Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An authentication method, device and storage medium

A technology of authentication request and authentication response, applied in the security field, can solve the problem of reducing the overhead of synchronization requirements, and achieve the effect of reducing the overhead of time and space, reducing the occupied bandwidth, and low time synchronization

Active Publication Date: 2022-05-31
BIGO TECH PTE LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The embodiment of the present invention provides an authentication method, device, and storage medium to solve the problem of how to reduce synchronization requirements and reduce overhead while ensuring costs when applying dynamic passwords to authenticate users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method, device and storage medium
  • An authentication method, device and storage medium
  • An authentication method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] S101, the terminal sends a registration request message carrying the registration parameters to the server.

[0079] Wherein, the user identification UID is a piece of information that uniquely identifies the user, such as the user's ID.

[0080] The environment information is the information that identifies the authentication environment, for example, the device identification DeviceID used to represent the device environment

[0091] 3. The original key SK is randomly generated.

[0101] S103, the terminal stores the original key, sequence data and token.

Embodiment 2

[0105] S301, the terminal sends the first authentication request message carrying the token to the server.

[0110] S302, the server sends the first authentication response message to the terminal.

[0115] The user identification UID in the first authentication request message can be compared with the user identification UID decrypted by the token Token

[0118] The safety parameter Salt and the second numerical value N

[0119] S303, the terminal sends the second authentication request message carrying the serial ciphertext and the target dynamic password to the server.

[0120] In this embodiment, after receiving the first authentication response message from the server, the terminal can extract the local

[0121] In one embodiment, the registration parameters include the user password password and / or contextual information (such as device identification

[0128] Determine the length L of the third hash value digest.

[0131] Convert the format of the second data Val to an unsig...

Embodiment 3

[0171] FIG. 5 is a flowchart of an authentication method provided in Embodiment 3 of the present invention, and this embodiment is applicable to

[0172] S501. Send the first authentication request message carrying the token to the server.

[0178] Send the first authentication request message to the server.

[0179] S502, receive the first authentication response message sent by the server.

[0184] Send the first authentication response message to the terminal.

[0185] S503, sending the second authentication request message carrying the serial ciphertext and the target dynamic password to the server.

[0187] In an embodiment, the first authentication request message includes a first value, a first reference time, and the first authentication

[0188] obtain user password password and / or environmental information;

[0192] The target dynamic password OTP and the sequence ciphertext Enc

[0193] The second authentication request message is sent to the server.

[0203] Derive usin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses an authentication method, device and storage medium. The method includes the terminal sending the first authentication request message carrying the token to the server; the server sending the first authentication response message to the terminal; Text, the second authentication request message of the target dynamic password is sent to the server, the target dynamic password is encrypted from the local registration parameters, original key and sequence data of the terminal, and the sequence ciphertext is encrypted from the sequence data; the server will carry the second authentication result of the authentication result The response message is sent to the terminal, and the authentication result is used to indicate that the target dynamic password is authenticated according to the serial ciphertext, the server's local original key and registration parameters. Symmetric key function and HMAC technology can be used for registration and authentication between the server and the terminal, which can increase the calculation speed and reduce the time and space overhead. The sequence data has low requirements for time synchronization, and is suitable for cross-border and cross-regional terminals and Authentication of the server.

Description

An authentication method, device and storage medium technical field [0001] Embodiments of the present invention relate to security technologies, and in particular, to an authentication method, device, and storage medium. Background technique [0002] When users perform business operations such as login, payment, and transfer at the terminal, they often face theft of passwords and login credentials. Threats of listening attacks and replay attacks, the server often authenticates the user's identity to protect the user's data and property. safety. [0003] In the traditional account and password mode, the password is fixed and needs to be remembered by the user, which is generally referred to as a static password. In order to prevent illegal personnel from stealing the identity of an existing user, the dynamic password (OTP, One Time Password) is often used to log in. User identity authentication, dynamic password is also known as one-time password, the password or passwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/06H04L9/08G06Q20/40
CPCH04L63/0823H04L63/0838H04L63/0876H04L63/0407H04L9/0643H04L9/0869H04L9/0863G06Q20/4014
Inventor 李岩
Owner BIGO TECH PTE LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products