Server, client, authentication system and method for user authentication and data access

A user authentication and client-side technology, applied in the field of Internet security, can solve problems such as insufficient security of user authentication schemes

Active Publication Date: 2017-06-27
SUMAVISION TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Embodiments of the present invention provide a server, a client, an authentication system, and a method for user authentication and data access, so as to at least solve the technical problem of insufficient security of existing user authentication schemes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Server, client, authentication system and method for user authentication and data access
  • Server, client, authentication system and method for user authentication and data access
  • Server, client, authentication system and method for user authentication and data access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] According to an embodiment of the present invention, a user authentication method is provided, such as figure 1 As shown, the method includes:

[0020] S102: Receive a first message sent by the client to request authentication of the user of the client, where the first message carries first authentication information and second authentication information corresponding to the user, where the first authentication information includes user input information, The second authentication information includes the user's card swiping information;

[0021] S104: Determine whether the first authentication information matches the second authentication information;

[0022] S106: If they match, send a second message to the client to indicate that the authentication is successful.

[0023] It should be clear that one of the problems to be solved by the embodiments of the present invention is to provide a method for authenticating a client or its user, wherein the client can be used...

Embodiment 2

[0062] According to an embodiment of the present invention, a data access method is also provided, such as figure 2 As shown, the method includes:

[0063] S202: When the client needs to access the target data, obtain first authentication information and second authentication information corresponding to the user of the client, wherein the first authentication information includes the user's input information, and the second authentication information includes the user's card swiping information;

[0064] S204: Send to the server a first message for requesting authentication of the user, the first message carries the first authentication information and the second authentication information, and is used to make the server send The client returns a second message indicating successful authentication;

[0065] S206: When receiving the second message, send a message for requesting access to the target data to the corresponding device.

[0066] It should be clear that one of th...

Embodiment 3

[0107] According to an embodiment of the present invention, a server for implementing the user authentication method described in Embodiment 1 is also provided, such as image 3 As shown, the server includes:

[0108] 1) The first receiving unit 302 is configured to receive a first message sent by the client to request authentication of the user of the client, the first message carries first authentication information and second authentication information corresponding to the user, wherein the first The authentication information includes the user's input information, and the second authentication information includes the user's card swiping information;

[0109] 2) A judging unit 304, configured to judge whether the first authentication information matches the second authentication information;

[0110] 3) The first sending unit 306 is configured to send a second message indicating successful authentication to the client when the first authentication information matches the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a server, a client, an authentication system, and user authentication and data access methods. Wherein, the user authentication method includes: receiving a first message sent by the client for requesting authentication of the user of the client, the first message carrying first authentication information and second authentication information corresponding to the user, wherein the first authentication information Including the user's input information, the second authentication information includes the user's card swiping information; judge whether the first authentication information matches the second authentication information; if the first authentication information matches the second authentication information, send a message indicating authentication to the client Successful second message. The invention solves the technical problem of insufficient security of the existing user authentication scheme.

Description

technical field [0001] The invention relates to the field of Internet security, in particular to a server, a client, an authentication system, and user authentication and data access methods. Background technique [0002] In order to provide user authentication function, in the existing solutions, the corresponding equipment such as the bank's background server or database server is usually used to verify the combination of the user ID and password uploaded by the client to realize the user authentication. On the one hand, this method avoids the security problems that may be caused by authenticating users locally on the client side, and on the other hand, it can facilitate background management. However, in application scenarios that require a high level of security protection, it is still difficult to ensure security and reliability by relying solely on the combination of user ID and password. For example, there are third-party tools that use enumeration methods to crack us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 孟祥雨王欣张雨佳顾思阳
Owner SUMAVISION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products