Dual-factor authentication method based on HASH chip or encryption chip

A two-factor authentication and encryption chip technology, applied in the field of computer application system security, can solve problems such as security damage in the authentication process, and achieve the effect of improving processing efficiency and server concurrent processing capability, improving security, and ensuring security.

Inactive Publication Date: 2011-08-10
上海盛轩网络科技有限公司
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This has caused great harm to the security of the authentication process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dual-factor authentication method based on HASH chip or encryption chip
  • Dual-factor authentication method based on HASH chip or encryption chip

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The present invention can use a cost-effective HASH chip (a chip using a HASH algorithm) or an encryption chip to perform two-factor authentication. HASH, generally translated into "hash", and also directly transliterated into "hash", is to transform an input of any length (also called pre-mapping, pre-image) into a fixed-length output through a hash algorithm. The output is the hash value. In the present invention, first, the HASH chip or encryption chip used by the client is shipped with a chip serial number and written into a randomly generated seed; when the client applies for authentication, the server sends a randomly generated seed after receiving the request. The security information is sent to the client, and the client uses a HASH chip or an encryption chip to perform HASH or encryption processing on the combination of the random security information sent by the server and the seed built into the chip. The result of the processing is a dynamic verification cod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dual-factor authentication method based on a HASH chip or an encryption chip, which comprises the steps that: (1) a client carries a chip sequence number to the HASH chip or the encryption chip, and writes a randomly generated seed into the HASH chip or the encryption chip; (2) the client transmits an authentication request to a server when applying for authentication; (3) the server transmits a randomly generated security information string to the client after receiving the authentication request; (4) the client performs HASH or encryption processing on the security information string and the built-in seed of the chip by using the HASH chip or the encryption chip to obtain a dynamic verification code as a processing result, and transmits the chip sequence number, the dynamic verification code and user and password information to the server; and (5) the server verifies a verification factor consisting of the chip sequence number and the dynamic verification code and another verification factor consisting of the user and password information to determine whether the client and a user are legal or not, and returns authentication results to the client. By the method, not only the legal identity of the user can be ensured, but also the user is ensured to acquire services by the legal client.

Description

technical field [0001] The invention belongs to the field of computer application system security, in particular to a two-factor authentication method based on a HASH chip or an encryption chip. The present invention is very suitable for large amount of users, high concurrency, distributed equipment or user authentication process based on Internet or mobile network. Background technique [0002] With the popularity of the Internet, there are more and more distributed applications on the network, and a very important step in the process of distributed applications is to verify whether the remote application is the one you expect. The security of traditional password verification can no longer be guaranteed. As the added value of account or authentication is getting higher and higher, there are more and more cases of accounts being cracked or stolen by others in recent years. Nowadays, various ways of using hardware encryption technology and user passwords for two-factor auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L9/30
Inventor 王立
Owner 上海盛轩网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products