Client, server side, methods and authentication system

An identity verification and client-side technology, applied in the field of information security, can solve problems such as the growth of loopholes, the inability of users to actively control verification information, security issues of mobile phone verification codes, etc., and achieve the effect of improving information security

Active Publication Date: 2017-10-31
SONY CORP
View PDF4 Cites 60 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the popularization of smart phones, the vulnerabilities of mobile phone systems are also increasing, and the existence of various types of Trojan horses has caused problems in the security of mobile phone verification codes.
Regardless of the verification method, either the server and the client obtain the verification code syn

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Client, server side, methods and authentication system
  • Client, server side, methods and authentication system
  • Client, server side, methods and authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Exemplary embodiments of the present disclosure will be described below with reference to the accompanying drawings. In the interest of clarity and conciseness, not all features of an actual implementation are described in this specification. It should be understood, however, that in developing any such practical embodiment, many implementation-specific decisions must be made in order to achieve the developer's specific goals, such as meeting those constraints related to the system and business, and those Restrictions may vary from implementation to implementation. Moreover, it should also be understood that development work, while potentially complex and time-consuming, would at least be a routine undertaking for those skilled in the art having the benefit of this disclosure.

[0037] Here, it should be noted that in order to avoid obscuring the present disclosure due to unnecessary details, only the device structure and / or processing steps closely related to the solu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a client, a server side, methods and an authentication system. The client for generating a verification code comprises a transaction initiation unit, a verification code generation unit, and a sending unit. The transaction initiation unit is configured to respond to a predetermined authentication event of a user to initiate a random transaction between a first account and a second account in a data platform system, so that the random transaction is recorded into the data platform system. The verification code generation unit is configured to generate a verification code for authentication of the user at least based on information of the random transaction. And the sending unit is configured to send the generated verification code to a server side, so that the server side verifies the identity of the user based on the record of the random transaction and the verification code. The data platform system is a decentration type distributed database and records in the system can not be changed or deleted. According to the embodiment of the invention, with the data platform system based on a block chain, the user initiates verification code generation actively, so that the system safety is improved and the system cost is lowered.

Description

technical field [0001] The present disclosure relates to the field of information security, and more specifically, to a client and method for generating a verification code, a server and method for verifying user identity, and an identity verification system. Background technique [0002] Access control is a mechanism that needs to be involved in all computer systems, whether it is a client / server system, client / browser system, or cloud system, from the simplest username / password to the widely used authentication code / verification code ( CAPTCHA), and now widely used text message verification code and hardware-based UKey (USB Key), etc., wherein, both the text message verification code and UKey require the support of external devices. [0003] Multi-Factor Authentication (MFA) is a simple and effective account security best practice method, which can add one or more layers of security protection in addition to username and password. From the theory of cryptography, there ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3228H04L9/3236H04L63/08H04L63/0838G06Q20/388G06Q20/4014H04L9/0637H04L9/0643H04L9/3242H04L63/10
Inventor 张智辉
Owner SONY CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products