Movatterモバイル変換


[0]ホーム

URL:


CN109086600A - Password generates and Verification System - Google Patents

Password generates and Verification System
Download PDF

Info

Publication number
CN109086600A
CN109086600ACN201810813953.8ACN201810813953ACN109086600ACN 109086600 ACN109086600 ACN 109086600ACN 201810813953 ACN201810813953 ACN 201810813953ACN 109086600 ACN109086600 ACN 109086600A
Authority
CN
China
Prior art keywords
password
character string
random code
dynamic
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810813953.8A
Other languages
Chinese (zh)
Inventor
崔可
李婉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hengbao Intelligent System Technology Co Ltd
Original Assignee
Jiangsu Hengbao Intelligent System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengbao Intelligent System Technology Co LtdfiledCriticalJiangsu Hengbao Intelligent System Technology Co Ltd
Priority to CN201810813953.8ApriorityCriticalpatent/CN109086600A/en
Publication of CN109086600ApublicationCriticalpatent/CN109086600A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The present invention relates to a kind of generation of password and Verification Systems, subsystem and cipher authentication subsystem are generated including password, a kind of password is also related to generate and authentication method, the conversion of random code and character string is carried out according to scheduled rule, and above-mentioned scaling results are carried out by operation or combination by calculation formula, dynamic password after being calculated finally obtains final dynamic authentication password by the arrangement to comprehensive password.The method of the generation dynamic password proposed in the present invention is more efficiently protected but also dynamic password is various informative for various important informations using the mode of a variety of user setting passwords.

