Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authorization authentication method, device and system based on device fingerprint

A technology of device fingerprinting and authority authentication, applied in the computer field, can solve problems such as insecurity, and achieve the effects of ensuring performance security and information security, avoiding duplication, and ensuring uniqueness

Active Publication Date: 2020-01-24
BEIJING BANGCLE TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a device fingerprint-based authority authentication method, device and system to solve the problem of insecurity in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization authentication method, device and system based on device fingerprint
  • Authorization authentication method, device and system based on device fingerprint
  • Authorization authentication method, device and system based on device fingerprint

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0078] like figure 2 Shown is a schematic diagram of the steps of the authority authentication method provided by the embodiment of the present application. The authority authentication is mainly performed based on the device fingerprint. pad or other computer equipment, the method mainly includes the following steps:

[0079] Step 21: Send an authorization authentication request carrying the account ID to the authentication server.

[0080] Wherein, the account identifier involved in this step 21 can be understood as an identifier that can distinguish users, such as mobile phone number, ID number, etc., or a serial number, QR code, etc. that can distinguish users generated according to user information.

[0081] In addition, the authorization authentication request in this step may be initiated by the user when requesting services such as login or payment, and the authorization authentication request may be specifically generated according to the user's click on a control o...

Embodiment 2

[0163] The above authorization authentication method belongs to the same inventive concept, and the present application also provides a device for executing the above method.

[0164] refer to Figure 8 As shown, a permission authentication device includes:

[0165] The first sending unit 81 is configured to send the authority authentication request carrying the account identifier to the authentication server;

[0166] The first receiving unit 82 is configured to receive a first verification code returned by the authentication server, the first verification code corresponding to the account identifier;

[0167] The determining unit 83 is configured to determine a first hash value and a second hash value respectively according to a plurality of hardware information of the electronic device; respectively perform bit operations on the first hash value and the second hash value to obtain The results are combined to determine the device fingerprint of the electronic device;

[0...

Embodiment 3

[0184] The embodiment of the present application also provides an authority authentication system, refer to Figure 10As shown, it includes: authority authentication device 1001 and authentication server 1002; wherein,

[0185] The authority authentication device 1001 is configured to send an authority authentication request carrying an account identifier to an authentication server; receive a first verification code returned by the authentication server, and the first verification code corresponds to the account identifier; according to the electronic A plurality of pieces of hardware information of the device respectively determine a first hash value and a second hash value; combining the results obtained by performing bit operations on the first hash value and the second hash value respectively, and determining as the The device fingerprint of the electronic device; sending the device fingerprint and the first verification code to the authentication server, so that the auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of computers, in particular to an equipment fingerprint-based authority authentication method, device and system which are used for solving the problem that in the prior art, authority verification is insecure. The authority authentication method mainly comprises the step that the authority authentication device sends a received first verification code and equipment fingerprint generated by the authority authentication device to an authentication server for two times of authentication; and specifically, the equipment fingerprint is obtained by combining results which are obtained after bit operation is conducted on Hash values determined according to multiple hardware information, therefore, the complexity of character strings is increased, then the reliability and accuracy of equipment fingerprint determination are improved, the condition that the equipment fingerprints determined by different electronic equipment are repeat is avoided, and the uniqueness of the equipment fingerprint is guaranteed. Meanwhile, compared with the scheme that in the prior art, authority verification is conducted only through a short message verification code, the authority authentication method has the advantages that the verification layer or content is more, the difficulty for cracking work of an attacker is increased, and the security and reliability of authority authentication are improved.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a device fingerprint-based authority authentication method, device and system. Background technique [0002] With the rise of the Internet, more and more matters involving personal information, transaction processing or property income and expenditure can be completed on the Internet. However, considering the sharing characteristics of the Internet, there may be hacking attacks. Therefore, in order to ensure the safety of users' personal information and property, user identity verification is required in most transaction scenarios, and only after the verification is passed. Allow the use of corresponding services and accounts. [0003] However, the current user identity verification is generally only the verification of the user account and password, or the verification of the mobile phone SMS verification code. However, once hackers and other attackers crack the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/32
CPCH04L9/0643H04L9/3236H04L63/0815H04L63/083H04L63/0876
Inventor 阚志刚陈彪杨承育卢佐华方宁
Owner BEIJING BANGCLE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products