Method and equipment for performing registration based on authentication equipment
A technology for authenticating equipment and equipment, applied in the field of information security, can solve problems such as password leakage, property leakage, and personal privacy information that is vulnerable to attacks, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0045] Embodiment 1 of the present invention provides a method for registering based on an authentication device, such as figure 1 shown, including:
[0046] Step 101: the client obtains a uniform resource identifier (UniformResourceIdentifier), obtains an application ID according to the obtained uniform resource identifier, obtains a device registration request according to the application ID and the user identifier input by the user, and sends the device registration request to the server;
[0047]Specifically, if the client is a browser, the client obtains the header field of the accessed uniform resource identifier as the application ID; if the client is an Android system, the client obtains the content of apk-keyhash as the application ID; if the client For the iOS system, the client obtains the content of the bundle-id as the application ID;
[0048] For example, in this embodiment, the application ID is https: / / u2f.cloudentify.com, and the user ID entered by the user i...
Embodiment 2
[0083] Embodiment 2 of the present invention provides a method for registering based on an authentication device, such as Figure 2 to Figure 3 shown, including:
[0084] Step 201: the client obtains a uniform resource identifier (UniformResourceIdentifier), obtains an application ID according to the obtained uniform resource identifier, obtains a device registration request according to the application ID, the application identifier and the user identifier input by the user, and sends the device registration request to the server;
[0085] Specifically, if the client is a browser, the client obtains the header field of the accessed uniform resource identifier as the application ID; if the client is an Android system, the client obtains the content of apk-keyhash as the application ID; if the client For the iOS system, the client obtains the content of the bundle-id as the application ID;
[0086] For example, in this embodiment, the application ID is https: / / u2f.cloudentify....
Embodiment 3
[0131] Embodiment 3 of the present invention provides a client for registration based on an authentication device, such as Figure 4 As shown, it includes: a first generating module 301, a first sending module 302, a first receiving module 303, a second generating module 304, a third generating module 305, a fourth generating module 306 and a first judging module 307;
[0132] The first generating module 301 is configured to obtain a uniform resource identifier, obtain an application ID according to the uniform resource identifier, and obtain a device registration request according to the application ID and the user identification input by the user;
[0133] The first sending module 302 is configured to send the device registration request generated by the first generating module 301 to the server, send the registration request information generated by the third generating module 305 to the authentication device, and send the key registration generated by the fourth generating ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com