Authentication device, method and system

A technology for authentication equipment and authentication methods, which is applied in the field of information security, and can solve problems such as inconsistent authentication passwords, unstable information security equipment, and failure of legitimate users to log in successfully.

Inactive Publication Date: 2008-01-09
FEITIAN TECHNOLOGIES
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1) The information security device has a built-in password generation chip, and a special password generation algorithm is built into the password generation chip, which is used to generate a dynamic password through the algorithm every time the user authenticates, so the general hardware cost will be relatively high;
[0008] 2) For information security devices that use time factors to dynamically generate authentication passwords, there is a technical difficulty in the implementation of how to achieve time synchronization between information security devices and the server, because there are often times when legitimate users fail to authenticate due to time asynchrony , that is, information security devices that use time factors to dynamically generate authentication passwords have certain instability
[0009] 3) For information security devices that use event factors to dynamically generate authentication passwords, there is also a problem in the implementation, which is the failure of legal user authentication caused by out-of-sync counting
For example, when the user accidentally presses a button or other misoperation, the authentication password generated by pressing the button is not authenticated on the server, so that the event factors in the information security device and the server are inconsistent, so that in the next authentication, due to The dynamic calculation factors used by the information security device and the server to generate authentication passwords, that is, the event factors, are inconsistent, resulting in inconsistent authentication passwords generated by both ends, so legitimate users cannot log in successfully, and identity authentication fails.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication device, method and system
  • Authentication device, method and system
  • Authentication device, method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0112] Referring to Fig. 1, an embodiment of the present invention provides an authentication device 100, which specifically includes a storage module 101, a trigger module 102, an acquisition module 103, a display module 104, a deletion module 105, a control module 106 and a power supply module 107:

[0113] The storage module 101 is connected with the control module 106, and is used for storing a set of authentication passwords;

[0114] Storage module 101 can be an independent storage device, as FLASH chip, SD (Secure Digital, safe digital) card, microhard disk or smart card etc., also can be the storage device in the control chip (as the security design chip with storage unit etc.), the storage medium can be RAM (Random Access Memory, random access memory), ROM (Read-Only Memory, read-only memory), EPROM (Erasable Programmable Read-Only Memory, erasable programmable read-only memory), EEPROM (Electical Erasable Programmable Read-Only Memory, electrically erasable programma...

Embodiment 2

[0151] The embodiment of the present invention provides an authentication method, in which a set of corresponding authentication passwords and verification passwords are stored in the authentication device and the server in advance, the authentication device obtains the authentication password as the authentication code after receiving the trigger signal, and the client receives the user Enter the user ID and authentication code, and send the user ID and authentication code to the server, and the user can log in only after the server authentication is passed.

[0152] In this embodiment, a set of authentication passwords needs to be stored in the authentication device in advance, and a user ID and a set of verification passwords corresponding to the set of authentication passwords stored in the authentication device are stored on the server side. The authentication password and the verification password can be provided by the device Produced by the manufacturer, it can also be ...

Embodiment 3

[0186] Referring to Fig. 4, the embodiment of the present invention also provides an authentication system, the system includes an authentication device 100, a client 301 and a server 302;

[0187] Authentication device 100 includes:

[0188] The storage module 101 is connected with the control module 106, and is used for storing a set of authentication passwords;

[0189] The trigger module 102 is connected to the control module 106 for generating a trigger signal;

[0190] The obtaining module 103 is connected with the control module 106, and is used to obtain an authentication password from the storage module 101 under the control of the control module 106 as an authentication code;

[0191] The display module 104 is connected to the control module 106, and is used to display the authentication code obtained by the acquisition module 103 under the control of the control module 106;

[0192] The deletion module 105 is connected with the control module 106, and is used to d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The apparatus thereof comprises: a memory module, a trigger module, an acquisition module, a delete module, a control module and a power module. The method comprises: the authentication device selects the authentication password from the pre-saved authentication passwords as the authentication code, and deletes the selected authentication password from the pre-saved authentication passwords; the client side sends the received user's ID and authentication code to the serving side; the serving side comparing the authentication code with the authentication password, if they are matching, then the authentication is passed; otherwise, the authentication. The system thereof comprises: authentication device, client side and serving side.

Description

technical field [0001] The invention relates to the field of information security, in particular to an authentication device, method and system. Background technique [0002] In recent years, with the rapid development of the network and the great convenience it provides, people increasingly rely on network means for various activities, including identification, online banking and VPN (Virtual Private Network, also known as for a virtual private network), etc. [0003] Correspondingly, network information security has attracted more and more people's attention. In recent years, an information security product has appeared, that is, a portable hardware device that can be used for mobile use, generally called information security equipment. A small hardware device with a processor and memory. The information security device establishes a connection with the host through the data communication interface of the host. The processor in the device generally adopts a security desi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products