Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and device and storage medium

A technology of authentication request and authentication response, applied in the security field, which can solve the problem of reducing the overhead of synchronization requirements

Active Publication Date: 2020-08-25
BIGO TECH PTE LTD
View PDF13 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The embodiment of the present invention provides an authentication method, device, and storage medium to solve the problem of how to reduce synchronization requirements and reduce overhead while ensuring costs when applying dynamic passwords to authenticate users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device and storage medium
  • Authentication method and device and storage medium
  • Authentication method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] figure 1 It is a flowchart of an authentication method provided by Embodiment 1 of the present invention. This embodiment is applicable to the case where the server registers the terminal based on sequence data (Sequence, Seq) in the stateless mode. The so-called stateless mode can be It means that the server does not persistently store the relevant data of user authentication. The method can be executed by computer equipment, and the computer equipment (terminal and server) can be implemented by software and / or hardware, wherein the terminal can include mobile terminals (such as mobile phones, Tablet PC, etc.), wearable devices (such as smart watches, etc.), etc., the method specifically includes the following steps:

[0076] S101. The terminal sends a registration request message carrying registration parameters to the server.

[0077] In this embodiment, when the user registers, the terminal assembles the registration parameters into a registration request message a...

Embodiment 2

[0104] image 3 It is a flowchart of an authentication method provided by Embodiment 2 of the present invention. This embodiment is based on the foregoing embodiments, and further adds processing operations for the server to authenticate the terminal based on the sequence data Seq in the stateless mode. The method specifically Including the following steps:

[0105] S301. The terminal sends a first authentication request message carrying a token to a server.

[0106] In this example, if Figure 4 As shown, the terminal stores the original key SK, sequence data Seq, and token Token when registering with the server, and the server does not persist the original key SK, sequence data Seq, and token Token and other data related to user authentication. , the terminal extracts the Token stored locally, and sends it to the server through the first authentication request message.

[0107] It should be noted that during the authentication process, the sequence data Seq stored in the ...

Embodiment 3

[0171] Figure 5 It is a flowchart of an authentication method provided by Embodiment 3 of the present invention. This embodiment is applicable to the situation where the server registers and authenticates the terminal based on the sequence data Seq in the stateless mode. This method can be executed by a computer device , the computer device can be implemented as a terminal, and the terminal can be implemented by software and / or hardware, wherein the terminal can include a mobile terminal (such as a mobile phone, a tablet computer, etc.), a wearable device (such as a smart watch, etc.), etc., the The method specifically includes the following steps:

[0172] S501. Send the first authentication request message carrying the token to the server.

[0173] In this embodiment, the terminal stores the original key SK, the sequence data Seq and the token Token when registering with the server, and the terminal sends the first authentication request message carrying the token Token to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an authentication method and device and a storage medium. The method comprises the steps that a terminal sends a first authentication request message carryinga token to a server; the server sends the first authentication response message to the terminal; the terminal sends a second authentication request message carrying a sequence ciphertext and a targetdynamic password to the server, the target dynamic password is encrypted from local registration parameters, an original key and sequence data of the terminal, and the sequence ciphertext encrypts the self-sequence data; and the server sends a second authentication response message carrying an authentication result to the terminal, wherein the authentication result is used for indicating that thetarget dynamic password is authenticated according to the sequence ciphertext, the local original key of the server and the registration parameter. The symmetric key function and the HMAC technologycan be used between the server and the terminal for registration and authentication, the calculation speed can be increased, the expenditure of time and space is reduced, the requirement of sequence data for time synchronization is low, and the method is suitable for authentication of transnational and cross-regional terminals and servers.

Description

technical field [0001] The embodiments of the present invention relate to security technologies, and in particular to an authentication method, device and storage medium. Background technique [0002] When users perform business operations such as login, payment, and transfer on the terminal, they often face the threat of eavesdropping attacks and replay attacks targeting passwords and login credentials. In this regard, the server often authenticates the user's identity to ensure the security of user data and property. [0003] In the traditional account and password method, the password is fixed and needs to be remembered by the user. It is generally called a static password. The dynamic password is also called one-time password, and the password or password is valid for one time in the authentication. [0004] At present, dynamic passwords are mainly divided into the following two categories: [0005] 1. Hardware Token Technology [0006] The hardware token technology i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08H04L9/06G06Q20/40
CPCH04L63/0823H04L63/0838H04L63/0876H04L63/0407H04L9/0643H04L9/0869H04L9/0863G06Q20/4014
Inventor 李岩
Owner BIGO TECH PTE LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products