NETWORK AUTHENTICATION METHOD AND DEVICE FOR IMPLEMENTING THE SAME
First Claim
1. A network authentication method to be implemented using a network authentication device and a user end for authenticating the user end, the user end storing a terminal program and including a plurality of hardware components each of which has a unique identification code, said network authentication method comprising the steps of:
- a) configuring the network authentication device to store hardware information associated with the identification codes of the hardware components of the user end;
b) when it is intended to verify identity of the user end, configuring the user end to execute the terminal program for scanning the hardware components thereof to obtain the identification codes of the hardware components of the user end, for establishing a hardware list according to the identification codes of the hardware components thus obtained, and for sending to the network authentication device verification data that is associated with the hardware list; and
c) configuring the network authentication device to verify identity of the user end based on relationship between the verification data received from the user end in step b) and the hardware information stored in step a).
1 Assignment
0 Petitions
Accused Products
Abstract
A network authentication method is to be implemented using a network authentication device and a user end for authenticating the user end. The network authentication method includes the steps of: configuring the network authentication device to store hardware information associated with unique identification codes of hardware components of the user end; when it is intended to verify identity of the user end, configuring the user end to execute a terminal program stored therein for scanning the hardware components thereof to obtain the identification codes of the hardware components, for establishing a hardware list according to the identification codes thus obtained, and for sending to the network authentication device verification data that is associated with the hardware list; and configuring the network authentication device to verify identity of the user end based on relationship between the verification data received from the user end and the hardware information stored therein.
-
Citations
14 Claims
-
1. A network authentication method to be implemented using a network authentication device and a user end for authenticating the user end, the user end storing a terminal program and including a plurality of hardware components each of which has a unique identification code, said network authentication method comprising the steps of:
-
a) configuring the network authentication device to store hardware information associated with the identification codes of the hardware components of the user end; b) when it is intended to verify identity of the user end, configuring the user end to execute the terminal program for scanning the hardware components thereof to obtain the identification codes of the hardware components of the user end, for establishing a hardware list according to the identification codes of the hardware components thus obtained, and for sending to the network authentication device verification data that is associated with the hardware list; and c) configuring the network authentication device to verify identity of the user end based on relationship between the verification data received from the user end in step b) and the hardware information stored in step a). - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A network authentication device for authenticating a user end, the user end including a plurality of hardware components each of which has a unique identification code, the user end being configured to scan the hardware components thereof to obtain the identification codes of the hardware components, and to establish verification data associated with the identification codes of the hardware components thus obtained, said network authentication device comprising:
-
a database module for storing hardware information associated with the identification codes of the hardware components of the user end; and a verification module for verifying identity of the user end based on relationship between the verification data received from the user end and the hardware information stored in said database module. - View Dependent Claims (14)
-
Specification