Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for processing network service by utilizing multifactor authentication method

An authentication method and technology for network services, applied in the field of business processing methods and systems with multi-factor authentication methods, can solve the problems of insufficient security, inability to verify the server side, and low security, and achieve the effect of network business processing security

Inactive Publication Date: 2012-11-14
TSINGHUA TONGFANG CO LTD
View PDF8 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the level of security of this password is not enough, and it is easy to be guessed. The commonly used attack methods are dictionary attack and peeping.
2. Password card verification, the principle is to preset a password on the card, and find out the corresponding password according to the given row number and column number, which belongs to two-factor authentication. Less, easy to be exhausted and copied, unable to defend against man-in-the-middle attacks, limited resistance to dictionary attacks, commonly used attack methods include copying, peeping and dictionary attacks
3. Dynamic password verification; this verification method is a two-factor verification based on time series or event sequences. The result of Token (token) participates in business transactions, and the built-in key of Token is calculated by HASH or other iterative algorithms. The result cannot be predicted externally, but Its security level is still low, it belongs to one-way authentication, and the Token holder cannot verify the server side, and cannot prevent man-in-the-middle / phishing website attacks. The common attack method is phishing website
Specifically, you can refer to the Chinese patent document with the publication number CN101770619A; the above-mentioned authentication methods all have the shortcomings of too few authentication factors and the authentication means are easily attacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for processing network service by utilizing multifactor authentication method
  • Method and system for processing network service by utilizing multifactor authentication method
  • Method and system for processing network service by utilizing multifactor authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] refer to figure 1 , the network service processing system of the present invention includes a service operation terminal 1, a service server 2, a security platform server 3, a short message / network interface 4 and a mobile terminal 5. Wherein, the business operation terminal 1 can be an ATM machine, a telephone, a PC (personal computer) or a mobile terminal such as a mobile phone; Corresponding online banking server C, and banking server D corresponding to the mobile phone; the mobile phone can be connected to the service server D through a short message interface or a WAP gateway. Safety platform server 3 is connected with business server, is used for receiving the verification request that business server sends, and feeds back, and safety platform server 3 is connected with mobile terminal 5 by short message / network interface 4 simultaneously, is used for completing verification process with mobile terminal 5. There is a hardware security unit on the mobile terminal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for processing network service by utilizing a multifactor authentication method. The method comprises the following steps that a service operation terminal sends a service operation request to a service server; after receiving the service operation request, the service server carries out local authentication; after authentication is successful, a safety authentication request is submitted to a safety platform server; after receiving the authentication request, the safety platform processes the authentication request and then sends data to a mobile terminal corresponding to a user; after receiving data, the mobile terminal calculates the data and displays the data in a clear text for the user; the user inputs and confirms a response number on the service operation terminal; the service operation terminal sends the response number to the service server; the service server sends the response number to the safety platform server; after receiving the response number, the safety platform server authenticates the response number and feeds back the authentication result to the service server; and the service server receives the feedback authentication result and carries out service processing according to the result. According to the scheme disclosed by the invention, the network service processing is safer.

Description

technical field [0001] The invention relates to the field of network business processing, in particular to a business processing method and system with a multi-factor authentication method. Background technique [0002] At present, the communication network covers the whole world, and the use of network processing business is also developing rapidly, especially the use of network transactions and network payment activities. In the increasingly frequent network transaction payment, an identity authentication process must be provided to ensure the security of transactions. Common There are several methods of identity authentication: 1. Static password authentication; this authentication method is single-factor authentication, usually enter a set of passwords, try to use a mixture of letters and numbers to improve password strength, resist dictionary attacks, and Password strength can be increased by limiting the number of errors. However, the security level of this password ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W4/12
Inventor 邹勇
Owner TSINGHUA TONGFANG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products