Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for authentication of clients

A user and authenticated user technology, applied in the field of client authentication and devices, can solve problems such as regular maintenance, loss or forgetting (especially when it is not used every day, hardware damage, etc.), and achieve the effect of improving security

Active Publication Date: 2022-07-12
TELEFON AB LM ERICSSON (PUBL) +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Additionally, mobile devices are obvious targets for potential attackers
Hardware tokens are a more secure solution, but require specialized hardware that can be damaged, lost or forgotten (especially if not used on a daily basis)
Also, hardware tokens usually include batteries and thus require regular maintenance (e.g. battery replacement or hardware token replacement)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for authentication of clients
  • Method and apparatus for authentication of clients
  • Method and apparatus for authentication of clients

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In the following description, for purposes of explanation and not limitation, details are set forth, such as example embodiments regarding one or more devices that may be used as token sources and one or more device parameters, in order to provide a thorough understanding of the present invention. understand. It will be apparent to those skilled in the art that the present invention may be practiced in other embodiments that depart from these details. For example, those skilled in the art will understand that the present invention may be practiced with any device that can provide parameter values ​​that can be used in the authentication process of a client. The same applies to the device or apparatus performing the authentication, which may be eg a protected object, a server or any network entity.

[0035] Embodiments will be described in detail with reference to the accompanying drawings. The scope of the present invention is not limited by the embodiments described ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method, apparatus and computer program for authenticating a client are disclosed. The method includes: determining a device to be used for authentication of the client; receiving a parameter value for the device and an authentication value for the client; and authenticating the client based on the authentication value and the parameter value.

Description

technical field [0001] Various embodiments relate to methods, apparatus, and computer program products for authenticating clients. Background technique [0002] In a world where everything is increasingly connected and electronically controlled, authenticating clients (or users) is increasingly important. [0003] The most common authentication method today is for users to authenticate themselves through a secret code, such as a personal identification number (PIN) code or password. [0004] This can happen if the user enters the wrong password multiple times (eg, if the user forgets the password or confuses it with another password, which can easily happen to a password the user has to remember). In this case, the user is usually blocked after a certain number of attempts. [0005] If a user authenticates using a fingerprint sensor, authentication may no longer be possible if the user's authentication finger is injured (eg, cuts the skin). [0006] Known other authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04W4/70H04W4/40H04W12/069G06F21/43G06F21/35G06F21/34
CPCG06F21/34H04L63/0853H04W4/70H04W4/40Y04S40/20H04W12/069G06F21/43G06F21/35H04L63/08H04L63/0876
Inventor G·利奥库莫维奇B·米希勒N·卡特尔
Owner TELEFON AB LM ERICSSON (PUBL)