Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dual verification method for trusted equipment access application

A device access and double verification technology, applied in the field of application security verification, can solve problems such as dictionary attacks, password errors, password leakage, etc., to achieve the effect of enhancing security

Active Publication Date: 2021-06-04
4399 NETWORK
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This also leads to the security shortcomings of static passwords, such as peeping, guessing, dictionary attacks, brute force cracking, stealing, monitoring, replay attacks, Trojan horse attacks, etc.
On the other hand, in order to prevent forgetting passwords, many users often use strings that are easy to guess such as birthdays and phone numbers as passwords, or record passwords in a place they think is safe, which can easily cause password leakage
Of course, in order to improve the security of static passwords to a certain extent, users can change their passwords regularly, but this leads to difficulties in the use and management of static passwords, especially when a user has several or even dozens of passwords When it needs to be dealt with, it is very easy to cause problems such as misremembering passwords and forgetting passwords, and it is also difficult to require all users to strictly implement the operation of regularly changing passwords
[0004] Static password authentication technology is very vulnerable in the face of the above-mentioned forms of network attacks, security incidents that attackers illegally obtain legitimate user passwords and invade network systems often occur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dual verification method for trusted equipment access application
  • Dual verification method for trusted equipment access application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the technical problems, technical solutions and beneficial effects solved by the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0038]The present invention provides a double verification method for a trusted device to access an application. The double verification method is the safest and most convenient way in terms of security and deployment compared to other non-ID / PW mode solutions.

[0039] After enabling two-factor authentication, users can only access the application software corresponding to their account on authorized devices (that is, trusted devices or web pages). When logging in to a new device (unauthorized device) for the first time and accessing the application software correspondi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a dual verification method for trusted equipment to access an application, which comprises the following steps that: when an existing account accesses a new unauthorized client mode, a verification server verifies a current client A by adopting the following modes: the verification server randomly generates a dynamic code plaintext, encrypts the dynamic code plaintext, a dynamic code ciphertext is obtained, and then the dynamic code ciphertext is sent to the authorized client; the authorization client carries out decryption operation on the received dynamic code ciphertext to obtain a dynamic code plaintext, and the dynamic code plaintext is displayed in a display area of the authorization client; and the verification server judges whether the dynamic code plaintext returned by the client A is received within a preset time. The double-verification method for the trusted equipment to access the application has the advantages that a double-verification mechanism of the password and the verification code of the user account is adopted, and the safety of the user account in using the application software is remarkably enhanced.

Description

technical field [0001] The invention belongs to the technical field of application security verification, and in particular relates to a double verification method for a trusted device to access an application. Background technique [0002] Since the Internet entered thousands of households in the 1990s, Internet services (such as mail, e-commerce, and social networking) have flourished. Account passwords have become one of the most important means of protecting user information security in the Internet world, and they are also the most important means of most network systems today. The simplest access control method used, which confirms the user's legitimacy through the matching of passwords. Specifically, the system creates an ID / PW (account / password) pair for each legitimate user. When the user logs in to the system, the user is prompted to enter the account and password. The system checks the account password entered by the user with the existing legitimate users in the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/31
CPCH04L63/083H04L63/0807H04L63/0428G06F21/31
Inventor 李兴平陈旺科陈发文
Owner 4399 NETWORK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products