Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and device based on authentication equipment

A technology for authenticating equipment and authenticating data, which is applied in the field of information security, can solve problems such as password leakage, personal privacy information that is vulnerable to attack, and loss, and achieve the effect of improving security

Active Publication Date: 2015-12-23
FEITIAN TECHNOLOGIES
View PDF5 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, the password-based online identity authentication technology has great risks. The user's password can be obtained through technical means such as guessing, network theft of credit certificates, and phishing. If the password used by the user is short or easy to decipher Weak passwords are easy to be attacked, resulting in leakage of personal privacy information and even property loss; traditional identity authentication methods require the client to send a password to the remote server’s password database for comparison, but there is a risk of being intercepted and cracked, and the password Stored on the same remote server, if the super administrator account is stolen, the passwords of all users in the remote server will be leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device based on authentication equipment
  • Authentication method and device based on authentication equipment
  • Authentication method and device based on authentication equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Embodiment 1 of the present invention provides an authentication method based on an authentication device, such as figure 1 shown, including:

[0053] Step S1: The client obtains a uniform resource identifier, obtains an application ID according to the uniform resource identifier, obtains a device authentication request according to the application ID and the user ID input by the user, and sends the device authentication request to the server;

[0054] Step S2: the client receives the current authentication data sent by the server;

[0055] Step S3: The client obtains the client data object according to the challenge value in the current authentication data, performs a hash operation on the client data object and the application ID in the current authentication data to obtain the client parameters, and obtains the key identifier in the current authentication data , compose the client parameter, the key identifier and the key identifier length into the current authentic...

Embodiment 2

[0070] Embodiment 2 of the present invention provides an authentication method based on an authentication device, such as Figure 2 to Figure 3 shown, including:

[0071] Step 101: the client obtains a uniform resource identifier (UniformResourceIdentifier), obtains an application ID according to the uniform resource identifier, obtains a device authentication request according to the application ID and the user identifier input by the user, and sends the device authentication request to the server;

[0072] Specifically, if the client is a browser, the client obtains the header field of the uniform resource identifier accessed as the application ID; if the client is an Android system, the client obtains the key identifier of the signed Android installation package. The content is used as a uniform resource identifier; if the client is an iOS system, the client obtains the content of the IOS application identifier as a uniform resource identifier;

[0073] For example, in thi...

Embodiment 3

[0123] Embodiment 3 of the present invention provides an authentication method based on an authentication device, such as Figure 4 to Figure 6 shown, including:

[0124] Step 201: the client obtains a uniform resource identifier (UniformResourceIdentifier), obtains an application ID according to the uniform resource identifier, obtains a device authentication request according to the application ID, the application identifier, and the user identifier input by the user, and sends the device authentication request to the server;

[0125]Specifically, if the client is a browser, the client obtains the header field of the uniform resource identifier accessed as the application ID; if the client is an Android system, the client obtains the key identifier of the signed Android installation package. The content is used as a uniform resource identifier; if the client is an iOS system, the client obtains the content of the IOS application identifier as a uniform resource identifier; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method and device based on authentication equipment. The method comprises: a client obtaining an application ID according to an obtained uniform resource identifier (URI), and sending an equipment authentication request obtained according to the application ID and the URI to a server; receiving the current authentication data sent by the server; obtaining a client data object according to the challenge value in the current authentication data, hashing the client data object and the application ID in the current authentication data to obtain client parameters, obtaining the key identifier in the current authentication data, and sending current authentication request information composed of the client parameters, the key identifier and a key identifier length to authentication equipment; receiving the authentication response information returned by the authentication equipment, and sending a signature verification request composed of the authentication response information, the client data object and the conversation ID in the current authentication data to the server; and receiving the information returned by the server, authentication being successful if successful information is returned, or else being failed.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and equipment for authentication based on authentication equipment. Background technique [0002] In the prior art, the password-based online identity authentication technology has great risks. The user's password can be obtained through technical means such as guessing, network theft of credit certificates, and phishing. If the password used by the user is short or easy to decipher Weak passwords are easy to be attacked, resulting in leakage of personal privacy information and even property loss; traditional identity authentication methods require the client to send a password to the remote server’s password database for comparison, but there is a risk of being intercepted and cracked, and the password Stored on the same remote server, if the super administrator account is stolen, the passwords of all users in the remote server will be leaked. Contents of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/126H04L67/146H04L63/0876H04W12/72H04L63/0884H04L9/3234H04L63/0853H04L67/01H04L63/06
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products