Work method of authentication pushing system and equipment
A working method and authentication system technology, which is applied in the field of push authentication system, can solve problems such as low security, easy password leakage, and affecting authentication speed, etc., to achieve the effect of improving security, increasing data transmission speed, and preventing man-in-the-middle attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0044] Embodiment 1 of the present invention provides a working method of a push authentication system, which is applied to a system composed of an application interface, an application server, an authentication server, and a mobile device token, such as figure 1 shown, including:
[0045] Step 101: the application interface receives the user information input by the user;
[0046] Wherein, the user information may be a user name, or may be a user name and a password. In this embodiment, the user information is used as an example for illustration.
[0047]Step 102: the application interface sends the user information to the application server;
[0048] Step 103: After receiving the user information, the application server generates an authentication request according to the user information and the internally stored application identifier;
[0049] Step 104: the application server sends the authentication request to the authentication server;
[0050] Step 105: After receiv...
Embodiment 2
[0063] Embodiment 2 of the present invention provides a working method of a push authentication system, which is applied to a system composed of an application interface, an application server, an authentication server, and a mobile terminal token, such as figure 2 , image 3 with Figure 4 shown, including:
[0064] Step 201: the application interface receives user information input by the user, including user name and password;
[0065] Wherein, the user information can be a user name, or a user name and a password, and this embodiment uses the user information as a user name and a password as an example for illustration;
[0066] For example, user information includes: Username: abctest.com , password: 168408afag.
[0067] Step 202: the application interface sends the user name and password to the application server.
[0068] Step 203: the application server judges whether the received username and password are correct, if yes, execute step 206, otherwise execute ste...
Embodiment 3
[0186] Embodiment 3 of the present invention provides a working method of an authentication server in a push authentication system, such as Figure 5 shown, including:
[0187] Step 301: After receiving the authentication request from the application server, the authentication server generates and saves a challenge value, and obtains user information and application identification from the authentication request;
[0188] The generating of the challenge value specifically includes: calling a random number generating function to generate a random number, and using the random number as the challenge value;
[0189] The generation of the challenge value may also include: obtaining a corresponding stored server seed key according to the user information in the authentication request, calculating the server seed key, and generating the challenge value.
[0190] Step 302: The authentication server obtains the corresponding token information and network data link according to the us...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com