Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and system

An authentication method and authentication information technology, applied in the field of authentication methods and systems, can solve the problems of low authentication accuracy and the inability of authentication methods to effectively detect cloning operations, so as to improve user experience and improve authentication accuracy.

Active Publication Date: 2020-03-27
ALIBABA GRP HLDG LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The embodiment of the present application provides an authentication method and system to at least solve the technical problem that the authentication method in the prior art cannot effectively detect the occurrence of cloning operations, resulting in low authentication accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system
  • Authentication method and system
  • Authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] According to an embodiment of the present application, an embodiment of an authentication method is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, although in The flowcharts show a logical order, but in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0049] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. figure 2 A hardware structural block diagram of a computer terminal (or mobile device) for implementing the authentication method is shown. Such as figure 2 As shown, the computer terminal 20 (or mobile device 20) may include one or more (202a, 202b, . or a processing device such as a programmable logic device FPGA), a memory 204 for storing d...

Embodiment 2

[0206] According to the embodiment of the present application, an embodiment of an authentication method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, although A logical order is shown in the flowcharts, but in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0207] Figure 8 It is a flowchart of an authentication method according to Embodiment 2 of the present application. Such as Figure 8 As shown, the method includes the following steps:

[0208] Step S82, the server sends the challenge value to the client terminal.

[0209] Optionally, an authentication device may be connected to the client terminal, and the authentication factor may be stored in a single-chip microcomputer or a security module of the authentication device.

[0210] Specifically, the ...

Embodiment 3

[0243] According to an embodiment of the present application, an authentication device for implementing the above authentication method is also provided, and the device is deployed on a client terminal side. Such as Figure 9 As shown, the apparatus 900 includes: an acquiring module 902 , a generating module 904 and a sending module 906 .

[0244] Wherein, the obtaining module 902 is used to obtain the signature information, the first value of the preset counter and the authentication factor, wherein the signature information is obtained by signing the challenge value sent by the server, and the first value is used to represent the signature of the challenge value. The number of operations, the authentication factor is used to represent the login information of the client terminal logging in to the server; the generating module 904 is used to generate authentication information based on the signature information, the first value and the authentication factor; the sending modul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method and system. The method comprises: a client terminal obtains signature information, a first numerical value and an authentication factor, wherein the signature information is obtained by signing a challenge value sent by a server, the first numerical value is used for representing the operation frequency of signing the challenge value, and the authentication factor is used for representing login information of the client terminal logging in the server; the client terminal generates authentication information based on the signature information, the first numerical value and the authentication factor; and the client terminal sends the authentication information to the server, wherein the server verifies the authentication information. The technical problem of low authentication accuracy due to the fact that cloning operation cannot be effectively detected by an authentication method in the prior art is solved.

Description

technical field [0001] This application relates to the field of two-factor authentication, in particular, to an authentication method and system. Background technique [0002] Two-factor authentication (2FA, Two-factor Authentication) has been recognized internationally and is the most effective way to enhance the security of user accounts. Common two-factor authentication schemes such as SMS verification codes, RSA tokens (TOTP), biometric information, etc., have problems such as inconvenient operation, data hijacking in the middle, and leakage of user privacy. [0003] Universal 2nd Facto (U2F, Universal 2nd Facto) is similar to the protection mechanism of the second-generation U-Shield in China, using two factors (passwords and devices that can interact with users) to protect user accounts and privacy. During the registration phase, the user uses the U2F device supported by the server to bind the account with the device. When the login verification operation is performe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3278H04L2463/082H04L9/3247H04L63/0853H04L63/1416H04L9/3271H04L9/3234H04L63/061H04L63/107
Inventor 朱红儒李克鹏王康
Owner ALIBABA GRP HLDG LTD