otp generation method, verification method, terminal, server, chip and medium
A security server and server-side technology, applied in user identity/authority verification, encryption device with shift register/memory, digital transmission system, etc., can solve the problem of affecting OTP security and low security guarantee ability of client and verification terminal , Affecting verification security and other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 approach
[0049] figure 1 An application architecture diagram of an embodiment of the method of the present application is shown. The method in this embodiment of the application involves three devices: a client, a verification server (terminal on the user side) and a security server. figure 2 It is a schematic flowchart of the method for generating the OTP of the present application, image 3 It is a schematic flowchart of the OTP verification method of the present application. Refer below Figure 1-3 To describe the scheme of the embodiment of the present application, it should be noted that the method of the present application is not subject to Figure 2-3 Restrictions on the order of steps shown in .
[0050]S101, the client initiates a verification request to the security server.
[0051] S102. The security server uses the first key K1 shared with the verification server in advance to calculate a hash value for the first timestamp, obtains the first hash value mac1, and retu...
no. 2 approach
[0111] Such as Figure 5 As shown, in one embodiment, the method of the present application is applied to OTP (One Time Password, OneTime Password) unlocking of a door lock. The mobile phone APP is the client, the door lock is the authentication server, and the application server of the door lock is the security server.
[0112] When the door lock is produced, a random key is shared between the application server (security server) of the door lock and each door lock (verification server) as the first key K1. When the door lock is installed, the administrator password set by the user is used as the key seed to generate the second key K2.
[0113] The key (first key K1) between the security server and the verification server uses a complex key with a relatively high security level; the key shared between the verification server and the client (the second key K2) is Use a relatively simple key with a relatively low security level, such as a key generated by using the password s...
no. 3 approach
[0118] An embodiment of the present application proposes a user terminal, including a memory, a processor, and a computer program stored on the memory and operable on the processor. The OTP generation method. Specifically, the user terminal may be a mobile phone, a tablet computer, a personal digital assistant (personal digital assistant, PDA), a wearable device, and the like.
[0119] Optionally, the user terminal includes a sender, and the sender initiates a verification request to the security server in a wired or wireless manner, and the processor executes other steps (such as steps S102-S104).
[0120] The embodiment of the present application also proposes a user terminal, including a memory, a processor, and a computer program stored in the memory and operable on the processor. When the processor executes the program, it implements the The OTP verification method described above. The user terminal may be a product in the smart home or security field such as a door loc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


