Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity verification method and device, computer equipment and storage medium

An identity verification method and identity verification technology, applied in the field of computer equipment and storage media, identity verification method, and device

Active Publication Date: 2020-12-08
GUANGZHOU BAIGUOYUAN INFORMATION TECH CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present invention proposes an identity verification method, device, computer equipment, and storage medium to solve how to prevent eavesdropping attacks and replay attacks during insecure network transmission and prevent service The problem of the threat of dictionary attack caused by database leakage on the end

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and device, computer equipment and storage medium
  • Identity verification method and device, computer equipment and storage medium
  • Identity verification method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] figure 1 It is a flow chart of an identity verification method provided by Embodiment 1 of the present invention. This embodiment is applicable to the case of client registration, and the method can be executed by an identity verification device, which can be implemented by software and / or hardware Realize, can be configured in computer equipment, for example, server, workstation, personal computer, etc., this computer equipment is used as service end Server, establishes safe transmission channel with client client, as Hyper Text Transfer Security Protocol (Hyper TextTransfer Protocol over SecureSocket Layer, HTTPS), so that the server server communicates with the client client, the method specifically includes the following steps:

[0034] Step 101, receiving a registration request sent by a client.

[0035] In this embodiment, when a user registers an identity with the server server, the user may enter a user name username and a password password in a user interface ...

Embodiment 2

[0074] image 3 It is a flow chart of an identity verification method provided by Embodiment 2 of the present invention. This embodiment is based on the foregoing embodiments and further adds identity verification operations. The method specifically includes the following steps:

[0075] Step 301, receiving a verification request sent by a client.

[0076] Such as Figure 4 As shown, when the client client registers with the server server, the user counter CT of the client client synchronizes with the service counter N of the server server.

[0077] When the user authenticates, he can enter information such as username, password, etc. in the user interface provided by the client client.

[0078] The client client extracts the user counter CT stored locally, uses the value stored in the current user counter CT as the number of times to calculate the digest, generates the digest information for the password password, and obtains the verification digest information D c , expre...

Embodiment 3

[0115] Figure 5 It is a flow chart of an identity verification method provided by Embodiment 3 of the present invention. This embodiment is based on the foregoing embodiments, and further increases the operation of verification response. The method specifically includes the following steps:

[0116] Step 501, receiving a verification request sent by a client.

[0117] Wherein, the verification request includes a user name, verification summary information Dc, and a user counter, and the verification summary information Dc is summary information generated by using the user counter as the number of times for calculating the summary and the password.

[0118] Step 502, look up the registration parameters associated with the user name recorded when the client registers.

[0119] Wherein, the registration parameters include service counter N and standard ciphertext D.

[0120] Step 503: Match the user counter with the service counter to detect the consistency of reducing the val...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an identity verification method and device, computer equipment and a storage medium, and the method comprises the steps: receiving a verification request sentby a client, the verification request comprising a user name, verification summary information and a user counter, and the verification summary information being summary information generated for a password by taking the user counter as the frequency of calculating a summary, searching registration parameters which are recorded during client registration and associated with the user name, the registration parameters comprising a service counter and a standard ciphertext, matching the user counter with the service counter to detect the consistency of the numerical value during identity verification, and if the user counter is successfully matched with the service counter, verifying the identity of the client according to the difference between the standard ciphertext and the verification abstract information, within 1RTT, the client completes password verification, the abstract calculation frequency of the password is decreased progressively, eavesdropping attacks and replay attacks ofthe password in the network transmission process can be prevented, and potential dictionary attacks are prevented.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of security, and in particular to an identity verification method, device, computer equipment and storage medium. Background technique [0002] Password authentication is a widely used authentication method, that is, the user registers a user name and password on the server, and the server persistently stores the user name and password. When the user uses password authentication to log in to the account, the user enters the user name and password through the client, and the client sends the user name and password to the server. After receiving the user name and password, the server takes out the same user name and password stored in the database. For comparison, if the two are consistent, the user's authentication is successful, otherwise the authentication fails. [0003] Currently used password authentication protocols include Password Authentication Protocol (Password Authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L63/08H04L9/3226H04L63/083H04L9/0869H04L63/1441
Inventor 李岩
Owner GUANGZHOU BAIGUOYUAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products