摘要 |
Method and system for user authentication are described. The method comprises receiving an authentication code from an application server seeking authentication of the user. Further, a private key of the user is computed in real time based on a user identity (ID) of the user and a master secret key of the PKG. The method further comprises, ascertaining a verification code based on the private key of the user and a verification timestamp, wherein the verification timestamp indicates a time at which the ascertaining of the verification code was initiated. Further, the authentication code is compared with the verification code. Further, the method comprises authenticating the user based on the comparison. |
主权项 |
1. A computer implemented method for authenticating a user, wherein the method comprises:
receiving, by a private key generator (PKG), an authentication code from an application server seeking authentication of the user; computing, by the PKG, a private key of the user in real time based on a user identity (ID) of the user and a master secret key of the PKG; ascertaining, by the PKG, a verification code based on the private key of the user and a verification timestamp, wherein the verification timestamp indicates a time at which the ascertaining of the verification code was initiated; comparing, by the PKG, the authentication code with the verification code; and authenticating, by the PKG, the user based on the comparison. |