US 12,413,582 B2
Authentication method and authentication system
Yi-Siou Jhou, New Taipei (TW)
Assigned to GIGA-BYTE TECHNOLOGY CO., LTD., New Taipei (TW)
Filed by GIGA-BYTE TECHNOLOGY CO., LTD., New Taipei (TW)
Filed on May 8, 2023, as Appl. No. 18/313,748.
Claims priority of application No. 111117789 (TW), filed on May 12, 2022.
Prior Publication US 2023/0370448 A1, Nov. 16, 2023
Int. Cl. H04L 29/00 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/0838 (2013.01) [H04L 2463/082 (2013.01)] 6 Claims
OG exemplary drawing
 
1. An authentication method, executed by a processing device of a computer system, comprising:
receiving authentication information from the user device, and determining whether the authentication information belongs to a first user;
enabling the user device to initiate an authentication assistance request, in response to the authentication information being to the first user;
requesting identification information from the user device, in response to receiving the authentication assistance request from the user device;
receiving the identification information of a second user from the user device, and based on the identification information of the second user, determining whether the second user meets an authentication assistance qualification corresponding to the first user;
requesting a first password from the user device, in response to the second user meeting the authentication assistance qualification;
receiving the first password from the user device, and verifying whether the first password is correct using a multi-factor authentication server;
wherein determining whether the second user meets the authentication assistance qualification corresponding to the first user based on the identification information of the second user comprises:
obtaining user information of the first user based on the authentication information, and obtaining the user information of the second user based on the identification information of the second user;
by comparing the user information of the first user and the second user, determining whether a predefined relationship exists between the first user and the second user;
if no predefined relationship exists between the first user and the second user, determining that the second user does not meet the authentication assistance qualification;
if the predefined relationship exists between the first user and the second user, requesting a multi-factor authentication account of the second user from the multi-factor authentication server;
receiving the multi-factor authentication account from the multi-factor authentication server, and requesting a multi-factor authentication carrier list of the second user from the multi-factor authentication server based on the multi-factor authentication account;
if at least one multi-factor authentication carrier exists in the multi-factor authentication carrier list, determining that the second user meets the authentication assistance qualification; and
if no multi-factor authentication carrier exists in the multi-factor authentication carrier list, determining that the second user does not meet the authentication assistance qualification.