Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Work method of authentication pushing system and equipment

A working method and authentication system technology, which is applied in the field of push authentication system, can solve problems such as low security, easy password leakage, and affecting authentication speed, etc., to achieve the effect of improving security, increasing data transmission speed, and preventing man-in-the-middle attacks

Active Publication Date: 2015-05-20
FEITIAN TECHNOLOGIES
View PDF4 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, in the authentication process, the password is triggered by the user and sent to the server for verification. The password is easy to leak, and the security is low, and the authentication requires user intervention, which affects the authentication speed and low security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Work method of authentication pushing system and equipment
  • Work method of authentication pushing system and equipment
  • Work method of authentication pushing system and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Embodiment 1 of the present invention provides a working method of a push authentication system, which is applied to a system composed of an application interface, an application server, an authentication server, and a mobile device token, such as figure 1 shown, including:

[0045] Step 101: the application interface receives the user information input by the user;

[0046] Wherein, the user information may be a user name, or may be a user name and a password. In this embodiment, the user information is used as an example for illustration.

[0047]Step 102: the application interface sends the user information to the application server;

[0048] Step 103: After receiving the user information, the application server generates an authentication request according to the user information and the internally stored application identifier;

[0049] Step 104: the application server sends the authentication request to the authentication server;

[0050] Step 105: After receiv...

Embodiment 2

[0063] Embodiment 2 of the present invention provides a working method of a push authentication system, which is applied to a system composed of an application interface, an application server, an authentication server, and a mobile terminal token, such as figure 2 , image 3 with Figure 4 shown, including:

[0064] Step 201: the application interface receives user information input by the user, including user name and password;

[0065] Wherein, the user information can be a user name, or a user name and a password, and this embodiment uses the user information as a user name and a password as an example for illustration;

[0066] For example, user information includes: Username: abctest.com , password: 168408afag.

[0067] Step 202: the application interface sends the user name and password to the application server.

[0068] Step 203: the application server judges whether the received username and password are correct, if yes, execute step 206, otherwise execute ste...

Embodiment 3

[0186] Embodiment 3 of the present invention provides a working method of an authentication server in a push authentication system, such as Figure 5 shown, including:

[0187] Step 301: After receiving the authentication request from the application server, the authentication server generates and saves a challenge value, and obtains user information and application identification from the authentication request;

[0188] The generating of the challenge value specifically includes: calling a random number generating function to generate a random number, and using the random number as the challenge value;

[0189] The generation of the challenge value may also include: obtaining a corresponding stored server seed key according to the user information in the authentication request, calculating the server seed key, and generating the challenge value.

[0190] Step 302: The authentication server obtains the corresponding token information and network data link according to the us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a work method of an authentication pushing system and equipment, and belongs to the field of information security. The method comprises the following steps that an application interface receives user information and sends the user information to an application server, the application server sends the user information and an application identifier to an authentication server, the authentication server generates authentication pushing requests according to a generated challenge value, token information, the user information and the application name corresponding to the application identifier, and sends the authentication pushing requests to a mobile terminal token, the mobile terminal token generates login information according to the authentication pushing requests, when the user select the login confirm, a first response value is generated according to the challenge value and is sent to the authentication server, the authentication server generates a second response value according to the challenge value, and when the first response value and the second response value are identical, an authentication success result is returned to the application server. When the technical scheme is adopted, the data transmission speed of the traditional authentication is accelerated, the user does not need to take part in the password input, the man-in-the-middle attack is avoided, and the authentication security is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a push authentication system and a device working method. Background technique [0002] Mobile device token, full name dynamic password mobile device (including mobile phone, pad, etc.) token, is a mobile device client software used to generate a dynamic password. A mobile device token is a dynamic password generated by a program running on a mobile device The dynamic password is bound to the mobile device for identity authentication. The generation process of the password does not generate communication and costs. It has the advantages of simple use, high security, low cost, no need to carry additional equipment, easy acquisition, and no logistics. Mobile device tokens are The development trend of dynamic password authentication in the 3G era. [0003] Push is an advanced communication connection method between the server and the client, which continuously pushes the server ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L9/3213H04L63/0807H04L67/55
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products