Authentication method

An authentication method and authentication request technology, applied in the field of authentication, can solve problems such as counterfeit authentication, and achieve the effect of reducing equipment cost, not easy to forget, and improving security

Inactive Publication Date: 2010-02-03
SIEMENS CHINA
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the password is not used and is within the valid life cycle,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method
  • Authentication method
  • Authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] figure 1is a flowchart of the authentication method of the present invention. There is user terminal and an authentication server in the inventive method, and its inventive step is as follows:

[0040] (1) The user sets authentication password rules on an authentication server;

[0041] (2) The user sends an authentication request to the authentication server through a user terminal;

[0042] (3) the authentication server generates a character list and extracts the password of the user from the generated character list according to the authentication password rule set by the user in step (1), which is called the first password and stores the password;

[0043] (4) The authentication server sends the generated character list to the user terminal;

[0044] (5) The user extracts the user's password from the character list received by the user terminal according to the authentication password rules set by it, which is called the second password;

[0045] (6) The user se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication method. The method comprises the following steps: setting an authentication password rule on an authentication server for a user; sending an authentication request to the authentication server through a user terminal; generating a character table by the authentication server and extracting a first password from the character table according to the authentication password rule; sending the character table to the user terminal by the authentication server; extracting a second password from the character table received by the user terminal and sending thesecond password to the authentication server; and comparing the received second password and first password by the authentication server. If the first password and the second password are consistent,the authentication is successful; and if the first password and the second password are not consistent, the authentication fails. In the authentication method, because the password is hidden in the character table, a rule set by the user is difficult to guess even if the character table is acquired by other people, the password of the user is difficult to know, and further the user can perform theauthentication more safely by using the one-time password.

Description

technical field [0001] The invention relates to an authentication (Authentication) method, in particular to a one-time password (One Time Password, OTP) authentication method. Background technique [0002] In the current network, some traditional authentication methods (such as the commonly used "username+password" authentication method) have the weakness of poor anti-attack capability. In these authentication methods, passwords (or passwords) remain unchanged for a relatively long period of time. Since it is transmitted in clear text in the network, it is easier for an attacker to guess the password or use monitoring tools to detect the transmission content, thereby discovering the user password. In addition, some Trojan horse tools can also record the content of the user's typing when the user is typing on the keyboard, and then identify the user's password. Furthermore, even if sometimes the user uses ciphertext to transmit data, it is difficult for an attacker to crack...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 王超刘康
Owner SIEMENS CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products