Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication information transmission method and device and user information authentication system

A technology for authenticating information and user information, applied in the Internet field, can solve problems such as user information insecurity, and achieve the effect of improving security and preventing tampering and simulation

Inactive Publication Date: 2018-01-19
21CN
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to address the problem of insecure user information in the transmission process in the prior art, and propose a method and device for authenticating information transmission to improve the security of user information in the transmission process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication information transmission method and device and user information authentication system
  • Authentication information transmission method and device and user information authentication system
  • Authentication information transmission method and device and user information authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0027] Such as figure 1 As shown, it is a schematic flow chart of an embodiment of the authentication information transmission method of the present invention, including the following steps:

[0028] Step S11, converting the user information in the received authentication information into first encrypted information of a set type.

[0029] The authentication information may be information requested by a terminal accessing the authentication platform through a data network; taking mobile phone authentication as an example, the mobile phone sends the authentication information to the operator's gate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authentication information transmission method and device. The method includes the steps: transforming user information in received authentication information into first encrypted information of a set type; encrypting a preset secret key to obtain second encrypted information of the set type; symmetrically encrypting the first encrypted information by taking the secondencrypted information as a secret key to obtain encrypted user information; transmitting the encrypted user information to an authentication platform. By double encrypted transmission of the authentication information, the authentication information is prevented from being tampered and simulated in the transmission process, and safety of the authentication information in the transmission process is improved.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to an authentication information transmission method and device and a user information authentication system. Background technique [0002] With the development of the mobile Internet, there are more and more authentication operation scenarios relying on user information identified by operators, such as password-free login, password-free payment, human-machine separation, user identification and other scenario applications. Using the user information identified by the operator greatly improves the usability and user experience of the system. However, if you do not pay attention to safety, it is very easy for criminals to tamper with and simulate user information. [0003] In the traditional technology, after the operator gateway receives the authentication request of user information through the base station, it transmits it to the authentication platform for authentication, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 陈鑫黄训涛张颖马幸晖王家宾
Owner 21CN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products