Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-factor authentication system and method based on smart phone and user password

A user password, smart phone technology, applied in the field of computer networks, can solve the problems of high cost of identification equipment, no definite conclusion about the identification accuracy, unrealistic and so on

Active Publication Date: 2019-02-05
NORTHEASTERN UNIV LIAONING
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since biometric features are almost impossible to falsify and counterfeit, this technology has unmatched security and reliability compared to other authentication technologies. However, due to the high cost of identification equipment, no definite conclusion on the accuracy of identification, and complicated operations, it is still under research. At the experimental or small-scale application stage, it is still difficult to really promote it; the authentication method combining user passwords and external devices such as U-Shield for authentication is currently a two-factor authentication method with a high login level and relatively simple operation. However, The cost of external devices such as U-shield is relatively high, and it is not realistic to require each website to have its own authentication device, and it is not convenient for users to carry the authentication device with them, making it difficult to deploy. Therefore, this two-factor authentication The method is only applied in the fields of e-government and online banking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-factor authentication system and method based on smart phone and user password
  • Two-factor authentication system and method based on smart phone and user password
  • Two-factor authentication system and method based on smart phone and user password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096]An embodiment of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0097] like figure 1 As shown, the two-factor authentication system based on smart phones and user passwords in this embodiment includes three entities: user smart phones, browsers and Web servers.

[0098] like figure 2 As shown, the two-factor identity authentication system based on smart phones and user passwords in this embodiment, the smart phone is the smart phone that the user carries and uses daily, and the system includes: a mobile phone authentication client set in the user's smart phone The terminal module and the first bluetooth communication module, the second bluetooth communication module, the browser extension module and the first HTTPS protocol communication module arranged in the browser, the second HTTPS protocol communication module and the web server module arranged in the web server. The user's smart phone and the browser real...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A two-factor identity authentication system and method based on smartphones and user passwords belongs to the field of computer network technology. The system includes a mobile phone authentication client module, a browser extension module and a Web server module. The method includes a user registration stage and a user identity authentication stage. In the user registration stage, the user enters the user name and password on the browser registration page to register, and uses the mobile phone to scan the QR code displayed by the browser; in the user authentication stage, the user browses Enter the user name and password on the browser authentication page for authentication. The browser uses the mobile phone's Bluetooth address sent by the server to actively establish a Bluetooth connection with the mobile phone to authenticate the user's identity. When authenticating users, the present invention does not require the user to operate the mobile phone, ensuring simple user operation; using the user's smart phone as the authentication device reduces manufacturing costs, facilitates deployment, and is convenient for users to use; the authentication process has good security .

Description

technical field [0001] The invention belongs to the technical field of computer networks, and in particular relates to a two-factor identity authentication system and method based on smart phones and user passwords. Background technique [0002] In today's era, with the rapid development of the Internet, more and more network applications have entered people's lives and have become an indispensable part of people's lives. However, while enjoying the convenience brought by the network, we are also facing threats brought by various network attack methods, such as man-in-the-middle attacks, replay attacks, phishing, etc. These threats not only seriously affect people's lives, but also There may also be huge economic losses, and the first hurdle to protect network security is identity authentication. [0003] Identity authentication technology solves the problem of verifying the authenticity of the identities of both parties in network communication, and the purpose is to estab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3226H04L9/3249H04L9/3271H04L63/083H04L63/0853
Inventor 魏来文徐剑玄鹏开吴淇毓
Owner NORTHEASTERN UNIV LIAONING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products