Identity authentication method for client software

A client software and identity authentication technology, applied in the field of identity authentication, can solve the problems of consuming huge social resources, failing to meet the needs of high security and convenience of identity authentication, and unsafe use

Active Publication Date: 2016-02-03
CHENGDU CYBERKEY TECH
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Whether it is a single static password technology, a static password technology combined with an identity card, or a dynamic password technology using tokens, there are limitations such as insecurity and inconvenient use.
These technologies can no longer meet the needs of today's high security and convenience of identity authentication
[0008] Currently commonly used products such as dynamic tokens and U-shields are single-purpose, inconvenient to carry, have a short life cycle, and have high cost of ownership. Repeated purchases of products with a single function consume huge social resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method for client software
  • Identity authentication method for client software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0034] Such as figure 1 Shown is a flow chart of an identity authentication method for client software of the present invention, which includes: S1. The client sends a login request message to the server;

[0035] S2. The server parses the login request message sent by the client, and returns login data to the client, and the login data is displayed on the client in encoded form;

[0036] S3. The client parses the encoded data sent by the server, and sends the parsing result to the server;

[0037] S4. The server receives the analysis result sent by the client, and sends the analysis result to the authentication server, and the authentication server verifies the analysis result;

[0038] S5. The authentication server authenticates the analysis r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method for client software. The method comprises the following steps that: a client sends a login request message to a server side; the server side resolves the login request message sent by the client, and returns login data to the client, wherein the login data is displayed on the client in a code form; the client resolves coded data transmitted by the server side, and transmits a resolution result to the server side; the server side receives the resolution result transmitted by the client and transmits the resolution result to an authentication server side, and the authentication server side verifies the resolution result; the authentication server side authenticates the resolution result, and returns an authentication result to the server side; and the server side receives the authentication result, returns the authentication result to the client, and executes an activation or shutdown action on the client according to the authentication result. The client software is bound with accounts and password information, and an encryption algorithm is adopted, so that the problem of account insecurity caused by means of peeking, cracking, analysis and the like is solved effectively.

Description

technical field [0001] The invention belongs to the field of computer security, and in particular relates to an identity authentication method. Background technique [0002] Identity authentication technology is an effective solution to the process of confirming the identity of the operator in the computer network. All information in the computer network world, including the user's identity information, is represented by a specific set of data. Computers can only identify the user's digital identity, and all authorizations to users are also authorizations for the user's digital identity. Identity authentication technology is to solve the problem of how to ensure that the operator who operates with a digital identity is the legal owner of the digital identity, that is to say, to ensure that the physical identity of the operator corresponds to the digital identity. [0003] There are three main methods of digital identity authentication in the world: static passwords, dynamic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 熊楚渝陈雨霖
Owner CHENGDU CYBERKEY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products