Supercharge Your Innovation With Domain-Expert AI Agents!

Portable authentication system and method

An authentication system and authentication method technology, applied in the field of portable authentication systems, can solve problems such as weak security barriers, high risk of password being stolen, and low security, so as to prevent illegal and malicious authentication behaviors, avoid confidential file leakage, and encrypt sex high effect

Active Publication Date: 2020-07-10
广州大鱼创福科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For this kind of password authentication, as long as anyone knows the specific password, anyone can access the file or server, and the security barrier is relatively weak.
On the other hand, these passwords are also easy to spread to the remote network platform, and any node on the network can implement monitoring, and the risk of passwords being stolen is high.
In addition, ordinary people tend to use a commonly used password with a relatively small length and number of digits, which also increases the hidden danger of password leakage
Therefore, although this password authentication method mainly implemented by mathematical means is simple to configure and easy to use, it has low security and has many defects.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Portable authentication system and method
  • Portable authentication system and method
  • Portable authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0037] In this embodiment, a portable authentication system, such as figure 1As shown, it includes a portable authentication device 1 and a server 2, the portable authentication device includes an authentication information collection mechanism 3, a display module 4, a processing module 5, a first password module 6, a network module 7, a communication module 8 and a battery module 9, and the processing module Respectively connected to the authentication information collection mechanism, the display module, the first password module, the network module and the communication module, the portable authentication device is connected to the terminal 10 that will access the server through the network module, and obtains network services through the terminal, and the portable authentication device communicates with the terminal 10 through the communication module Server communication. The network module is a USB interface, the terminal is a PC, the USB interface of the portable authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a portable authentication system and method. The system comprises a portable authentication device and a server. The portable authentication device comprises an authenticationinformation acquisition mechanism, a display module, a processing module, a first password module, a network module, a communication module and a battery module. The portable authentication device isconnected with a terminal to access a server through the network module, obtains network service through the terminal, and communicates with the server through the communication module. The method based on the system comprises the following steps: connecting the portable authentication device and the terminal; confirming the identity of the authentication device; inputting authentication information; sending to a server; authentication information matching; displaying the password; and verifying the password and accessing the MAC address of the terminal. The system has the advantages that triple authentication of the portable authentication device, the visitor and the terminal is carried out, so that the security is high. The password returned to the terminal by the server is encrypted bythe temporary secret key, so that secret file leakage caused by secret key leakage is avoided.

Description

technical field [0001] The invention relates to the authentication field, in particular to a portable authentication system. Background technique [0002] At present, people pay more and more attention to network security issues, among which advanced identity authentication technology is an effective means to ensure network security, and it is also the first important line of defense for network security. When users access the system, in order to protect some important confidential files, people often set passwords. This is the simplest and most traditional way. When they want to view files or access some important servers, they need to enter passwords for authentication. The system Responsible for verifying the correctness of the password and judging the legitimacy of the user. For this kind of password authentication, as long as anyone knows the specific password, anyone can access the file or server, and the security barrier is relatively weak. On the other hand, these ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/3231H04L63/0807H04L9/0861H04L9/3226H04L63/0876H04L63/0428
Inventor 梅鲁海
Owner 广州大鱼创福科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More