User authentication method and device

A user authentication and user technology, applied in the field of network security, can solve the problems of illegal acquisition of dynamic passwords, error-prone, etc., achieve good compatibility, and avoid the risk of authentication failure.

Active Publication Date: 2014-06-25
EMC IP HLDG CO LLC
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, users still need to enter a dynamic password when authenticating, which is inherently error-prone, especially in a mobile environment
In addition, like usernames and static passwords, dynamic passwords still have the risk of being illegally obtained by malicious third parties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and device
  • User authentication method and device
  • User authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The principle and spirit of the present invention will be described below with reference to several exemplary embodiments shown in the accompanying drawings. These embodiments are given only to enable those skilled in the art to better understand and implement the present invention, but not to limit the scope of the present invention in any way.

[0022] first reference figure 1 , which shows a block diagram of the system 100 according to an embodiment of the present invention. As shown, the exemplary system 100 includes: an authentication server 101 , a first device 102 associated with a user, and a second device 102 associated with the user. The authentication server 101 is a server for performing authentication of a user's identity, and is owned and maintained by, for example, a provider of an authentication service. The first device 102 and the second device 103 can be any currently known or future developed user equipment, including but not limited to personal co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a user authentication method and device. According to the embodiment of the invention, information related to authentication is coded in an image of a two-dimensional code and the like. The image information and other authentication information are transmitted and decoded between one or more devices of a user and an authentication server, thus the authentication server can effectively authenticate the devices used by the user and the user, and at the same time authentication failure risk caused by password leakage in the prior art is avoided. According to the embodiment of the invention, the method and the device can be combined with the existing static password and / or dynamic password authentication, and have good compatibility.

Description

technical field [0001] Embodiments of the present invention generally relate to network security, and more particularly, relate to a method and device for user authentication. Background technique [0002] With the continuous development of network technologies, user authentication is required in many applications and scenarios, that is, to verify whether a user's identity is legal for a specific service, data, and / or network domain. As an example, a virtual private network (Virtual Private Network, VPN) is a commonly used network technology, which allows users to remotely access and use an internal private network of an organization or institution through a public network (eg, the Internet). In order to prevent illegal users from invading the internal private network, users need to be authenticated before establishing a VPN connection. [0003] In the prior art, common identity authentication methods can be roughly divided into the following two categories. The first type...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCG06F21/31G06F21/44H04L63/08G06F21/40H04W12/77
Inventor 郑颖妍何征
Owner EMC IP HLDG CO LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products