Unlock instant, AI-driven research and patent intelligence for your innovation.

User authentication method and device, electronic equipment and computer readable storage medium

A technology for user authentication and authentication equipment, applied in the field of system security, can solve the problem of low security in the user authentication process, and achieve the effect of improving security and ensuring secure transmission

Active Publication Date: 2022-01-14
深圳竹云科技股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the above problems, embodiments of the present invention provide a user authentication method, device, electronic equipment and computer-readable storage medium, which are used to solve the problem of low security in the user authentication process existing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and device, electronic equipment and computer readable storage medium
  • User authentication method and device, electronic equipment and computer readable storage medium
  • User authentication method and device, electronic equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present invention are shown in the drawings, it should be understood that the invention may be embodied in various forms and should not be limited to the embodiments set forth herein.

[0044] figure 1 A flow chart of a user authentication method according to an embodiment of the present invention is shown, and the method can be applied to a security authentication server. The memory of the security authentication server is used to store at least one executable instruction, and the executable instruction causes the processor of the security authentication server to execute the operation of the above user authentication method.

[0045] like figure 1 As shown, the method includes the following steps:

[0046] Step 110: Obtain the user's application login request for the target application in the first ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to the technical field of system security, and discloses a user authentication method and device, electronic equipment and a computer readable storage medium. The method comprises the following steps: acquiring an application login request of a user for a target application in first equipment; determining an application authentication mode corresponding to the target application, indicating the user to input application authentication information through the second equipment according to the application authentication mode, wherein the target application is any application in the first equipment, different applications in the first device correspond to different application authentication modes, and the application authentication information comprises biological recognition information of the user; obtaining to-be-authenticated information sent by the second equipment, wherein the to-be-authenticated information is information generated after the second device signs the application authentication information; and authenticating the to-be-authenticated information, and if the to-be-authenticated information passes the authentication, sending indication information for allowing the user to log in the target application to the first equipment. According to the embodiment of the invention, the security of the user authentication process is improved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of system security, and in particular to a user authentication method, device, electronic equipment, and computer-readable storage medium. Background technique [0002] With the continuous development of Internet technology, the importance of network security has been highlighted. When a user logs in to an application system, authenticating the user is an important part of ensuring network security. [0003] In related technologies, the user is mainly authenticated through the authentication information input by the user on the terminal device. For example, the user may input account information, short message information, etc. on the terminal device. However, in the process of implementing the embodiments of the present invention, the inventors found that: in related technologies, when a user logs in to different application systems, different application systems independently au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/45G06F21/64
CPCG06F21/32G06F21/45G06F21/64
Inventor 杨一蛟
Owner 深圳竹云科技股份有限公司