Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and equipment

An authentication method and authentication server technology, which are applied to mobile terminals, PC terminals, auxiliary authentication servers, and authentication fields, and can solve problems such as inconvenient Internet experience.

Active Publication Date: 2019-06-07
西安新路网络科技有限公司
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This brings great inconvenience to the user's online experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and equipment
  • Authentication method and equipment
  • Authentication method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] As described in the background technology, the current main way for PCs to access the Internet is to log in with a user name and password. The user directly interacts with the PC to input the user name and password. This way to surf the Internet, the user will slowly ignore or forget the user name and password. When the user switches computers or redoes the system on the computer, it is not very convenient for the user to log in with the user name and password (need to call or send a text message) Re-obtain user name and password), which brings great inconvenience to users when surfing the Internet.

[0052] At the same time, with the popularization of smart phones (mobile terminals), people own and use mobile phones more and more frequently. In order to solve this technical problem, the present invention introduces mobile terminals and auxiliary authentication servers to store user information on mobile phones. Interact with the PC and the auxiliary authentication serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method. the mobile terminal generates a user token after passing the pre-authentication according to the user information and sends the user token and sessioninformation contained in the image to an auxiliary authentication server according to the image displayed by the PC, and the auxiliary authentication server obtains the user name and the user password after the user token passes the authentication, and sends the user name and the user password to the PC after receiving the session information sent by the PC, so that the PC initiates network loginauthentication to the authentication server. According to the scheme, the PC end can complete network login without depending on previous records or temporarily inputting the user name and the password by the user, so that the problem that the user is inconvenient to surf the Internet due to the fact that the user name and the password are lost or the user forgets the user name and the password is avoided, and the Internet surfing experience of the user is improved.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an authentication method. The invention also relates to a mobile terminal, a PC terminal and an auxiliary verification server. Background technique [0002] With the continuous development of network technology, users always need to use terminal equipment (such as PC) to log in to the network to obtain information or perform production activities in life and work. Before this process, users need to use their own verification information for authentication, and then they can log in to the network. [0003] At present, the main way for users to access the Internet through terminal devices is to log in with a user name and password, and the user directly interacts with the terminal device to input the user name and password. In order to facilitate the user's login operation, terminal equipment in the prior art generally provides the functions of recording user name and pass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 曹亮
Owner 西安新路网络科技有限公司