Multi-factor user authentication method capable of flexible configuration

A technology of user authentication and authentication method, which is applied in the field of information security, can solve problems such as no longer meeting security requirements, and achieve the effect of preventing users from violent cracking and facilitating expansion

Inactive Publication Date: 2016-12-14
PALADI NETWORK TECH HANGZHOU
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development and maturity of network technology, more and more security issues have surfaced. A single authentication method based on users no longer meets the current security requirements. Just imagine if a user is only based on passwords or electronic tokens. To verify its identity, once the user's password is leaked or the token is lost and picked up by others, then others are likely to pretend to be legitimate users through the authentication system and cause a series of serious consequences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-factor user authentication method capable of flexible configuration
  • Multi-factor user authentication method capable of flexible configuration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0030] Such as figure 1 , users can belong to a group or be independent. The advantage of belonging to a group is that when a group is associated with a policy, all users under the group will inherit the group's policy.

[0031] Assume that user user_a is associated with policy A, and policy A contains two authentication methods (both two-factor authentication) radius+fingerprint. The user enters the user name user_a on the website, the radius code is abc, and then presses the fingerprint device, assuming that the fingerprint device reads that the user's fingerprint code is 123.

[0032] Then submit to the background web server through the web form and then get usr=user_a&pwd=[3,3]abc123 from the combination of the web server and send it to the port 9999 of the MFA server (combined with figure 2 ). When the MFA receives the data, it will first parse out the usr parameter and use this as a condition to find out the policy associated with the user_a user ( figure 1 The assoc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-factor user authentication method capable of flexible configuration. According to the method, multi-factor authentication (MFA) is employed, authentication systems of two or more authentication methods are performed to verify the legitimacy of a current user, and it is more difficult to try to access target information by unauthorized people through establishment of multi-layer defense. Besides, in order to better prevent violent cracking by the user, the method is additionally provided with an authentication policy at the very beginning of user authentication. Different users have their own policies, the policy records a plurality of authentication methods in the authentication system of the current user, and a protection effect is additionally provided for user security. According to the method, the design concept is based on modularization, each authentication method has independent modules, and later development is facilitated.

Description

technical field [0001] The invention belongs to the field of information security, in particular to realize multi-factor authentication for authentication information (credential) provided by users. Background technique [0002] With the continuous development and maturity of network technology, more and more security issues have surfaced. A single authentication method based on users no longer meets the current security requirements. Just imagine if a user is only based on passwords or electronic tokens. To verify its identity, once the user's password leaks or the token is lost and is picked up by others, it is very likely that others will pass the authentication system as a legitimate user and cause a series of serious consequences. Contents of the invention [0003] The purpose of the present invention is to provide a flexibly configurable multi-factor user authentication method for the deficiencies of the prior art. [0004] The purpose of the present invention is ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 陈云戴磊
Owner PALADI NETWORK TECH HANGZHOU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products