Offline authentication system and method thereof

An authentication and system data technology, applied in the field of offline authentication, can solve the problems of inability to solve software and hardware environment cloning, inability to ensure trusted system environment authentication services, etc., and achieve the effect of preventing resource exhaustion attacks

Active Publication Date: 2021-11-30
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide an off-line authentication system and its method. However, the existing technology cannot solve the problem that the software and hardware environment is cloned, and cannot ensure a truly effective trusted system environment to support authentication services. Authentication services can be reversed. Technical issues such as compilation, debugging and tracking, and analysis of memory incremental backup files

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Offline authentication system and method thereof
  • Offline authentication system and method thereof
  • Offline authentication system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0088] Such as figure 1 with image 3 , for the method of constructing the authentication system, it can also be called the initialization and installation and deployment of the authentication system, the method includes:

[0089]S1) Configuring hardware data on an authentication device, and configuring an authentication service with a verification function of the hardware data on the authentication device;

[0090] S2) Isolate the authentication network of the authentication device from the application network of the application service that interacts with the authentication service, and use the verification function of the hardware data in the authentication network to obtain the execution state Authentication service, and constitute an authentication system through the authentication device corresponding to the authentication service in the execution state;

[0091] The authentication device can be a single or a cluster (more than two); the authentication device can have ...

Embodiment 2

[0122] A method for constructing an authentication system through an authentication device cluster, the method comprising:

[0123] A1) Configure hardware data on at least three authentication devices and configure authentication services with the verification function of the hardware data to serve each authentication device, wherein one of the at least three authentication devices is selected arbitrarily The authority device has a historical consensus database of block data that is generated according to a preset probability and conforms to a preset rule over time, wherein the block data includes historical hash data or empty data with a time stamp, and the historical The hash data is configured as hardware data of the at least three authentication devices and has a time stamp;

[0124] A2) Isolate the authentication network of the at least three authentication devices from the application network of the application service interacting with the authentication service, and use...

Embodiment 3

[0127] On the basis of Example 1, such as Figure 4 with Figure 5 , to start the pre-configured authentication system, the startup method includes:

[0128] B1) Start the authentication device, use the verification function of the system data of the authentication device to perform the verification of the system data, and when the verification of the system data passes, proceed to step B2);

[0129] B2) Start the authentication service in the authentication device, use the verification function of the hardware data of the authentication service to perform the verification of the hardware data, and configure the hardware data when the verification of the hardware data passes The above authentication service enters the execution state, and completes the startup of the authentication system.

[0130] Specifically, in step B1), after the authentication device is started and until the system data verification function of the authentication device is used to perform the verificatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for constructing an authentication system, which belongs to the technical field of application service authentication. The method includes: configuring hardware data on an authentication device and configuring an authentication service with a verification function of the hardware data to serve the authentication device; isolating the authentication network of the authentication device from the authentication network of the authentication device The application network of the application service that interacts with the authorization service, the verification function of the hardware data is used in the authentication network to obtain the authentication service in the execution state and pass the authentication device corresponding to the authentication service in the execution state constitute an authentication system. The authentication system of the present invention does not need to modify the application server and application network, and the hardware cost and deployment cost are low. The authentication system of the present invention has high security, high availability, and completeness and consistency relative to pre-configuration conditions.

Description

technical field [0001] The present invention relates to the technical field of offline authentication, in particular to a method for constructing an authentication system, a method for constructing an authentication system through a consensus cluster authentication device, a method for starting an authentication system, and a method for An authentication method for an authentication system, an authentication system, a device for the authentication system, and a computer-readable storage medium. Background technique [0002] At present, the privatization and delivery of software requires authorization and activation. Authentication methods are usually used to limit the duration of trial software services, the number of resources, and deployed servers, etc., to ensure the commercial interests of software developers and prevent software from being deployed arbitrarily without authorization. and use. [0003] The existing authentication scheme, the comparative document CN105897...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/12
Inventor 林海涛赵鑫刘建夏陆勇倪杨钱毅张文康牛宝龙钟原张红光张学聪喻友平吴甜
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products