Authorization code generation method, identity authentication method, terminal, server and medium

A server and authorization code technology, applied in the field of data security, can solve problems such as being easily impersonated and not very safe, and achieve the effect of improving security, high login security, and realizing multi-terminal login

Pending Publication Date: 2022-04-08
BEIJING SENSESHIELD TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the authorization code currently popular in the market is only composed of a random string, which is not very safe and is easy to be impersonated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization code generation method, identity authentication method, terminal, server and medium
  • Authorization code generation method, identity authentication method, terminal, server and medium
  • Authorization code generation method, identity authentication method, terminal, server and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] Below, specific embodiments of the present invention will be described in detail in conjunction with the accompanying drawings, but they are not intended to limit the present invention.

[0069] It should be understood that various modifications may be made to the embodiments disclosed herein. Accordingly, the following description should not be viewed as limiting, but only as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the disclosure.

[0070] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and, together with the general description of the disclosure given above and the detailed description of the embodiments given below, serve to explain the embodiments of the disclosure. principle.

[0071] These and other characteristics of the invention will become apparent from the following description of prefe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an authorization code generation method, an identity verification method, a terminal, a server and a storage medium, the authorization code generation method is applied to a first terminal, and the method comprises the following steps: uploading a user identity identifier to the server; obtaining a unique identification code fed back by the server under the condition that the server receives the user identity identifier, wherein the unique identification code is associated with the user identity identifier; the unique identification code is processed based on a first autonomous protocol to form an identification code ciphertext and an authorization code matched with the identification code ciphertext, the first autonomous protocol is determined by negotiation of the first terminal and the server, and the authorization code is used for identity authentication when the same user logs in the server based on the same or different terminals. The identification code ciphertext is formed by encrypting the unique identification code by a random key; and sending the random key and the identification code ciphertext to the server.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of data security, and in particular to an authorization code generation method, an identity authentication method, a terminal, a server and a medium. Background technique [0002] At present, there are many types of terminals. When we need to log in on different terminals, identity authentication for information synchronization becomes a problem. The traditional user password login is not safe and inconvenient, and the way of SMS verification code is also more troublesome, especially in the case of poor signal. So now there are authorization codes on the market to provide identification. However, the authorization code currently popular in the market is only composed of a random character string, which is not very safe and is easy to be impersonated. Contents of the invention [0003] An embodiment of the present invention provides a method for generating an authorization code, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/31H04L9/40
Inventor 孙吉平刘思宇
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products