Authentication method based on geographic position information

A technology of geographic location information and authentication method, applied in electrical components, transmission systems, etc., to achieve the effect of improving login security and increasing protection strength

Active Publication Date: 2015-08-26
FEITIAN TECHNOLOGIES
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The currently commonly used OTP generating device is a separate hardware device. With the widespread use of mobile terminal equipment, the application software on mobile terminal equipment (such as mobile phones) is used to generate OTP, gradually replacing the original independent OTP generating device. , although it is convenient for users to carry the OTP

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method based on geographic position information
  • Authentication method based on geographic position information
  • Authentication method based on geographic position information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Embodiment 1 of the present invention provides an authentication method flow based on geographic location information, which is implemented based on an authentication system composed of a client, an authentication server, and a mobile terminal device. The OTP in this embodiment is generated at the mobile terminal and input by the user. to the client, and then sent to the authentication server by the client. The geographic location verification information in this embodiment is specifically the preset geographic location information.

[0034] Such as figure 1 As shown, the authentication method provided in Embodiment 1 includes the following steps:

[0035] Step 1: The client starts the application system and prompts the user to input user information and OTP;

[0036] Specifically, the user information may include a user name and a password, or only include a user name. In this embodiment, the user information only includes the user name as an example for introduction...

Embodiment 2

[0113] Embodiment 2 of the present invention provides an authentication method flow based on geographic location information, which is realized based on an authentication system composed of a client, an authentication server, and a mobile terminal device. The OTP in this embodiment is generated at a mobile terminal, and the mobile terminal sent to the authentication server, the geographic location verification information in this embodiment is specifically the preset geographic location information.

[0114] Such as figure 2 As shown, the authentication method provided in Embodiment 2 includes the following steps:

[0115] Step 101: the client starts the application system, prompts the user to input user information, the client receives the user information entered by the user, and after verifying that the user information is legal, prompts the user to click a push button;

[0116] Specifically, the user information may be a user name, or a user name and a password. In this...

Embodiment 3

[0170] Embodiment 3 of the present invention provides an authentication method flow based on geographic location information, which is implemented based on an authentication system composed of a client, an authentication server, and a mobile terminal device. The OTP in this embodiment is generated at the mobile terminal and input by the user. to the client, and then sent to the authentication server by the client. In this embodiment, the verification of the current geographic location information is to compare it with the geographic location corresponding to the IP address of the client.

[0171] Such as Figure 4 As shown, the authentication method provided in Embodiment 3 includes the following steps:

[0172] Step 1: The client starts the application system and prompts the user to input user information and OTP;

[0173] Specifically, the user information may include a user name and a password, or only include a user name.

[0174] After this step, it also includes: when ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method based on geographic position information, and belongs to the field of information security. The authentication method disclosed by the invention comprises the following steps: verifying an OTP (One Time Password) and the current geographic position information of mobile terminal equipment bound with user information by an authentication server; and the authentication succeeds if both the OTP and the current geographic position information of the mobile terminal equipment pass verification, otherwise the authentication fails, wherein the verification of the current geographic position information of the mobile terminal equipment bound with the user information can be comparison with stored geographic position verification information or comparison with a geographic position corresponding to the IP (Internet Protocol) address of a client transmitting the user information. According to the authentication method provided by the invention, a plurality of authentication factors participate into an authentication flow, so that the protection intensity of application system login can be enhanced effectively, and the login security is enhanced.

Description

technical field [0001] The invention relates to the field of information security, in particular to an authentication method based on geographic location information. Background technique [0002] In practical applications, when users log in to the application system, in order to improve security, they often use various authentication methods to log in. At present, widely used authentication methods include static password login method and dynamic password login method. The static password login method is to log in to the application system through the authentication method of verifying the user name and password. authentication method to log in to the application system. [0003] The currently commonly used OTP generating device is a separate hardware device. With the widespread use of mobile terminal equipment, the application software on mobile terminal equipment (such as mobile phones) is used to generate OTP, gradually replacing the original independent OTP generating ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0815
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products