Method for using authentication security in electronic communication

A safe and electronic technology, applied in the field of authentication security, can solve the problems of lack of identity authentication methods, information leakage, etc., and achieve the effect of electronic communication process security and authentication security

Inactive Publication Date: 2019-04-12
GUILIN UNIV OF AEROSPACE TECH
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the deficiencies of the prior art, the present invention discloses a method for using authentication security in electronic communication, which can solve the problem of lack of a secure identity authentication method in the existing multi-person electronic communication process, which leads to irrelevant personnel in the communication process Will enter into the communication, and then cause the problem of information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for using authentication security in electronic communication
  • Method for using authentication security in electronic communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0023] see Figure 1-2 : a method for using authentication security in electronic communication, the steps of the authentication security method are as follows:

[0024] S1. The first communication device creates an electronic communication room, automatically generates a room number, and then sets room verification information;

[0025] S2. The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of electronic communication security, and specifically relates to a method for using authentication security in an electronic communication. The method comprises the following steps: creating an electronic communication room by first communication equipment, automatically generating a room number, and then setting room verification information; inputting the room number and entering a room by second communication equipment, inputting a static key, and verifying the static key; after the verification is passed, answering an identity information verification problem; after the identity information verification problem is answered correctly, connecting to the room; and sending a voice verification application by the second communication equipment;receiving the voice verification application by the first communication equipment, and judging voice information; receiving a pairing verification code by the second communication equipment and generating a pairing application code; and inputting the pairing application code by two groups of communication equipment to complete pairing, and establishing a communication connection. The method for using the authentication security in the electronic communication provided by the invention solves the problem that information is leaked since irrelevant personnel can enter the communication in the communication process due to the lack of a secure identity authentication method in the existing multi-person electronic communication process.

Description

technical field [0001] The invention relates to the technical field of electronic communication security, in particular to a method for using authentication security in electronic communication. Background technique [0002] Communication is the transfer of information, which refers to the transmission and exchange of information from one place to another, with the purpose of transmitting messages. Communication is the exchange and transmission of information between people through a certain medium. In a broad sense, no matter what method or medium is used, as long as the information is transmitted from one place to another, it can be called communication. [0003] With the development of society, the timeliness of communication is more and more sought after by the public. For this reason, more and more electronic communication devices have been created, and by using these electronic communication devices to realize instant communication, the communication between people b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCH04L9/3226H04L9/3231H04L63/083H04L63/0861H04L67/141
Inventor 嵇建波李赛菊邓莉杨娟杨双熊川杨冰王鹏举赵素文
Owner GUILIN UNIV OF AEROSPACE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products