Unlock instant, AI-driven research and patent intelligence for your innovation.

An authentication method, system and device

An authentication method and a technology for generating a device are applied in the field of information security, which can solve the problems of inability to identify servers and transaction information, and achieve the effects of improving security, enhancing security, and improving security.

Active Publication Date: 2016-04-06
TENDYRON CORP
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) Unable to identify whether the server for verification is a legitimate server;
[0006] (2) Unable to identify whether the transaction information provided is a false transaction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method, system and device
  • An authentication method, system and device
  • An authentication method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0028] In the description of the present invention, it should be understood that the terms "first", "second" and so on are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance. In the description of the present invention, it should be noted that unless otherwise specified and limited, the terms "connected" and "connected" should be understood in a broad sense, for example, it can be a fixed connection, a detachable connection, or an integral Ground connection; it can be mechanical co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method, an authentication system and an authentication device. The authentication method comprises the following steps that: a dynamic password generation device generates a first challenge value; an authentication server receives the first challenge value; the authentication server calculates a first one-time password according to the first challenge value; the dynamic password generation device receives the first one-time password; the dynamic password generation device resolves a second challenge value according to the first one-time password; and the dynamic password generation device judges whether the authentication server is legal by comparing the first challenge value with the second challenge value. According to the authentication method, whether the authentication server is legal is judged by checking whether the one-time password generated by the server comprises the challenge value generated by the dynamic password generation device; and therefore the security of network electronic transaction is improved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to an authentication method, system and device. Background technique [0002] Nowadays, with the rapid development of the Internet and financial informatization, online banking is popularized rapidly, but the authentication method using static passwords in online electronic transactions has certain security defects. Most of them use dynamic password tokens or dynamic password cards to strengthen the security of network identity authentication. [0003] The feature of the dynamic password technology is that the user enters the dynamic password according to the displayed number of the dynamic password token provided by the service provider. According to the dynamic password technology, according to the different password generation methods, it can be divided into time-based and challenge / response-based dynamic password technologies. The implementation method of the time-b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 李东声
Owner TENDYRON CORP