Methods, devices and systems for anti-counterfeiting authentication
First Claim
1. An anti-counterfeiting authentication method implemented by a server, comprising:
- generating an encrypted message corresponding to an i-th authentication step, wherein the i-th authentication step is one of n authentication steps arranged in a predetermined order, and 1≦
i≦
n;
sending the encrypted message to a terminal device to be authenticated;
receiving, from the terminal device, a call request for initiating the i-th authentication step;
executing the i-th authentication step if the request is initiated based on the encrypted message;
if the i-th authentication step succeeds and i is less than n, increasing i by one and repeating the generating of an encrypted message;
if the i-th authentication step fails, sending an indication to the terminal device indicating an authentication failure; and
if the i-th authentication step succeeds and i equals to n, sending an indication to the terminal device indicating an authentication success.
1 Assignment
0 Petitions
Accused Products
Abstract
An anti-counterfeiting authentication method is provided. The method includes: generating an encrypted message corresponding to an i-th authentication step, wherein the i-th authentication step is one of n authentication steps arranged in a predetermined order, and 1≦i≦n; sending the encrypted message to a terminal device; receiving, from the terminal device, a call request for initiating the i-th authentication step; executing the i-th authentication step if the request is initiated based on the encrypted message; if the i-th authentication step succeeds and i is less than n, increasing i by one and repeating the generating of an encrypted message; if the i-th authentication step fails, sending an indication to the terminal device indicating an authentication failure; and if the i-th authentication step succeeds and i equals to n, sending an indication to the terminal device indicating an authentication success.
-
Citations
22 Claims
-
1. An anti-counterfeiting authentication method implemented by a server, comprising:
-
generating an encrypted message corresponding to an i-th authentication step, wherein the i-th authentication step is one of n authentication steps arranged in a predetermined order, and 1≦
i≦
n;sending the encrypted message to a terminal device to be authenticated; receiving, from the terminal device, a call request for initiating the i-th authentication step; executing the i-th authentication step if the request is initiated based on the encrypted message; if the i-th authentication step succeeds and i is less than n, increasing i by one and repeating the generating of an encrypted message; if the i-th authentication step fails, sending an indication to the terminal device indicating an authentication failure; and if the i-th authentication step succeeds and i equals to n, sending an indication to the terminal device indicating an authentication success. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An anti-counterfeiting authentication method implemented by a terminal device to be authenticated, comprising:
-
receiving, from a server, an encrypted message corresponding to an i-th authentication step, wherein the i-th authentication step is one of n authentication steps arranged in a predetermined order, and 1≦
i≦
n,sending, to the server, a call request for initiating the i-th authentication step, based on the encrypted message; and receiving, from the server, an indication indicating an authentication failure or an authentication success. - View Dependent Claims (10, 11)
-
-
12. A server, comprising:
-
a processor; and a memory for storing instructions executable by the processor; wherein the processor is configured to; generate an encrypted message corresponding to an i-th authentication step, wherein the i-th authentication step is one of n authentication steps arranged in a predetermined order, and 1≦
i≦
n;send the encrypted message to a terminal device to be authenticated; receive, from the terminal device, a call request for initiating the i-th authentication step; execute the i-th authentication step if the call request is initiated based on the encrypted message; if the i-th authentication step succeeds and i is less than n, increase i by one and repeat the generating of an encrypted message; if the i-th authentication step fails, send an indication to the terminal device indicating an authentication failure; and if the i-th authentication step succeeds and i equals to n, send an indication to the terminal device indicating an authentication success. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A terminal device to be authenticated, comprising:
-
a processor; and a memory for storing instructions executable by the processor; wherein the processor is configured to; receive, from a server, an encrypted message corresponding to an i-th authentication step, wherein the i-th authentication step is one of n authentication steps arranged in a predetermined order, and 1≦
i≦
n,send, to the server, a call request for initiating the i-th authentication step, based on the encrypted message; and receive, from the server, an indication indicating an authentication failure or an authentication success. - View Dependent Claims (19, 20)
-
-
21. A non-transitory computer-readable storage medium having stored therein instructions that, when executed by a processor of a server, cause the server to perform an anti-counterfeiting authentication method comprising:
-
generating an encrypted message corresponding to an i-th authentication step, wherein the i-th authentication step is one of n authentication steps arranged in a predetermined order, and 1≦
i≦
n;sending the encrypted message to a terminal device to be authenticated; receiving a call request sent from the terminal device for initiating the i-th authentication step; executing the i-th authentication step if the call request is initiated based on the encrypted message; if the i-th authentication step succeeds and i is less than n, increasing i by one, and repeating the generating of an encrypted message; if the i-th authentication step fails, sending an indication to the terminal device indicating an authentication failure; and if the i-th authentication step succeeds and i equals to n, sending an indication to the terminal device indicating an authentication success.
-
-
22. A non-transitory computer-readable storage medium having stored therein instructions that, when executed by a processor of a terminal device to be authenticated, cause the terminal device to perform an anti-counterfeiting authentication method comprising:
-
receiving, from a server, an encrypted message corresponding to an i-th authentication step, wherein the i-th authentication step is one of n authentication steps arranged in a predetermined order, and 1≦
i≦
n;sending, to the server, a call request for initiating the i-th authentication step, based on the encrypted message; and receiving, from the server, an indication indicating an authentication failure or an authentication.
-
Specification