Two-factor authentication method, system, medium and server for device identification

A device identification and authentication method technology, applied in the Internet field, can solve the problems of high similarity of devices, indistinguishability, and high false acceptance rate of unique authentication, and achieve the effect of improving the accuracy rate and reducing the false acceptance rate and false rejection rate.

Active Publication Date: 2021-10-22
TONGJI UNIV
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, how to provide a two-factor authentication method, system, medium, and server for device identification, so as to solve the problem of uniqueness of devices in the prior art. The high error acceptance rate in certification and the low accuracy rate of equipment unique certification have become technical problems urgently to be solved by those skilled in the art.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-factor authentication method, system, medium and server for device identification
  • Two-factor authentication method, system, medium and server for device identification
  • Two-factor authentication method, system, medium and server for device identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] This embodiment provides a two-factor authentication method oriented to device identification, which is applied to a communication system including at least two clients and a server communicating with the clients; the server is provided with a unique device reference library and Credibility device reference library; the credibility device reference library is used to authenticate the credibility of the client; the uniqueness device reference library is used to authenticate the uniqueness of the client; the device identification-oriented dual Factor authentication methods include:

[0029] collecting device information of the client;

[0030] Matching the real-time logged-in device information of the client with the reference information in the server to determine whether the client is an existing device associated with the server;

[0031] Simultaneously, verifying the credibility and uniqueness of the device on the client, so as to obtain the authentication results of...

Embodiment 2

[0076] This embodiment provides a device identification-oriented two-factor authentication system, which is applied to a communication system including at least two clients and a server communicating with the client; the server is provided with a unique device reference library and The credible device reference library; the trusted device reference library is used to authenticate the credibility of the client; the uniqueness device reference library is used to authenticate the uniqueness of the client; comprising:

[0077] A collection module, configured to collect device information of the client;

[0078] A matching module, configured to match the real-time logged-in device information of the client with the reference information in the server to determine whether the client is an existing device associated with the server;

[0079] An authentication module, configured to simultaneously authenticate the client's device credibility and device uniqueness, so as to obtain authe...

Embodiment 3

[0105] This embodiment provides a server, the server includes: a processor, a memory, a transceiver, a communication interface or / and a system bus; the memory and the communication interface are connected to the processor and the transceiver through the system bus and complete mutual communication For communication, the memory is used to store computer programs, the communication interface is used to communicate with other devices, and the processor and transceiver are used to run computer programs, so that the server can execute the steps of the above two-factor authentication method for device identification.

[0106] The system bus mentioned above may be a Peripheral Component Interconnect (PCI for short) bus or an Extended Industry Standard Architecture (EISA for short) bus or the like. The system bus can be divided into address bus, data bus, control bus and so on. For ease of representation, only one thick line is used in the figure, but it does not mean that there is on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a device identification-oriented two-factor authentication method, system, medium and server. The method includes: collecting the device information of the client; matching the device information of the client with the reference information in the server to judge the client Whether the terminal is an existing device associated with the server; at the same time, the client is authenticated for the credibility and uniqueness of the device to obtain the certification results of the credibility certification and uniqueness certification; according to the credibility certification and uniqueness The authentication result of the authentication and the default two-factor authentication strategy update the baseline information in the server. The invention proposes a two-factor authentication strategy, combines the advantages of high accuracy of device trusted authentication and wide application range of device unique authentication, improves the accuracy of device unique authentication, and reduces false acceptance rate and false rejection rate. At the same time, a two-factor baseline update strategy is proposed, which solves the baseline update problem when the results of device trust authentication and device unique authentication are different.

Description

technical field [0001] The invention belongs to the technical field of the Internet and relates to an authentication method and system, in particular to a device identification-oriented two-factor authentication method, system, medium and server. Background technique [0002] With the rapid development of the Internet, various traditional businesses are gradually transferred online. Internet finance and e-commerce are developing rapidly. People gradually start to realize online payment, asset management, and news browsing through mobile terminals such as mobile phones, IPADs, and laptops. The Internet has gradually become the second space of human beings. The inability of netizens to identify their identities and prove their reputation has greatly hindered the expansion of Internet businesses. The uncertainty of identities has spawned various online frauds. Device fingerprint technology is a technology for identifying devices in the network, and is widely used in anti-fraud ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0876H04L63/20
Inventor 蒋昌俊丁志军章昭辉闫春钢周婉王松
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products