Unlock instant, AI-driven research and patent intelligence for your innovation.

Double-factor authentication method

An authentication method and two-factor technology, applied in the field of identity authentication, can solve the problems of slow speed and low efficiency, and achieve the effect of reducing the number of interactions, improving the authentication speed, and high authentication efficiency.

Active Publication Date: 2010-06-23
BEIJING TOPSEC TECH
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the above analysis, the purpose of the present invention is to provide a two-factor authentication method to solve the problems of low efficiency and slow speed of the two-factor authentication method in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-factor authentication method
  • Double-factor authentication method
  • Double-factor authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The core idea of ​​the present invention is: for the two-factor authentication using user password authentication and TLS (Transport Layer Security Protocol, secure transmission layer protocol) certificate authentication, transmit user password authentication information simultaneously in the TLS certificate authentication process, avoid TLS certificate authentication The transmission of user password authentication information reduces the number of authentication message interactions and improves the authentication speed.

[0031] Preferred embodiments of the present invention will be specifically described below in conjunction with the accompanying drawings, wherein the accompanying drawings constitute a part of the application and are used together with the embodiments of the present invention to explain the principles of the present invention.

[0032] Such as figure 1 as shown, figure 1 It is a schematic flow chart of the method of the present invention, which may...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a double-factor authentication method which comprises that a customer end takes a password set by a user as a key; the random number of the customer end and a user name serve as data, a validation value authenticated by the user password is worked out through the operation of preset algorithm, and the authentication request information comprising the validation value and the user name and the random number of the customer end are carried in a security transmission layer protocol message and are sent to a server; the server analyzes the received authentication request information, and obtains the pre-stored user password according to the analyzed user name; the obtained pre-stored user password is operated through the same algorithm, the validation value worked out through the operation and the validation value in the authentication request information are compared, and when the two values are confirmed to be the same, the user password authentication succeeds; the server and the customer end continue to carry out security transmission layer protocol certificate authentication, until the security transmission layer protocol certificate authentication is over; and the double-factor authentication method reduces the authentication message interaction times, has high authentication efficiency, and improves the authentication speed.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to a two-factor authentication method. Background technique [0002] With the rapid development of Internet technology, network services are inseparable from people's daily life and work. Typical ones include online shopping, online banking, and online games. The Internet not only provides convenience to people, but also brings troubles. Viruses and Trojan horses spread wildly, and a large number of customer account and password information are stolen. Network security issues have become increasingly prominent. Identity authentication technology in network security is also becoming more and more important. [0003] Identity authentication is a process in which one party (such as a natural person or system) declares its identity to another party and is verified. The authentication process can consist of one or more authentication mechanisms. The authentication mech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 李志超
Owner BEIJING TOPSEC TECH