Identity authentication method, client side, server and system

A technology of identity authentication and client, which is applied in the field of server and system, client, and identity authentication, which can solve the problems of poor system security and achieve the effect of not easy to crack, high system security, and strict generation process

Inactive Publication Date: 2016-08-03
北京启迪思创科技有限公司
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide an identity authentication method between a client an

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, client side, server and system
  • Identity authentication method, client side, server and system
  • Identity authentication method, client side, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to provide an implementation plan for improving system security, the embodiment of the present invention provides an identity authentication method, client, server and system. The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the The preferred embodiments are only used to illustrate and explain the present invention, not to limit the present invention. And in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0023] An embodiment of the present invention provides an identity authentication method between a client and a server, the method is executed by the client, such as figure 1 As shown, specifically, the following steps may be included:

[0024] S101. Generate an intermediate character string based on the client identifier.

[0025] S102. Based on the intermediate chara...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method, a client, a server and a system, which can realize two-way identity authentication between the client and the server, thereby ensuring the security of the system. The identity authentication method includes: generating an intermediate character string based on the client identifier; generating a verification code and a first dynamic password based on the intermediate character string; wherein, the verification code is sent to the server; according to the first dynamic password and from the The second dynamic password received by the server determines whether the identity authentication is passed.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an identity authentication method between a client and a server, a client, a server and a system. Background technique [0002] Many current application scenarios involve identity authentication between the client and the server. For example, in environments such as restaurants and meeting rooms, the client is in a single-application mode due to the needs of special work scenarios. In this mode, the client The terminal can only use a preset single application, and when the user makes a request to exit the single application mode, the above-mentioned identity authentication between the client and the server must be performed. [0003] In the prior art, identity authentication is generally realized by verifying OTP (OneTime Password, one-time password). The specific process is: after the server generates the OTP using the agreed algorithm and random function, it sends it to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0838
Inventor 曹雷李奎钢
Owner 北京启迪思创科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products