Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Server, client terminal, authentication system, user authentication method and data access method

A user authentication and client-side technology, which is applied in the field of Internet security and can solve problems such as insufficient security of user authentication schemes.

Active Publication Date: 2014-07-02
SUMAVISION TECH CO LTD
View PDF8 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Embodiments of the present invention provide a server, a client, an authentication system, and a method for user authentication and data access, so as to at least solve the technical problem of insufficient security of existing user authentication schemes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Server, client terminal, authentication system, user authentication method and data access method
  • Server, client terminal, authentication system, user authentication method and data access method
  • Server, client terminal, authentication system, user authentication method and data access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] According to an embodiment of the present invention, a user authentication method is provided, such as figure 1 As shown, the method includes:

[0020] S102: Receive a first message sent by the client to request authentication of the user of the client, where the first message carries first authentication information and second authentication information corresponding to the user, where the first authentication information includes user input information, The second authentication information includes the user's card swiping information;

[0021] S104: Determine whether the first authentication information matches the second authentication information;

[0022] S106: If they match, send a second message to the client to indicate that the authentication is successful.

[0023] It should be clear that one of the problems to be solved by the embodiments of the present invention is to provide a method for authenticating a client or its user, wherein the client can be used...

Embodiment 2

[0062] According to an embodiment of the present invention, a data access method is also provided, such as figure 2 As shown, the method includes:

[0063] S202: When the client needs to access the target data, obtain first authentication information and second authentication information corresponding to the user of the client, wherein the first authentication information includes the user's input information, and the second authentication information includes the user's card swiping information;

[0064] S204: Send to the server a first message for requesting authentication of the user, the first message carries the first authentication information and the second authentication information, and is used to make the server send The client returns a second message indicating successful authentication;

[0065] S206: When receiving the second message, send a message for requesting access to the target data to the corresponding device.

[0066] It should be clear that one of th...

Embodiment 3

[0107] According to an embodiment of the present invention, a server for implementing the user authentication method described in Embodiment 1 is also provided, such as image 3 As shown, the server includes:

[0108] 1) The first receiving unit 302 is configured to receive a first message sent by the client to request authentication of the user of the client, the first message carries first authentication information and second authentication information corresponding to the user, wherein the first The authentication information includes the user's input information, and the second authentication information includes the user's card swiping information;

[0109] 2) A judging unit 304, configured to judge whether the first authentication information matches the second authentication information;

[0110] 3) The first sending unit 306 is configured to send a second message indicating successful authentication to the client when the first authentication information matches the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a server, a client terminal, an authentication system, a user authentication method and a data access method. The user authentication method comprises the steps that a first message which is used for requesting authentication of a user of the client terminal and sent by the client terminal is received, wherein the first message carries first authentication information and second authentication information, the first authentication information and the second authentication information correspond to the user, the first authentication information includes input information of the user, and the second authentication information includes card swiping information of the user; whether the first authentication information is matched with the second authentication information is judged; if the first authentication information is matched with the second authentication information, a second message used for expressing that the authentication succeeds is sent to the client terminal. In this way, the technical problem that existing user authentication schemes are lack of security is solved.

Description

technical field [0001] The invention relates to the field of Internet security, in particular to a server, a client, an authentication system, and user authentication and data access methods. Background technique [0002] In order to provide user authentication function, in the existing solutions, the corresponding equipment such as the bank's background server or database server is usually used to verify the combination of the user ID and password uploaded by the client to realize the user authentication. On the one hand, this method avoids the security problems that may be caused by authenticating users locally on the client side, and on the other hand, it can facilitate background management. However, in application scenarios that require a high level of security protection, it is still difficult to ensure security and reliability by relying solely on the combination of user ID and password. For example, there are third-party tools that use enumeration methods to crack us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 孟祥雨王欣张雨佳顾思阳
Owner SUMAVISION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products