CN115333747A - 一种基于多因子认证的安全防护方法、设备及存储介质 - Google Patents
一种基于多因子认证的安全防护方法、设备及存储介质 Download PDFInfo
- Publication number
- CN115333747A CN115333747A CN202210886319.3A CN202210886319A CN115333747A CN 115333747 A CN115333747 A CN 115333747A CN 202210886319 A CN202210886319 A CN 202210886319A CN 115333747 A CN115333747 A CN 115333747A
- Authority
- CN
- China
- Prior art keywords
- lambda
- user
- character
- identity
- identity authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
Abstract
Description
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210886319.3A CN115333747A (zh) | 2022-07-26 | 2022-07-26 | 一种基于多因子认证的安全防护方法、设备及存储介质 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210886319.3A CN115333747A (zh) | 2022-07-26 | 2022-07-26 | 一种基于多因子认证的安全防护方法、设备及存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115333747A true CN115333747A (zh) | 2022-11-11 |
Family
ID=83919929
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210886319.3A Pending CN115333747A (zh) | 2022-07-26 | 2022-07-26 | 一种基于多因子认证的安全防护方法、设备及存储介质 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115333747A (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115604028A (zh) * | 2022-11-28 | 2023-01-13 | 北京鸿迪鑫业科技有限公司(Cn) | 一种云服务器数据安全保护系统 |
CN116170806A (zh) * | 2022-12-07 | 2023-05-26 | 南京南瑞信息通信科技有限公司 | 一种智能电网lwm2m协议安全访问控制方法及系统 |
CN117371048A (zh) * | 2023-12-08 | 2024-01-09 | 深圳市研盛芯控电子技术有限公司 | 远程访问的数据处理方法、装置、设备及存储介质 |
-
2022
- 2022-07-26 CN CN202210886319.3A patent/CN115333747A/zh active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115604028A (zh) * | 2022-11-28 | 2023-01-13 | 北京鸿迪鑫业科技有限公司(Cn) | 一种云服务器数据安全保护系统 |
CN116170806A (zh) * | 2022-12-07 | 2023-05-26 | 南京南瑞信息通信科技有限公司 | 一种智能电网lwm2m协议安全访问控制方法及系统 |
CN117371048A (zh) * | 2023-12-08 | 2024-01-09 | 深圳市研盛芯控电子技术有限公司 | 远程访问的数据处理方法、装置、设备及存储介质 |
CN117371048B (zh) * | 2023-12-08 | 2024-03-29 | 深圳市研盛芯控电子技术有限公司 | 远程访问的数据处理方法、装置、设备及存储介质 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bojinov et al. | Kamouflage: Loss-resistant password management | |
CN115333747A (zh) | 一种基于多因子认证的安全防护方法、设备及存储介质 | |
CN111431707B (zh) | 业务数据信息处理方法、装置、设备以及可读存储介质 | |
EP2572489B1 (en) | System and method for protecting access to authentication systems | |
Yeh et al. | Cryptanalysis of Hsiang‐Shih's authentication scheme for multi‐server architecture | |
Singh et al. | A 3-level multifactor Authentication scheme for cloud computing | |
Bilal et al. | Assessment of secure OpenID-based DAAA protocol for avoiding session hijacking in Web applications | |
Mihailescu et al. | Brute-Force and Buffer Overflow Attacks | |
CN109145543B (zh) | 一种身份认证方法 | |
Mohammed et al. | Current multi-factor of authentication: Approaches, requirements, attacks and challenges | |
Binu et al. | A strong single sign-on user authentication scheme using mobile token without verifier table for cloud based services | |
Santosa et al. | New design of lightweight authentication protocol in wearable technology | |
CN111046440B (zh) | 一种安全区域内容的篡改验证方法及系统 | |
Eldow et al. | Literature review of authentication layer for public cloud computing: a meta-analysis | |
Subari et al. | Implementation of Password Guessing Resistant Protocol (PGRP) in improving user login security on Academic Information System | |
Singh et al. | Relevance of Multifactor Authentication for Secure Cloud Access | |
Kim et al. | Multimedia image data processing on smartphone for authentication | |
Verbitskiy | Node. js security | |
Channabasava et al. | Dynamic password protocol for user authentication | |
Aldumiji et al. | Fingerprint and location based multifactor authentication for mobile applications | |
Kumari et al. | Hacking resistance protocol for securing passwords using personal device | |
Sail et al. | A multi-factor authentication scheme to strength data-storage access | |
Mahansaria et al. | Secure Authentication Using One Time Contextual QR Code | |
Bhatt et al. | A Review on Authentication Techniques in Mobile Cloud Computing | |
Renuka et al. | CLOUD SHIELD ARCHITECTURE: A PROPOSED MODEL FOR HIGH LEVEL AUTHENTICATION |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Guo Yue Inventor after: Huang Chao Inventor after: Liang Yuan Inventor after: Li Lei Inventor after: Hu Yaodong Inventor after: Deng Guoru Inventor after: Zhuang Yan Inventor after: Ke Wangsong Inventor after: Xu Jie Inventor after: Liao Rongtao Inventor after: Dong Liang Inventor after: Liu Fen Inventor after: Wang Yixi Inventor after: Li Xiang Inventor before: Guo Yue Inventor before: Huang Chao Inventor before: Liang Yuan Inventor before: Li Lei Inventor before: Hu Yaodong Inventor before: Zhuang Yan Inventor before: Ke Wangsong Inventor before: Xu Jie Inventor before: Liao Rongtao Inventor before: Dong Liang Inventor before: Liu Fen Inventor before: Wang Yixi Inventor before: Li Xiang |