Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for authentication based on an authentication device

A technology for authenticating equipment and authenticating data, applied in the field of information security, can solve the problems of password leakage, vulnerable personal privacy information, loss, etc., and achieve the effect of improving security

Active Publication Date: 2019-05-10
FEITIAN TECHNOLOGIES
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, the password-based online identity authentication technology has great risks. The user's password can be obtained through technical means such as guessing, network theft of credit certificates, and phishing. If the password used by the user is short or easy to decipher Weak passwords are easy to be attacked, resulting in leakage of personal privacy information and even property loss; traditional identity authentication methods require the client to send a password to the remote server’s password database for comparison, but there is a risk of being intercepted and cracked, and the password Stored on the same remote server, if the super administrator account is stolen, the passwords of all users in the remote server will be leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for authentication based on an authentication device
  • A method and device for authentication based on an authentication device
  • A method and device for authentication based on an authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Embodiment 1 of the present invention provides an authentication method based on an authentication device, such as figure 1 shown, including:

[0053] Step S1: The client obtains a uniform resource identifier, obtains an application ID according to the uniform resource identifier, obtains a device authentication request according to the application ID and the user ID input by the user, and sends the device authentication request to the server;

[0054] Step S2: the client receives the current authentication data sent by the server;

[0055] Step S3: The client obtains the client data object according to the challenge value in the current authentication data, performs a hash operation on the client data object and the application ID in the current authentication data to obtain the client parameters, and obtains the key identifier in the current authentication data , compose the client parameter, the key identifier and the key identifier length into the current authentic...

Embodiment 2

[0070] Embodiment 2 of the present invention provides an authentication method based on an authentication device, such as Figure 2 to Figure 3 shown, including:

[0071] Step 101: the client obtains a Uniform Resource Identifier (URI), obtains an application ID according to the Uniform Resource Identifier, obtains a device authentication request according to the application ID and the user ID entered by the user, and sends the device authentication request to the server;

[0072] Specifically, if the client is a browser, the client obtains the header field of the uniform resource identifier accessed as the application ID; if the client is an Android system, the client obtains the key identifier of the signed Android installation package. The content is used as a uniform resource identifier; if the client is an iOS system, the client obtains the content of the IOS application identifier as a uniform resource identifier;

[0073] For example, in this embodiment, the applicatio...

Embodiment 3

[0123] Embodiment 3 of the present invention provides an authentication method based on an authentication device, such as Figure 4 to Figure 6 shown, including:

[0124] Step 201: the client obtains a Uniform Resource Identifier (URI), obtains an application ID according to the Uniform Resource Identifier, obtains a device authentication request according to the application ID, the application ID, and the user ID entered by the user, and sends the device authentication request to the server;

[0125]Specifically, if the client is a browser, the client obtains the header field of the uniform resource identifier accessed as the application ID; if the client is an Android system, the client obtains the key identifier of the signed Android installation package. The content is used as a uniform resource identifier; if the client is an iOS system, the client obtains the content of the IOS application identifier as a uniform resource identifier;

[0126] For example, in this embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for authentication based on an authentication device. The method includes: a client obtains an application ID according to an acquired URI, sends a device authentication request obtained according to the application ID and user identification to a server; receives the current ID sent by the server Authentication data; obtain the client data object according to the challenge value in the current authentication data, perform hash operation on the client data object and the application ID in the current authentication data to obtain the client parameters, obtain the key identifier in the current authentication data, and send to The authentication device sends the current authentication request information based on the client parameters, key identifier and key identifier length; receives the authentication response information returned by the authentication device, and sends to the server the authentication response information, the client data object and the current authentication data. A signature verification request composed of session ID; receive the information returned by the server, if it is a successful message, it is determined that the authentication is successful, otherwise it is determined that the authentication fails.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and equipment for authentication based on authentication equipment. Background technique [0002] In the prior art, the password-based online identity authentication technology has great risks. The user's password can be obtained through technical means such as guessing, network theft of credit certificates, and phishing. If the password used by the user is short or easy to decipher Weak passwords are easy to be attacked, resulting in leakage of personal privacy information and even property loss; traditional identity authentication methods require the client to send a password to the remote server’s password database for comparison, but there is a risk of being intercepted and cracked, and the password Stored on the same remote server, if the super administrator account is stolen, the passwords of all users in the remote server will be leaked. Contents of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/126H04L67/146H04L63/0876H04W12/72H04L63/0884H04L9/3234H04L63/0853H04L67/01H04L63/06
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES