Identity authentication method based on power distribution
A technology of identity authentication and electric power, applied in electrical components, transmission systems, information technology support systems, etc., can solve problems such as inconvenient operation, complex dynamic password implementation, and easy cracking, and achieve the effect of improving the security level
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0029] Example 1
[0030] Please refer to figure 1 , Is a schematic flow chart of an embodiment of an identity authentication method based on power distribution provided by the present invention. The method includes steps 101 to 104, which are executed by the authentication server, and each step is specifically as follows:
[0031] Step 101: Receive an authentication request instruction issued by a client, where the authentication request instruction includes a user name and an IP address of the client.
[0032] Step 102: In response to the authentication request instruction, query whether the client is a legitimate user in the user database according to the client IP address; in this embodiment, when it is determined that the client is an illegal user, and The client is disconnected.
[0033] Step 103: When it is determined that the client is a legitimate user, generate a random number and send the random number to the client as an authentication code, and calculate the user name and...
Example Embodiment
[0037] Example 2
[0038] Please refer to figure 2 , Is a schematic flowchart of another embodiment of an identity authentication method based on power distribution provided by the present invention. The method includes steps 201 to 204, which are executed by the client, and each step is specifically as follows:
[0039] Step 201: Send an authentication request instruction to an authentication server, where the authentication request instruction includes a user name and a client IP address.
[0040] Step 202: Receive the authentication code generated by the authentication server in response to the authentication request instruction, and calculate the user name and the random number in the authentication code through a preset algorithm to generate a second byte string; In this embodiment, the preset algorithm includes a one-way Hash function or a digital signature. In this embodiment, the one-way Hash function is an MD5 algorithm.
[0041] Step 203: Send the second byte string to th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap