Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for verifying login

A login method and technology of verification steps, applied in the field of verification login, can solve the problems of increasing operating costs, different second passwords, inconvenient use, etc., and achieve the effect of improving security and reducing information security.

Inactive Publication Date: 2012-01-11
CHUNGHWA TELECOM CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, this method has two main disadvantages. First, the network service provider must spend extra resources to plan a corresponding verification mechanism on the website server before it can verify the second password entered by the user. For network service providers, the operating cost has been greatly improved; secondly, because the second passwords required by different network service providers are often different, for users, in addition to needing to memorize multiple sets of different second passwords, In addition to one password, you may also need to purchase a different password generator, which is not only inconvenient to use, but also increases the burden

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying login
  • Method for verifying login
  • Method for verifying login

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical content of the present invention is described below through specific specific embodiments, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific examples, and various modifications and changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0023] Please also refer to figure 1 and figure 2 , figure 1 It is a flow chart of the steps of the verification login method of the present invention, figure 2 Then, the application system architecture diagram of the authentication and login method of the present invention is drawn. Such as figure 1 and figure 2 As shown, the verification login method of the present invention is applied to a system architecture havi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for verifying login, which is applied among a user-side device, a website server and a verifying server which are connected through a network system. The method comprises the following steps: firstly, enabling the user-side device and the website server to respectively obtain a user recognizing element and a website recognizing element towards the verifying server; secondly, enabling the user-side device to provide an account number and / or a password for the website server, so as to carry out verification; thirdly, enabling the user-side device passing the verification to provide the user recognizing element obtained from the verifying server for the website server, thereby enabling the website server to provide the user recognizing element and the website recognizing element obtained from the verifying server for the verifying server, so as to further carry out the verification; and finally, when the verification passes, enabling the website server to open the user-side device to carry out the login.

Description

technical field [0001] The present invention relates to a verification and login method, in particular, a verification and login method using user identification elements and website identification elements for double verification. Background technique [0002] Setting up web servers for users to browse and use is the main trend of information exchange today, such as promotional websites set up by companies, auction sites set up by individual sellers, and service providers such as network service providers or system service application providers. Serving websites, etc., are common types of web servers in daily life. [0003] Generally speaking, users can connect their computers to the Internet to browse specific web pages, and when users want to further use related advanced network services, they may need to enter the default account number and / or password for the network These web services can only be used after completing login procedures such as identity authentication. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 何维中
Owner CHUNGHWA TELECOM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products