Method, device and system for realizing authentication between devices

A technology between devices and devices, applied in transmission systems, electrical components, etc., can solve the problems of easy password leakage, low security, and high operational complexity

Active Publication Date: 2017-07-28
BANMA ZHIXING NETWORK HONGKONG CO LTD
View PDF12 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method can only authenticate the identity of the device user, and the password is easy to leak, and the security is low
In addition, the user also needs to manually enter the password, and the operation complexity is relatively high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for realizing authentication between devices
  • Method, device and system for realizing authentication between devices
  • Method, device and system for realizing authentication between devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0102] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0103] figure 1 It is the system architecture diagram based on the present invention, such as figure 1 As shown in , it mainly includes the authentication device and the authenticated device, and may further include a verification server. The authenticating device is responsible for authenticating the authenticated device. In the embodiment of the present invention, the authentication of the authenticated device by the authenticating device includes not only authenticating the identity of the authenticated device, but also authenticating the identity of the user of the authenticated device. The verification server is responsible for verifying the legitimacy of the device identification of the certified device in response to the request of the cer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method, device and system for realizing authentication between devices, wherein the method comprises the steps that: an authentication device receives the device identifier of an authenticated device and the biological characteristic identifier of an authenticated device user; whether the binding relationship between the received device identifier and biological characteristic identifier is stored or not can be judged; and if not, the fact that authentication on the authenticated device is failed can be determined, wherein the authentication device pre-stores the binding relationship between the device identifier and the biological characteristic identifier provided by a registered device. By means of the method, device and system provided by the invention, dual authentication of the device and the device user identity is realized; and the security of authentication between the devices is improved.

Description

[0001] 【Technical field】 [0002] The invention relates to the field of computer application technology, in particular to a method, device and system for realizing inter-device authentication. [0003] 【Background technique】 [0004] With the popularity of smart devices, there are more and more application scenarios for inter-device authentication. For example, authentication between mobile phones, authentication between mobile phones and smart watches, authentication between mobile phones and wireless APs, and so on. Currently, there are two commonly used inter-device authentication methods: [0005] The first method: the identity authentication is performed between two devices through the device identification. However, this method cannot authenticate the user identity of the device, and can only be used in scenarios with low security levels. [0006] The second method: use the password (password) input by the device user to authenticate the identity of the device user. Fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0861H04L63/0876
Inventor 李海东董侃左军
Owner BANMA ZHIXING NETWORK HONGKONG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products