Authentication method and device and storage medium
A technology of authentication request and authentication response, applied in the security field, which can solve the problem of reducing the overhead of synchronization requirements
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0075] figure 1 It is a flowchart of an authentication method provided by Embodiment 1 of the present invention. This embodiment is applicable to the case where the server registers the terminal based on sequence data (Sequence, Seq) in the stateless mode. The so-called stateless mode can be It means that the server does not persistently store the relevant data of user authentication. The method can be executed by computer equipment, and the computer equipment (terminal and server) can be implemented by software and / or hardware, wherein the terminal can include mobile terminals (such as mobile phones, Tablet PC, etc.), wearable devices (such as smart watches, etc.), etc., the method specifically includes the following steps:
[0076] S101. The terminal sends a registration request message carrying registration parameters to the server.
[0077] In this embodiment, when the user registers, the terminal assembles the registration parameters into a registration request message a...
Embodiment 2
[0104] image 3 It is a flowchart of an authentication method provided by Embodiment 2 of the present invention. This embodiment is based on the foregoing embodiments, and further adds processing operations for the server to authenticate the terminal based on the sequence data Seq in the stateless mode. The method specifically Including the following steps:
[0105] S301. The terminal sends a first authentication request message carrying a token to a server.
[0106] In this example, if Figure 4 As shown, the terminal stores the original key SK, sequence data Seq, and token Token when registering with the server, and the server does not persist the original key SK, sequence data Seq, and token Token and other data related to user authentication. , the terminal extracts the Token stored locally, and sends it to the server through the first authentication request message.
[0107] It should be noted that during the authentication process, the sequence data Seq stored in the ...
Embodiment 3
[0171] Figure 5 It is a flowchart of an authentication method provided by Embodiment 3 of the present invention. This embodiment is applicable to the situation where the server registers and authenticates the terminal based on the sequence data Seq in the stateless mode. This method can be executed by a computer device , the computer device can be implemented as a terminal, and the terminal can be implemented by software and / or hardware, wherein the terminal can include a mobile terminal (such as a mobile phone, a tablet computer, etc.), a wearable device (such as a smart watch, etc.), etc., the The method specifically includes the following steps:
[0172] S501. Send the first authentication request message carrying the token to the server.
[0173] In this embodiment, the terminal stores the original key SK, the sequence data Seq and the token Token when registering with the server, and the terminal sends the first authentication request message carrying the token Token to...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com