User Authentication Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail with reference to the accompanying drawings. This description presents, by way of illustration and not limitation, specific embodiments consistent with the principles of the invention in sufficient detail to enable those skilled in the art to practice the invention without departing from this disclosure. Other embodiments may be utilized and the structure of elements may be changed and / or substituted within the scope and spirit of the invention. Accordingly, the following detailed description should not be read in a limiting sense.

[0011] The invention provides a server-based user verification method. According to the present invention, the server can be physically realized as a server, and can also be realized as a server group including multiple servers; the mobile terminal can be physically realized as smart pho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a server-based user authentication method. The server can obtain a data set RS of association relationship between verified user IDs and mobile devices. The user verification method includes the following steps: step S100, the server receives a verification request message from the first mobile device, and obtains the user number identification PN_ID and device fingerprint information DFP in the message; step S200, the server queries the set RS, if find R m ∈ RS, Rm includes (pn_id m ,DS m ), pn_id m = PN_ID, and ds m,n Consistent with DFP, ds m,n ∈DS m , then confirm that PN_ID and DFP have an association relationship of passing verification, and the user identity verification passes; otherwise, confirm that PN_ID and DFP do not have an association relationship of passing verification, and continue to step S300; step S300, verifying the first mobile device by SMS verification, if If the verification of the short message is successful, the server adds an association relationship between the PN_ID and the first mobile device in the set RS.

Description

technical field [0001] The invention relates to information security technology, in particular to a server-based user verification method. Background technique [0002] In the prior art, when a user registers or logs in with an application program of a mobile device, or uses some services of the mobile device, identity verification, such as common SMS verification, is usually required. If the user uses multiple applications on the mobile device, every time he needs to pass SMS verification, the process is time-consuming and cumbersome, which reduces the user experience. In order to quickly verify, save verification time, and improve user experience at the same time, there has been a technology in which the user only needs to input a user number (such as a mobile phone number) to complete identity verification. For example, in the user verification method disclosed in Chinese invention patent application CN106685914A, the user inputs a mobile phone number on the mobile devic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F21/44
CPCH04L63/0876G06F21/44
Inventor 吕观祥董霖叶新江方毅
Owner ZHEJIANG MEIRI HUDONG NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products