Authentication method, electronic equipment and authentication server

A technology of authentication server and authentication method, applied in the fields of authentication method, electronic equipment and authentication server, can solve the problem that data card information is easily stolen by others, and achieve the effect of improving security

Inactive Publication Date: 2010-06-30
HUAWEI DEVICE CO LTD
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the prior art, most data cards are authenticated by a Personal Identification Number (PIN) code, once the data card is lost, the information in the data card is easily stolen by others

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, electronic equipment and authentication server
  • Authentication method, electronic equipment and authentication server
  • Authentication method, electronic equipment and authentication server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] figure 1 It is a flowchart of an embodiment of the authentication method of the present invention, such as figure 1 As shown, this embodiment may include:

[0026] Step 101, the electronic device receives first biological information input by a user, and converts the first biological information into first binary information.

[002...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an authentication method, electronic equipment and an authentication server. The authentication method includes the steps of receiving first biological information input by a user and transforming the first biological information into first binary information; obtaining second binary information which is generated according to a user identification code corresponding to a password input by the user; generating to-be-authenticated information according to the first binary information and the second binary information; sending the to-be-authenticated information to the authentication server so as to authenticate the to-be-authenticated information according to stored authentication information. The embodiment of the invention realizes double-factor authentication based on the password and the biological information, thereby improving the security of a data card.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of communication, and in particular, to an authentication method, electronic equipment, and an authentication server. Background technique [0002] The data card can be used as an Internet device connected to the network, and has the characteristics of plug and play. Currently, the application software can be directly installed on the data card by establishing a virtual layer technology on the operating system of a personal computer (hereinafter referred to as: PC). The software installed on the data card can be used at any time, any place, and on any PC, plug and play, and leave no trace of privacy. [0003] In addition, the data card itself has a storage function and can be used to store personal data of the user, such as personal photos or bank account numbers. However, in the prior art, most of the data cards are authenticated by a Personal Identification Number (PIN) code. Onc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 何瑞芳
Owner HUAWEI DEVICE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products