AUTHENTICATION METHOD, AUTHENTICATION APPARATUS AND AUTHENTICATION SYSTEM
First Claim
1. An authentication method, comprising:
- receiving second authentication information sent by an application server when first authentication succeeds;
sending the second authentication information to a corresponding terminal through a telecommunication network;
receiving an identifier (ID) for identifying the terminal and second authentication verification information that are returned by the terminal through the telecommunication network; and
performing second authentication according to the ID and the second authentication verification information, or forwarding the ID and the second authentication verification information to the application server, so that the application server performs the second authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentication method includes: receiving second authentication information sent by an application server when first authentication succeeds; sending the second authentication information to a corresponding terminal through a telecommunication network; receiving an identifier (ID) for identifying the terminal and the second authentication verification information that are returned by the terminal through the telecommunication network; and performing a second authentication according to the ID and the second authentication verification information, or forwarding the ID and the second authentication verification information to the application server, so that the application server performs the second authentication.
-
Citations
5 Claims
-
1. An authentication method, comprising:
-
receiving second authentication information sent by an application server when first authentication succeeds; sending the second authentication information to a corresponding terminal through a telecommunication network; receiving an identifier (ID) for identifying the terminal and second authentication verification information that are returned by the terminal through the telecommunication network; and performing second authentication according to the ID and the second authentication verification information, or forwarding the ID and the second authentication verification information to the application server, so that the application server performs the second authentication. - View Dependent Claims (2, 3)
-
-
4. A third-party authentication apparatus, comprising:
-
a first receiving module, configured to receive second authentication information sent by an application server when first authentication succeeds; a sending module, configured to send the second authentication information to a corresponding terminal through a telecommunication network; a second receiving module, configured to receive an identifier (ID) for identifying the terminal and second authentication verification information that are returned by the terminal through the telecommunication network; and an authentication module, configured to determine whether the ID and the second authentication verification information agree with registration information of a user of the terminal.
-
-
5. An authentication system, comprising:
-
an application server, configured to perform first authentication according to received verification information, and send second authentication information when the first authentication succeeds; and a third-party authentication apparatus, configured to receive the second authentication information, send the second authentication information to a corresponding terminal through a telecommunication network, receive an identifier (ID) for identifying the terminal and second authentication verification information that are returned by the terminal through the telecommunication network, and perform second authentication according to the ID and the second authentication verification information.
-
Specification