Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User authentication method

A user authentication and user technology, applied in the Internet field, can solve problems such as performance degradation and unsuitability for practical applications, achieve high performance and efficiency, meet security requirements, and achieve optimal time efficiency

Inactive Publication Date: 2018-05-29
HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among the existing protocols, the protocols with relatively high performance cannot effectively resist such attacks, while the protocols that can resist such attacks have a sharp drop in performance and are not suitable for practical applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method
  • User authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar components or components having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0030] figure 1 A user authentication method showing an embodiment of the present invention, which can be executed by a server, includes:

[0031] ST1. Receive an anonymous login request sent by a user, where the anonymous login request includes first encrypted information;

[0032] ST2. Generate and send second encrypted information to the user, where the second encrypted information includes first encrypted authentication information generated based on the first encrypted information and the stored encrypted identity informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user authentication method. The method comprises the following steps that an anonymous login request sent by a user is received, wherein the anonymous login request comprisesfirst encryption information; second encryption information is generated and sent to the user, wherein the second encryption information comprises first encryption authentication information generated on the basis of the first encryption information and stored encryption identity information of the user; after the user successfully verifies the first encryption authentication information, third encryption information sent by the user is received, wherein the third encryption information comprises second encryption authentication information generated on the basis of the first encryption authentication information; the second encryption authentication information is verified to obtain a user authentication result.

Description

technical field [0001] The invention relates to Internet technology, in particular to user authentication. Background technique [0002] With the development of the Internet, people obtain personalized services by transmitting personal information and enjoy the convenience brought by science and technology. However, there are often security risks in the process of information transmission and storage. Since personal information contains sensitive information such as ID cards, email addresses, mobile phone numbers, and passwords, if these contents are not securely transmitted or stored, attackers may steal personal information, server Track user privacy and other issues. [0003] In recent years, researchers have proposed anonymous password-authenticated key exchange protocols. This type of protocol uses password authentication to negotiate a session key between the user and the server. At the same time, in the process of authenticating the user by the server, the user rem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3226H04L63/0428H04L63/08H04L63/083H04L63/1466
Inventor 陈建铭吴祖扬方伟成王景行
Owner HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products