A multiple certification method and system

An authentication method and authentication system technology, applied in the field of access control systems and security systems, can solve the problems of not significantly improving the security protection level of the system, wrong authentication, counterfeiting of fingerprint information, etc., and achieve both convenience, high complexity and strength. The effect of improving safety

Pending Publication Date: 2018-11-09
上海求敏信息科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this existing technology constitutes a two-level authentication, since the generation of the dynamic password is automatically generated by the system according to a specific algorithm, in fact, the dynamic password can be obtai

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multiple certification method and system
  • A multiple certification method and system
  • A multiple certification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The following will be combined with the attached figure 1 The access control system in the invention is described. The authentication system according to the present invention is an authentication system that implements multiple authentications. It basically includes three main components: an authentication host, a user terminal, and an authentication execution device. The authentication host can perform authentication operations on the user terminal, and can communicate with The user terminal negotiates to determine the secret parameter information required for authentication, and stores preset shared information and qualified response information; the user terminal can generate random challenge information, and store the operation rules preset by the user, and receive The information input by the user communicates with the authentication host, and the authentication execution device receives the control information of the authentication host and performs corresponding...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a multiple certification method and system adopting a customized rule. A certification host, a user terminal and a certification executing device are adopted. Multiple certification design is adopted, verification is performed on users through the user terminal which uses random challenge information and a preset operation regulation, peep attack and brute force cracking attack are defended, even if the hardware is lost, an illegitimate users still cannot normally use the user terminal to pass through the verification of the certification host. A hand-drawn graph having customized meaning is used as verification information in a second certification phase, the brute force cracking attack is avoided, the calculating capability of the certification user terminal andthe certification host can be fully utilized, redundancy information is added into interaction, and playback attack is defended. The system can be used as an access control system or an access controlsystem of an information device.

Description

technical field [0001] The present invention relates to an authentication method and a corresponding system, more specifically, the present invention relates to a multi-authentication method and system using customized rules, which are widely applicable to various information systems based on password authentication, especially for access control systems , security systems and other technical fields. Background technique [0002] There are various types of authentication systems in the prior art, such as the widely used access control system or security system, whose function is to authenticate the user's identity, and judge whether to authorize or release the user according to the authentication result. [0003] According to the different input methods of authentication information, the current authentication systems (such as access control systems) can be roughly divided into three categories: password input type, card type and biometric type. In password-input authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08G07C9/00
CPCH04L63/08H04L67/12G07C9/22
Inventor 戚祖平李亚宁
Owner 上海求敏信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products