Safety verification method, device, terminal and server

A security verification and server technology, which is applied in the field of security verification methods, devices, terminals and servers, can solve problems such as poor reliability, and achieve the effect of improving reliability and ensuring access security

Active Publication Date: 2019-05-14
ADVANCED NEW TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a safety verification method, device, terminal and server to solve the problem of poor reliability of safety verification methods in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety verification method, device, terminal and server
  • Safety verification method, device, terminal and server
  • Safety verification method, device, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The exemplary embodiments will be described in detail here, and examples thereof are shown in the accompanying drawings. When the following description refers to the accompanying drawings, unless otherwise indicated, the same numbers in different drawings represent the same or similar elements. The implementation manners described in the following exemplary embodiments do not represent all implementation manners consistent with the present application. Rather, they are merely examples of devices and methods consistent with some aspects of the application as detailed in the appended claims.

[0045] The terms used in this application are only for the purpose of describing specific embodiments, and are not intended to limit the application. The singular forms of "a", "said" and "the" used in this application and the appended claims are also intended to include plural forms, unless the context clearly indicates other meanings. It should also be understood that the term "and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a security verification method, device, terminal and server. The method includes: when a terminal user performs security verification, performing local verification by updating the verification method to obtain a local verification result; The information encrypts the local verification result to obtain the encrypted verification result; sends the encrypted verification result, the local verification result and the user information of the end user to the server, so that the server can verify the encrypted verification result through the replacement credential information corresponding to the user information. When the verification result is passed, it is determined that the local verification result is credible. By applying the embodiments of the present application, since a malicious third party cannot obtain the replacement credential information, even if it obtains the local verification result, it cannot complete the security verification. Therefore, the embodiments of the present application can improve the reliability of the security verification and ensure the access of the network application. safety.

Description

Technical field [0001] This application relates to the field of communication technology, and in particular to security verification methods, devices, terminals and servers. Background technique [0002] With the development of smart terminals and network applications, users can access various network applications through various application clients installed on the terminal. During the access process, users often need to perform identity authentication, membership registration, network transactions, etc. , The application server will authenticate the user at this time. The traditional verification method is application server verification, that is, the user sends a preset verification password to the application server through the terminal, and when the application server verifies that the verification password is consistent with the password when the user registered, the verification is passed. However, the verification password in the above verification method is easy to be s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCG06F21/32H04L63/0428H04L63/0807H04W12/02H04L9/32H04W12/03H04W12/069H04L9/0869H04L63/10H04L63/12H04L9/0819H04L9/0894H04L9/14H04L9/30H04L9/3247H04L2209/80H04W12/06
Inventor 林钧燧
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products