Authentication system and working method thereof

A technology of authentication system and working method, which is applied in the field of information security and can solve problems such as low security and data leakage

Active Publication Date: 2016-08-10
FEITIAN TECHNOLOGIES
View PDF4 Cites 59 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, authentication devices (including fingerprint authentication devices, voiceprint authentication devices, face authentication devices, location authentication devices, iris authentication devices, gesture authentication devices, palmprint authentication devices, etc.) and servers can only be realized through the client. Data interaction, first of all, data leakage may occur during the transmission process, and the security is relatively low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system and working method thereof
  • Authentication system and working method thereof
  • Authentication system and working method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0176] Embodiment 1 provides a working method of an authentication system, which is applied to a system composed of a client, an independently configured identity authentication module, and a server. As shown in 1, this method specifically includes:

[0177] Step S1: When the server receives the access request sent by the client, it generates and saves the first challenge value, and sends the first challenge value to the client;

[0178] Step S2: The client uses a preset hash algorithm to perform hash calculation on the first challenge value, generates a challenge hash value and saves it;

[0179] Step S3: the client starts the identity authentication module, and the identity authentication module waits for and receives the identification code input by the user through the identity authentication module;

[0180] Step S4: The identity authentication module judges whether the received identification code matches the internally stored pairing code, if yes, execute step S5, othe...

Embodiment 2

[0188] Embodiment 2 provides a working method of the authentication system, which is applied to a system composed of a client, an identity authentication module independently set on the client, and a server.

[0189] Specifically, in this embodiment, the client has an identity authentication function and has an independent identity authentication module built in.

[0190] Preferably, the identity authentication module can be used for fingerprint identification. Correspondingly, the identity authentication module compares the built-in pairing code (ie, information required for fingerprint identification) with the identification code (ie, fingerprint) input by the user. The identity authentication module can also be implemented in other ways, such as voiceprint, palmprint, iris, password, etc.

[0191] The identity authentication module has the functions of generating key pairs and digital signatures. During the registration process of the user on the server, the identity auth...

Embodiment 3

[0222] Embodiment 3 provides a working method of the authentication system, which is applied to a system composed of a client, an identity authentication module independently set on the client, and a server.

[0223] Preferably, in this embodiment, the identity authentication module is set in the client, and multiple key pairs are set in the identity authentication module, one key pair corresponds to one user, and the key pair is the same as the key identifier and the pairing code. One to one correspondence.

[0224] Such as image 3 As shown, the working methods of the authentication system specifically include:

[0225] Step L1: when the server receives an access request containing the user ID from the client, save the user ID;

[0226] For example, user ID: 13012345678;

[0227] Step L2: The server judges whether the same user ID exists internally according to the user ID, and if so, executes step L3, otherwise executes step L4;

[0228] Step L3: The server retrieves wh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication system and a working method thereof and belongs to the information security field. The method includes the following steps that: when receiving an access request, a server generates a first challenge value and sends the first challenge value to a client; the client uses a preset Hash algorithm to carry out Hash calculation on the first challenge value to generate a challenge Hash value; when judging that a received identification code is matched with a pairing code stored in an identity authentication module, the identity authentication module uses a private key corresponding to the pairing code to calculate the challenge the Hash value according to a preset signature algorithm so as to obtain a signature value; the client generates a signature verification request according to the signature value and sends the signature verification request to the server; and the server authenticates the signature verification request, and a user is allowed to access requested resources if the authentication is successful, and the user is not allowed to access the requested resources if the verification fails. With the authentication system and the working method thereof provided by the technical schemes of the invention adopted, communication can be continued as long as the identity authentication module completes local authentication, and therefore, the problem of data leakage in a data transmission process can be prevented, and the security of the communication can be improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to an authentication system and a working method thereof. Background technique [0002] In the prior art, authentication devices (including fingerprint authentication devices, voiceprint authentication devices, face authentication devices, location authentication devices, iris authentication devices, gesture authentication devices, palmprint authentication devices, etc.) and servers can only be realized through the client. For data interaction, first of all, data leakage may occur during the transmission process, and the security is relatively low. Contents of the invention [0003] In order to solve the problems in the prior art, the invention provides an authentication system and its working method. [0004] An embodiment of the present invention provides a working method of an authentication system, the authentication system includes a server, a client, and an independent i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products