Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and system, terminal, server, computer system and medium

An authentication server and authentication method technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve the problems of cumbersome security authentication steps, poor user experience, and long time consumption.

Active Publication Date: 2021-06-29
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Security authentication services rely heavily on mobile banking, resulting in cumbersome security authentication steps, long time-consuming, and poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system, terminal, server, computer system and medium
  • Authentication method and system, terminal, server, computer system and medium
  • Authentication method and system, terminal, server, computer system and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] Hereinafter, embodiments of the present disclosure will be described with reference to the drawings. It should be understood, however, that these descriptions are exemplary only, and are not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present disclosure.

[0079] The terminology used herein is for the purpose of describing particular embodiments only, and is not intended to be limiting of the present disclosure. The terms "comprising", "comprising", etc. used herein indicate the presence of features, steps, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method, which comprises the following steps that: when a terminal receives an authentication request, the terminal calls an authentication SDK to obtain authentication data from a trusted authentication component and sends the authentication request carrying the authentication data to an authentication server, the authentication server receives the authentication request carrying the authentication data sent by the authentication SDK, verifies whether the authentication data is consistent with specified authentication data or no and returns an authentication result to the authentication SDK, and the terminal calls the authentication SDK to receive the authentication result returned by the authentication server and sends the authentication result to a first application. By installing the trusted authentication component in the terminal and integrating the authentication SDK in the first application, a user initiates an authentication process through the authentication SDK in the first application without waking up an application corresponding to the authentication server, namely, authentication does not need to be performed through the application corresponding to the authentication server. The invention further provides an authentication method and system, a terminal, a server, a computer system and a medium.

Description

technical field [0001] The present disclosure relates to the field of computer technology, and more specifically, to an authentication method and system, a terminal, a server, a computer system and a medium. Background technique [0002] Currently, the bank's security authentication services (for example, USB-shield, cipher, etc.) can only be used in the bank's own mobile banking. When a third party uses the bank's security authentication service, it must activate the mobile banking through the bank's SDK, and conduct security authentication in the mobile banking. [0003] The security authentication service relies heavily on mobile banking, resulting in cumbersome security authentication steps, long time-consuming, and poor user experience. Contents of the invention [0004] The first aspect of the present disclosure provides an authentication method applied to a terminal, where a first application program and a trusted authentication component are installed in the termi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3247H04L9/3226H04L63/0428H04L63/08H04L63/083H04L2209/56
Inventor 戎修凯宿兵畅任李哲赵婧
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA