Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Segmented key authentication system

A technology of authentication system and authentication data, applied in the field of authentication system

Pending Publication Date: 2019-11-01
J·加斯屈埃尔
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case the disadvantage is: if the phone is stolen, this SMS is directly received by the malicious person and simplifies his authentication to the application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Segmented key authentication system
  • Segmented key authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The following embodiments are examples. Although the description refers to one or more embodiments, this does not imply that each reference refers to the same embodiment, or that a feature applies to only one embodiment. Simple features of different implementations may also be combined to provide other implementations. In respect of the drawings, for purposes of illustration and clarity, scale and proportion have not been strictly adhered to.

[0064] figure 1 An authentication system 10 according to an embodiment of the present invention is schematically represented. Authentication system 10 enables control of access to applications 12 accessible via computer 14 . The authentication system includes a master mobile device 16 and a master token 18 . The master mobile device includes a near field communication module 20 , a non-volatile memory 22 and a volatile memory 24 .

[0065] The master token 18 also includes a near field communication module 26 and a non-volat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention concerns an authentication system with at least one application accessible by a user via a computer and for which the access is controlled by an authentication datum, comprising a main mobile device and a main token in which at least one authentication datum is recorded, the main mobile device being configured to recover the authentication datum of the main token using a pairing key,characterised in that the pairing key is segmented into a plurality of segments, a first segment being recorded on the main mobile device and at least one other additional segment being recorded on asecondary mobile device and / or a secondary token, the main mobile device being configured to recover the additional segment or segments in order to reconstitute the pairing key and to present the reconstituted pairing key to the main token.

Description

technical field [0001] The present invention relates to an authentication system for authenticating one or more applications. In particular, the present invention relates to an authentication system for one or more applications accessible via a computer and access to the one or more applications is controlled by authentication data, which may be, for example, digital identities, identification Identifier / password pairs, encryption keys, access codes, keys associated with two devices, etc. Background technique [0002] Current authentication systems are often based on weak authentication such as identifiers and / or passwords. This type of authentication is one of the easiest to establish and requires the intervention of the user, who will enter those identifiers that he knows or that are recorded on another document. [0003] This type of authentication has several disadvantages. [0004] Firstly, it is based on the user's memory, and if the user has to remember multiple id...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/35H04L9/08H04W12/06
CPCG06F21/35H04L9/085H04W12/068G06F21/335G06F21/46H04W12/06
Inventor J·加斯屈埃尔
Owner J·加斯屈埃尔
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products