Safety verification method and device, terminal and server

A security verification and server technology, which is applied in the field of security verification methods, terminals, servers, and devices, can solve problems such as poor reliability, and achieve the effect of improving reliability and ensuring access security.

Active Publication Date: 2016-04-13
ADVANCED NEW TECH CO LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a safety verification method, device, terminal and server to solve the problem of poor reliability of safety verification methods in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification method and device, terminal and server
  • Safety verification method and device, terminal and server
  • Safety verification method and device, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0045] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a safety verification method and device, a terminal and a server. The method comprises the following steps of: when a terminal user performs safety verification, performing local verification through updating of a verification manner, and acquiring a local verification result; encrypting the local verification result according to stored replacement credential information and acquiring an encrypted verification result; and sending the encrypted verification result, the local verification result and user information of the terminal user to the server to enable the server to determine that the local verification result is credible when the verification of the encrypted verification result through the replacement credential information corresponding to the user information is successful. Through adoption of the method and the device, a malicious third party cannot acquire the replacement credential information, and even if the malicious third party acquires the local verification result, safety verification cannot be completed, so that the safety verification reliability is improved, and the access security of network applications is ensured.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a security verification method, device, terminal and server. Background technique [0002] With the development of smart terminals and the development of network applications, users can access various network applications through various application clients installed on the terminal. During the access process, users often need to perform identity authentication, membership registration, network transactions, etc. , the application server will authenticate the user identity. The traditional verification method is application server verification, that is, the user sends a preset verification password to the application server through the terminal, and the application server passes the verification when it verifies that the verification password is consistent with the user's registered password. However, the verification password in the above verification metho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCG06F21/32H04L63/0428H04L63/0807H04W12/02H04L9/32H04W12/03H04W12/069H04L9/0869H04L63/10H04L63/12H04L9/0819H04L9/0894H04L9/14H04L9/30H04L9/3247H04L2209/80H04W12/06
Inventor 林钧燧
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products