Authenticator and realization method thereof

An implementation method and an authenticator technology, which are applied in user identity/authority verification and key distribution, can solve the problems of authentication information leakage and insecure authentication data transmission, and achieve the effect of preventing leakage and enhancing authentication security.

Active Publication Date: 2018-04-17
FEITIAN TECHNOLOGIES
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, there are two commonly used user identity authentication methods as follows. One is a static authentication method of user name and user password. The authentication data used for user identity authentication, such as user name and user password, needs to be uploaded to the background server through the network. The defect of this authentication method is: the transmission of authentication data on the network is not safe; the other is the authentication method using OTP (OTP), the defect of this authentication method is: the background server needs to save the user's seed and key, etc. information, once the information is leaked, the user's authentication information will be leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authenticator and realization method thereof
  • Authenticator and realization method thereof
  • Authenticator and realization method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] like figure 1 As shown, an implementation method of an authenticator provided in this embodiment includes the following steps:

[0046] Step S1: the authenticator receives the authentication command sent by the authenticator interface, and parses the authentication command;

[0047] Specifically, the authenticator parses the authentication command according to the TLV format, where T is the command tag value, L is the data length in the command data field, and V is the data in the command data field.

[0048] Step S2: The authenticator judges the type of the authentication command according to the parsed command tag value, if it is a registration command, execute step S3, and if it is a signature command, execute step S4;

[0049] Specifically, if the parsed command tag value is equal to 0x3402, the authentication command is a registration command, and if the parsed command tag value is equal to 0x3403, the authentication command is a signature command.

[0050] Step ...

Embodiment 2

[0057] like figure 2 As shown, an implementation method of an authenticator provided in this embodiment includes the following content:

[0058] Step 1: The authenticator receives the authentication command sent by the authenticator interface, and parses the authentication command according to the TLV format;

[0059] Specifically, the authentication command adopts the TLV format, and the data field of the command (that is, V in the TLV) is also in the TLV format.

[0060] Preferably, this step also includes, when the authenticator receives the authentication command, parsing the authentication command according to the TLV format, and further judging whether the authentication command has passed the biometric verification when the format of the authenticated command is correct, and if so, execute the next step, otherwise it needs to The biometric verification is completed first; when the format of the authenticated command is incorrect, an error status code is returned to th...

Embodiment 3

[0108] The implementation method of the authenticator provided in this embodiment includes the registration function and the signature function implemented by the authenticator. Preferably, the system on which the authenticator is implemented in this embodiment is referred to as the client for short. When the client receives the upper layer When a registration command or a signature command is issued, the authenticator receives the registration command or signature command through the authenticator interface of the client, and executes the following steps in this embodiment: image 3 and Figure 4 The operation process is shown, and finally the client returns the command response received by the authenticator interface to the upper layer.

[0109] Specifically, such as image 3 As mentioned above, the registration process implemented by the authenticator includes: when the authenticator receives the registration command issued by the authenticator interface, the following ste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authenticator and a realization method thereof and belongs to the technical field of identity authentication. When the authenticator receives a registration command, the authenticator generates an authentication key pair, correlates and stores the authentication key pair and key token information contained in the registration command. The authenticator establishes registration assertion data according to the authentication key pair, forms registration command response according to the registration assertion data and a state code expressing performance success and returns the registration command response to an authenticator interface. When the authenticator receives a signing command, the authenticator obtains an authentication private key according to the key token information contained in the signing command, establishes signing assertion data according to transaction data contained in the signing command and the authentication private key, forms signing command response according to the signing assertion data and the state code expressing the performance success and returns the signing command response to the authenticator interface; and the authenticator interacts with a background server through the authenticator interface. The authentication private key does not appear in network transmission of an interaction process and does not need to be pre-stored at the background server, so the authentication information can be effectively prevented from being leaked.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to an authenticator and its implementation method. Background technique [0002] In the prior art, there are two commonly used user identity authentication methods as follows. One is a static authentication method of user name and user password. The authentication data used for user identity authentication, such as user name and user password, needs to be uploaded to the background server through the network. The defect of this authentication method is: the transmission of authentication data on the network is not safe; the other is the authentication method using OTP (OTP), the defect of this authentication method is: the background server needs to save the user's seed and key, etc. Information, once the information is leaked, the user's authentication information will be leaked. [0003] Therefore, the problem to be solved by the present invention is to seek a mor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0825H04L9/3213H04L9/3247
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products