Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method

An authentication method and authenticator technology, applied in the usage of multiple keys/algorithms, user identity/authority verification, etc.

Active Publication Date: 2010-07-28
HUAWEI TECH CO LTD
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018]1. Every time the user logs in, he needs to enter the user name and password at least twice, which makes the authentication operation cumbersome
[0019]2. The implementation of OTP authentication is single, unable to provide users with different levels of authentication services
[0020]3. The new password is generated by the authentication server, which is not conducive to user memory

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method
  • Authentication method
  • Authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0049] The overall process of the present invention is as figure 2 As shown, the specific steps are as follows:

[0050] Step 201. After receiving the access request sent by the terminal, the authentication server judges whether the password corresponding to the requesting user is valid, and if yes, executes step 202; otherwise, executes step 203;

[0051]Step 202, sending the authentication result information to the terminal, and then directly ending the process;

[0052] Step 203, the authentication server obtains the final valid password of the user, and sends the final valid password to the user;

[0053] Step 204, the authentication server instructs the terminal to initiate authentication to the authentication server with the final valid password, and the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosed certification method comprises: the authorized server decides whether the user key available after receiving terminal request, yes to send result information to terminal and end process directly; or else, the server obtains user final effective key to send to user and indicate terminal to initiate request to server with the last key, then sends result to the terminal. This inventionimproves security, reduces detailed operation, and enhances attraction to client.

Description

technical field [0001] The invention relates to the technical field of communication system authentication, in particular to an authentication method. Background technique [0002] With the development of wireless technologies, such as the popular wireless access networks such as the Worldwide Access Interoperability (WiMAX) network and the Wireless Local Area Network (WLAN), the market prospect is getting better and better. However, as applications become more and more extensive, wireless access networks are subject to more and more attacks. Therefore, most existing wireless access networks use fixed user names and passwords to authenticate users before accessing to increase security. . However, due to the long-term use of a fixed user name and password, the user name and password are easy to be stolen, so the security of using a fixed user name and password is low. [0003] In order to solve the security problem of fixed user names and passwords, a kind of one-time pad (...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/16
Inventor 单长虹黄迎新
Owner HUAWEI TECH CO LTD