A method and system for offline remote authorization authentication

A technology of remote authorization and authentication methods, applied in the field of offline remote authorization and authentication methods and systems, can solve the problems that the authorized party cannot be remotely authorized and authenticated, and the authorized party cannot obtain permission request data, etc., and achieves dynamic and improved security. Effect

Active Publication Date: 2022-02-11
ZHENGZHOU XINDA JIEAN INFORMATION TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the above-mentioned remote authorization and authentication methods require real-time network communication between the authorizing party and the authorized party. Once the authorized party is offline, the authorizing party will not be able to obtain the permission request data sent by the authorized party, and thus will not be able to perform remote authentication on the authorized party. Authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for offline remote authorization authentication
  • A method and system for offline remote authorization authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to understand the above objects, features and advantages of the present invention more clearly, the present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be noted that the embodiments of the present application and the features in the embodiments may be combined with each other in the case of no conflict.

[0044] Many specific details are set forth in the following description to facilitate a full understanding of the present invention. However, the present invention can also be implemented in other ways different from those described herein. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. Example limitations.

[0045] figure 1 A flow chart of an offline remote authorization and authentication method of the present invention is shown.

[0046] like figure 1 As shown, the first aspect of the present invention ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes an off-line remote authorization authentication method and system. The method includes: the authorized device communicates with the authorized device in advance, and obtains a secret key seed synchronously; the authorized device and the authorized device respectively use the same algorithm to The key seed is calculated and processed, and the same ordered random array is generated for pre-storage; when the authorized device cannot communicate with the authorized device and authorization authentication is required, the user of the authorized device requests authorization from the administrator through a third-party path; the administrator based on The user identity is checked from the authorized device to obtain a random number in an ordered random array; the administrator informs the user of the authorized device of the random number through a third-party path; the user obtains the random number and enters it into the authorized device; the authorized device According to the input random number, search and compare in the pre-stored ordered random array. If the random number is found, the authorization authentication is successful. The invention satisfies the requirement of authorization and authentication under offline conditions.

Description

technical field [0001] The invention relates to the technical field of authorization and authentication, in particular to an offline remote authorization and authentication method and system. Background technique [0002] At present, for application scenarios that require remote authorization, it is usually necessary to establish a real-time network communication link between the authorizer and the authorized party, so that the authorizer can authenticate the permission request data sent by the authorized party, and then realize the remote authorization of the authorized party to the authorized party. Certification. [0003] However, the above-mentioned remote authorization and authentication methods require real-time network communication between the authorizer and the authorized party. Once the authorized party is offline, the authorizing party will not be able to obtain the permission request data sent by the authorized party, and thus will not be able to remotely conduct...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/40
CPCH04L9/0866H04L9/0869H04L63/18
Inventor 郭卫斌牛国富任嘉义马骥武忠品雷宇龙
Owner ZHENGZHOU XINDA JIEAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products