Two-factor authentication method, system and device based on encryption lock device

A technology of two-factor authentication and authentication system, which is applied in the field of computer-readable storage media and two-factor authentication, can solve problems such as personal information leakage, and achieve the effect of ensuring information security and ensuring the loss of encryption locks

Pending Publication Date: 2022-01-28
西安震有信通科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a two-factor authentication method, system, device and computer-readable storage medium based on an encryptio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-factor authentication method, system and device based on encryption lock device
  • Two-factor authentication method, system and device based on encryption lock device
  • Two-factor authentication method, system and device based on encryption lock device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0037] In order to make the objects, technical solutions and advantages of the present invention, the present invention will be described in detail below with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are intended to explain the present invention and is not intended to limit the invention.

[0038] The two-factor authentication method based on the encryption lock device according to the preferred embodiment of the present invention, such as figure 1 As shown, the two-factor authentication method based on the encryption lock device includes the following steps:

[0039] Step S10, receive the authentication account and password entered by the user, determine whether the current system is inserted into the encryption lock device.

[0040] Specifically, the user information is created in the authentication system before the step S10, the user information includes an account and a password, and the current authenticate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-factor authentication method, system and device based on an encryption lock device, and the method comprises the steps: receiving an authenticated account and password inputted by a user, and judging whether the current system is inserted into the encryption lock device or not; if the encryption lock device is inserted into the current system, reading a system authentication identifier of a data area of the encryption lock device, and judging whether the current encryption lock device is issued by an authentication system or not; if the current encryption lock device is issued by the authentication system, encrpting and matching the authenticated account with the encrypted authenticated user account read by the data area of the encryption lock device; if the matching is successful, carrying out secondary encryption on the unique ID of the encryption lock device and the authenticated password, and requesting security authentication from the server; and if the server verifies that the account number, indicating that the password and the unique ID of the encryption lock device for security authentication are correct, returning a message of successful authentication. Two-way verification between the encryption lock and the user and between the encryption lock and the system is added, and information safety of the user is guaranteed.

Description

technical field [0001] The present invention relates to the technical field of 5G mobile communication, in particular to a two-factor authentication method, system, device and computer-readable storage medium based on a dongle device. Background technique [0002] At present, most systems still use the password authentication method, and the security of this single-factor authentication depends on the password. As long as each user can enter the password correctly, the computer will think that this is a legitimate user. [0003] With the development of the Internet, people obtain personalized services by transmitting personal information and enjoy the convenience brought by science and technology. However, there are often security risks in the process of information transmission and storage. Since personal information contains sensitive information such as ID cards, email addresses, mobile phone numbers, and passwords, if these contents are not securely transmitted or store...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/34G06F21/46G06F21/60
CPCG06F21/34G06F21/46G06F21/602
Inventor 白肖吴闽华卫宣安姜坤
Owner 西安震有信通科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products