Authentication method and system
An authentication method and authentication information technology, applied in the field of authentication methods and systems, can solve the problems of low authentication accuracy and the inability of authentication methods to effectively detect cloning operations, so as to improve user experience and improve authentication accuracy.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0048] According to an embodiment of the present application, an embodiment of an authentication method is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, although in The flowcharts show a logical order, but in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0049] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. figure 2 A hardware structural block diagram of a computer terminal (or mobile device) for implementing the authentication method is shown. Such as figure 2 As shown, the computer terminal 20 (or mobile device 20) may include one or more (202a, 202b, . or a processing device such as a programmable logic device FPGA), a memory 204 for storing d...
Embodiment 2
[0206] According to the embodiment of the present application, an embodiment of an authentication method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, although A logical order is shown in the flowcharts, but in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0207] Figure 8 It is a flowchart of an authentication method according to Embodiment 2 of the present application. Such as Figure 8 As shown, the method includes the following steps:
[0208] Step S82, the server sends the challenge value to the client terminal.
[0209] Optionally, an authentication device may be connected to the client terminal, and the authentication factor may be stored in a single-chip microcomputer or a security module of the authentication device.
[0210] Specifically, the ...
Embodiment 3
[0243] According to an embodiment of the present application, an authentication device for implementing the above authentication method is also provided, and the device is deployed on a client terminal side. Such as Figure 9 As shown, the apparatus 900 includes: an acquiring module 902 , a generating module 904 and a sending module 906 .
[0244] Wherein, the obtaining module 902 is used to obtain the signature information, the first value of the preset counter and the authentication factor, wherein the signature information is obtained by signing the challenge value sent by the server, and the first value is used to represent the signature of the challenge value. The number of operations, the authentication factor is used to represent the login information of the client terminal logging in to the server; the generating module 904 is used to generate authentication information based on the signature information, the first value and the authentication factor; the sending modul...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


