Equipment pairing based safety authentication method

A technology for security authentication and equipment, which is applied in branch office equipment, digital data authentication, secure communication devices, etc., can solve problems such as difficulty in remembering different account names and passwords, and hacker attacks with the same account name and password, so as to reduce the number of crash attacks risk, the effect of increasing ease of use

Inactive Publication Date: 2017-11-03
SHENZHEN YIJIAEN TECH CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to propose a security authentication method based on device pairing, which solves the problem in the traditional technology that using the same account name and password for multiple APPs is easy to be attacked by hackers, but it is difficult to remember when using different account names and passwords. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment pairing based safety authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention aims to propose a security authentication method based on device pairing, which solves the problem in the traditional technology that using the same account name and password for multiple APPs is easy to be attacked by hackers, but it is difficult to remember when using different account names and passwords.

[0029] Below in conjunction with accompanying drawing and embodiment the scheme of the present invention will be further described:

[0030] Such as figure 1 As shown, the security authentication method based on device pairing in this embodiment includes the following specific implementation steps:

[0031] Step 101: Smart terminal A initiates a login request to the service platform:

[0032] In specific implementation, the terminal APP application of the service platform can be installed on the software system of the smart terminal A, and the user uses the terminal APP application and uses its login function to initiate a login request to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of communication safety authentication and discloses an equipment pairing based safety authentication method for solving the problems in the prior art that multiple APPs when using a same account name and a same password are easily suffered from library-hitting attacks of hackers, and different account names and different passwords when being used by the multiple APPs are difficult to memorize. The method can be summarized by the steps of sending a pairing dimensional code to an intelligent terminal A by a service platform after the intelligent terminal A initiates a login request to the service platform and passes the verification; after the intelligent terminal B scans the dimensional code, requesting for logging automatically to the service platform; and after passing the verification of the platform, using the platform service by the intelligent terminal B. The equipment pairing based safety authentication method is suitable for safe and rapid login of equipment without requiring a user to memorize multiple user names and passwords.

Description

technical field [0001] The invention relates to the field of communication security authentication, in particular to a security authentication method based on device pairing. Background technique [0002] With the development of mobile Internet, more and more people begin to enjoy various Internet services through smart terminals, such as using Ctrip APP to book hotels, 12306 APP to buy train tickets, mobile phone Jingdong APP, mobile phone Taobao APP, Vipshop Online shopping such as APP and Suning.com APP, online transfer or wealth management using ICBC APP and China Construction Bank APP, etc. These Internet APP applications have greatly facilitated people's lives, but they have also brought some new problems. That is, how can users remember so many accounts and passwords. [0003] For users, each APP needs to register a new account. When registering an account, the account name used by the user is usually a mobile phone number or an email address, and the password is us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04M1/725G06F21/44G06K17/00
CPCG06F21/44G06K17/0025H04L9/3228H04L9/3297H04L63/0815H04L63/0838H04L63/108H04M1/72406
Inventor 李强王凤琴
Owner SHENZHEN YIJIAEN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products