Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User Authentication Method

A user authentication and user technology, applied in the Internet field, can solve problems such as being unsuitable for practical applications, performance degradation, etc., to achieve high performance and efficiency, meet security requirements, and optimize time performance.

Inactive Publication Date: 2021-02-05
HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among the existing protocols, the protocols with relatively high performance cannot effectively resist such attacks, while the protocols that can resist such attacks have a sharp drop in performance and are not suitable for practical applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User Authentication Method
  • User Authentication Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029]The embodiments of the present invention are described in detail below. Examples of the embodiments are shown in the accompanying drawings, in which the same or similar reference numerals indicate the same or similar components or components with the same or similar functions. The embodiments described below with reference to the accompanying drawings are exemplary, and are intended to explain the present invention, but should not be construed as limiting the present invention.

[0030]figure 1 The user authentication method according to an embodiment of the present invention, which can be executed by a server, includes:

[0031]ST1. Receive an anonymous login request sent by a user, where the anonymous login request includes the first encrypted information;

[0032]ST2. Generate and send second encrypted information to the user, where the second encrypted information includes first encrypted authentication information generated based on the first encrypted information and the stored e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user authentication method. The method comprises the following steps that an anonymous login request sent by a user is received, wherein the anonymous login request comprisesfirst encryption information; second encryption information is generated and sent to the user, wherein the second encryption information comprises first encryption authentication information generated on the basis of the first encryption information and stored encryption identity information of the user; after the user successfully verifies the first encryption authentication information, third encryption information sent by the user is received, wherein the third encryption information comprises second encryption authentication information generated on the basis of the first encryption authentication information; the second encryption authentication information is verified to obtain a user authentication result.

Description

Technical field[0001]The present invention relates to Internet technology, in particular to user authentication.Background technique[0002]With the development of the Internet, people obtain personalized services by transmitting personal information, enjoying the convenience brought by science and technology. However, the process of information transmission and storage often has security risks. Since personal information contains sensitive information such as ID cards, email addresses, mobile phone numbers, passwords, etc., if these contents are not safely transmitted or stored, it may lead to attackers stealing personal information and servers. Track user privacy and other issues.[0003]In recent years, researchers have proposed an anonymous password authentication key exchange protocol. This type of protocol uses password authentication to negotiate a session key between the user and the server. At the same time, when the server authenticates the user, the user remains anonymous, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3226H04L63/0428H04L63/08H04L63/083H04L63/1466
Inventor 陈建铭吴祖扬方伟成王景行
Owner HARBIN INST OF TECH SHENZHEN GRADUATE SCHOOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products