Unlock instant, AI-driven research and patent intelligence for your innovation.

User authentication method and device and electronic device

A user authentication and user technology, applied in the field of user identity authentication, can solve problems such as difficulty in meeting application system authentication requirements and low security strength, and achieve the effect of facilitating user operation, improving security strength, and meeting authentication requirements

Inactive Publication Date: 2019-07-05
安信数字(广州)科技有限公司 +2
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, most application systems use the method of "username + password" to authenticate users; although the authentication method of "username + password" is easy to use, there is no hard carrier involved in the authentication process of this authentication method, and only data Compared and verified, the security intensity is low, and it is difficult to meet the authentication requirements of the application system for users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and device and electronic device
  • User authentication method and device and electronic device
  • User authentication method and device and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. the embodiment. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0027] At present, most application systems use the method of "username + password" to authenticate users; however, the security strength of the "username + password" authentication method is low, and it is difficult to meet the authentication requirements of application systems for users. Based on this, the present invention The embodiments provide a user authentication method, devi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user authentication method and device and an electronic device, wherein the method is applied to an application server, and the application server is in communication connection with a mobile terminal and a cloud key system server. The method comprises the steps of firstly receiving a user name and a user password of a user; after verifying that the user name and the userpassword are correct, generating an authentication two-dimensional code; displaying the authentication two-dimensional code, and scanning the authentication two-dimensional code by a user through themobile terminal; using the mobile terminal to send the signature request information to the cloud key system server through the authentication two-dimensional code to enable the cloud key system server to send the signature information corresponding to a user to the application server; and verifying the validity of the signature information, and if the signature information is valid, determining that the user authentication is successful. According to the invention, the user is authenticated by scanning the two-dimensional code through the mobile terminal of the user and signing through the cloud key system server, so that the security strength of the authentication mode is improved, at the same time, the user operation is facilitated, and the authentication requirement of an application system on the user is also met.

Description

technical field [0001] The present invention relates to the technical field of user identity authentication, in particular to a user authentication method, device and electronic equipment. Background technique [0002] At present, most application systems use the method of "username + password" to authenticate users; although the authentication method of "username + password" is easy to use, there is no hard carrier involved in the authentication process of this authentication method, and only data Compared and verified, the security intensity is low, and it is difficult to meet the authentication requirements of the application system for users. Contents of the invention [0003] In view of this, the purpose of the present invention is to provide a user authentication method, device and electronic equipment, so as to improve the security strength of the authentication method and meet the user authentication requirements of the application system. [0004] In the first as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/36
CPCG06F21/31G06F21/36
Inventor 蔡燕徐雪松何鸥翔颜星王刚徐智
Owner 安信数字(广州)科技有限公司