Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Double-factor identity authentication system and method based on smartphone and user password

A user password and smart phone technology, applied in the field of computer networks, can solve the problems of complex operation, impracticality, and inconvenientness for users to carry authentication equipment with them

Active Publication Date: 2016-11-09
NORTHEASTERN UNIV
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since biometric features are almost impossible to falsify and counterfeit, this technology has unmatched security and reliability compared to other authentication technologies. However, due to the high cost of identification equipment, no definite conclusion on the accuracy of identification, and complicated operations, it is still under research. At the experimental or small-scale application stage, it is still difficult to really promote it; the authentication method combining user passwords and external devices such as U-Shield for authentication is currently a two-factor authentication method with a high login level and relatively simple operation. However, The cost of external devices such as U-shield is relatively high, and it is not realistic to require each website to have its own authentication device, and it is not convenient for users to carry the authentication device with them, making it difficult to deploy. Therefore, this two-factor authentication The method is only applied in the fields of e-government and online banking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-factor identity authentication system and method based on smartphone and user password
  • Double-factor identity authentication system and method based on smartphone and user password
  • Double-factor identity authentication system and method based on smartphone and user password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096]An embodiment of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0097] Such as figure 1 As shown, the two-factor authentication system based on smart phones and user passwords in this embodiment includes three entities: user smart phones, browsers and Web servers.

[0098] Such as figure 2 As shown, the two-factor identity authentication system based on smart phones and user passwords in this embodiment, the smart phone is the smart phone that the user carries and uses daily, and the system includes: a mobile phone authentication client set in the user's smart phone The terminal module and the first bluetooth communication module, the second bluetooth communication module, the browser extension module and the first HTTPS protocol communication module arranged in the browser, the second HTTPS protocol communication module and the web server module arranged in the web server. The user's smart phone and the browse...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a double-factor identity authentication system and method based on a smartphone and a user password, and belongs to the technical field of a computer network. The system comprises a mobile phone authentication client module, a browser expansion module and a Web server module. The method comprises a user registration stage and a user identity authentication stage. According to the user registration stage, a user inputs a user name and a password for registration on a browser registration page and scans a two-dimensional code displayed by a browser through a mobile phone. According to the user identity authentication stage, the user inputs the user name and the password for authentication on a browser authentication page; and the browser actively establishes Bluetooth connection with the mobile phone by employing a mobile phone Bluetooth address, thereby carrying out user identity authentication. According to the system and the method, a user does not need to operate the mobile phone; the user operation is simple; the smartphone of the user is taken as an authentication device, therefore, the manufacturing cost is reduced, the deployment is convenient, and the user can use the authentication device conveniently; and the security of the authentication process is high.

Description

technical field [0001] The invention belongs to the technical field of computer networks, and in particular relates to a two-factor identity authentication system and method based on smart phones and user passwords. Background technique [0002] In today's era, with the rapid development of the Internet, more and more network applications have entered people's lives and have become an indispensable part of people's lives. However, while enjoying the convenience brought by the network, we are also facing threats brought by various network attack methods, such as man-in-the-middle attacks, replay attacks, phishing, etc. These threats not only seriously affect people's lives, but also There may also be huge economic losses, and the first hurdle to protect network security is identity authentication. [0003] Identity authentication technology solves the problem of verifying the authenticity of the identities of both parties in network communication, and the purpose is to estab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3226H04L9/3249H04L9/3271H04L63/083H04L63/0853
Inventor 魏来文徐剑玄鹏开吴淇毓
Owner NORTHEASTERN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products