Description

Password generates and Verification System
Technical field
The present invention relates to dynamic password fields, more particularly to password generation and Verification System.
Background technique
Dynamic password can be better protected from user and forget as a kind of common efficiently login account and authentication modePre-set password and can not login account or can not authenticate by the problem of, when user forgets pre-set passwordWhen, it can issue and obtain dynamic password request, server-side will respond the request, send the mobile phone of dynamic password short message to bindingOn number, user need to only insert the dynamic password and successfully can log in or authenticate and Modify password.
In addition, dynamic password is a kind of disposal password, each password is used only once.Dynamic password can be at any timeBetween, number and relevant information and be randomly generated and update.Dynamic password has good safety, is widely used in various informationSystem.Dynamic token is a kind of encryption device, and for generating dynamic password, steal-number is can be effectively prevented in dynamic-password technique, is exempted fromExcept the worry of frequent modification fixed password.
The mode based on time synchronization is achieved in that there are one dynamic password, when due to time synchronization being to refer toBetween value be used as standard, calculate set of number and be uploaded to central authentication server, it requires password and certificate server whenBetween on being consistent property.
But this simple method for carrying out account login and relationship trading by dynamic password, so that account and transactionSafety substantially reduces;Especially when user terminal is used by others, user does not need the fixed number of input or letterPassword, it is only necessary to it is simple send dynamic password can login user concerned account numbers or transaction, dynamic password then risesLess than the effect of any safety certification.It can be seen that the generation for the above-mentioned dynamic password that the prior art is mentioned and application method are notCan identify whether the operation for obtaining dynamic password is account operation, user experience low using dynamic password login securityDifference.
Based on disadvantages described above, there is an urgent need to the higher identity authentication scheme of security performance, therefore a kind of two dimensional code and dynamicThe identity authentication scheme that password combines is come into being.Two dimensional code payment technology is the means of payment to become more and more popular at present, is disappearedThe two dimensional code that expense person can scan businessman's offer by application software such as cell phone applications completes payment.But it is most at presentThe two dimensional code that businessman uses is static two dimensional code, is to be printed on various paper carriers to be posted in sales counter in shop, desktop, on show window, it is commonly called as two dimensional code paster.Two dimensional code on this paster be it is static, be easy maliciously replaced and altered, there are very big peacesFull hidden danger, and this two dimensional code is only the link of trade company, the amount of money not comprising each pay invoice is when use and inconvenientAnd safety.
There are also a kind of existing identity authentication schemes based on dynamic password, the specific steps of which are as follows:
1) user issues certification request, and background server generates challenge code at random, and exports to dynamic password equipment;
2) dynamic password equipment obtains challenge code, these externally input challenge codes participate in giving birth to according to scheduled Encryption AlgorithmAt authentication password;
3) background server end generates according to scheduled Encryption Algorithm according to challenge code and compares password, and encryption here is calculatedMethod should with 2) be consistent;
4) dynamic password equipment sends certification request to background server, i.e., the authentication password of generation is sent to backstage and takenBusiness device;
5) background server matches the comparison password that authentication password and background server end generate;
6) return authentication result: if authentication password and comparing password match, this authentication success, otherwise, identity is recognizedCard failure.
Aforesaid way haves the defects that following many:
It is easily stolen to take: due to the input of fixed password be user directly on keyboard by it is corresponding number or letter keyEnter, the third party only need to record or watch the input process of the password, so that it may obtain the password, and be to see that once have canThe all information of password can be stolen;It is easy to be decrypted:, also can be according to each input even if the process of input password can only far be seenFixation position of the static password on keyboard, is inferred to the password.The use for being primarily due to dynamic password is needed by userThe fixed password of setting, but this association is again fairly simple, such as successively inputs fixed password and dynamic password, without effectivelyIt is combined both by rule formula.In addition, the fixed password mode due to user setting is less, be usually all number andThe ordinary cryptographic structure of letter, but also above-mentioned password is easy to be acquired, but also the associated dynamic password generated is not achievedDue effect.
Summary of the invention
The present invention provides a kind of generation of password and Verification Systems, including password to generate subsystem and cipher authentication subsystemSystem, password generate subsystem include Password Input unit, cryptographic initialization unit, cryptographic calculations unit, password output unit andPassword storage unit.
Password Input unit be used to receive the codeword information of external equipment transmission, and at the beginning of codeword information is transferred to passwordBeginningization unit and password storage unit;Cryptographic initialization unit be used to generate random code as needed, or will receiveThe codeword information of external equipment input is converted to the character string of predetermined format, and random code or character string are transferred to password meterCalculate unit;Cryptographic calculations unit be used to carry out the conversion of random code and character string according to scheduled rule, and public by calculatingAbove-mentioned scaling results are carried out operation or combination by formula, the dynamic password after being calculated, finally by comprehensive passwordArrangement obtains final dynamic authentication password.
Specifically, cryptographic calculations unit carries out the conversion of random code and character string according to scheduled rule, specifically include: willEach in random code and character string after cryptographic initialization cell translation is converted to decimal number first, in accordance with rule, withThe decimal number is scaled defined content afterwards, respective content combines to form transition character string.
Specifically, cryptographic calculations unit carries out the conversion of random code and character string according to scheduled rule, specifically further include:Transition character string split according to certain rule and forms substring one and substring two, then by the sub- word after fractionationSymbol string one and substring two are weighted read group total using formula and obtain dynamic password, later intercept above-mentioned password certainDigit or retain alphabet, formed dynamic authentication password.
In addition, cipher authentication subsystem includes password acceptance unit, cipher decoding unit and cipher authentication unit.
Specifically, cipher decoding unit be used to be converted according to above-mentioned character string, mode is obtained from dynamic authentication password setsStandby mark, the user password inputted and random code, and corresponding preset user password is found according to device identification, meanwhile, fromPassword generation unit obtains corresponding random code.
The present invention also provides a kind of generation of password and authentication method, this method specifically:
Step 1: receive external equipment transmission codeword information, and by codeword information be transferred to cryptographic initialization unit andPassword storage unit;
Step 2: generating random code as needed, or the codeword information that the external equipment received inputs is converted toThe character string of predetermined format;
Step 3: carrying out the conversion of random code and character string according to scheduled rule, and changed by calculation formula by above-mentionedIt calculates result and carries out operation or combination, the dynamic password after being calculated finally obtains most by the arrangement to comprehensive passwordWhole dynamic authentication password.
Wherein, after step 3, further includes:
Step 4: by obtained dynamic authentication password and corresponding interception digit identification transmission to cipher authentication subsystemOr other external equipments;
Step 5: receiving password generates the dynamic authentication password that subsystem is sent;
Step 6: the user of device identification, input is obtained from dynamic authentication password according to above-mentioned character string conversion modePassword and random code, and corresponding preset user password is found according to device identification, meanwhile, obtain corresponding random code;
Step 7: by the user password of the input obtained from dynamic authentication password and the progress of preset user passwordThe random code matched, while will acquire is matched with corresponding random code.
Specifically, carrying out the conversion of random code and character string according to scheduled rule, specifically include: by random code and processEach in character string after cryptographic initialization cell translation is converted to decimal number first, in accordance with rule, then by the decimal systemNumber is scaled defined content, and respective content combines to form transition character string.
Specifically, carrying out the conversion of random code and character string according to scheduled rule, specifically further include: by transition character stringSplit according to certain rule and form substring one and substring two, then by the substring one and sub- word after fractionationSymbol string two is weighted read group total using formula and obtains dynamic password, and above-mentioned password is intercepted to certain digit or guarantor laterAlphabet is stayed, dynamic authentication password is formed.
Specifically, combined original character string format is random code+user password+date+device identification.
The beneficial method for having the technical effect that the generation dynamic password proposed in the present invention of the present invention uses a variety of usersThe mode of password is set, but also dynamic password is various informative, is more efficiently protected for various important informations.SeparatelyOutside, it being calculated in dynamic password forming process using dynamic password create-rule, parameters are interrelated, it combines closely, so thatThe safety of dynamic password itself greatly improves, while but also having more high safety guarantee in data communication process.
Detailed description of the invention
Fig. 1 is that password generates subsystem structure schematic diagram;
Fig. 2 is cipher authentication subsystem structure schematic diagram;
Fig. 3 is that password generates and authentication method flow chart.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, completeSite preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based onEmbodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every otherEmbodiment shall fall within the protection scope of the present invention.
The present invention provides a kind of password and generates and Verification System, including password generates subsystem and cipher authentication subsystem.Wherein, as shown in Figure 1, password generate subsystem include Password Input unit, it is cryptographic initialization unit, cryptographic calculations unit, closeCode output unit and password storage unit.
Password Input unit be used to receive the codeword information of external equipment transmission, and at the beginning of codeword information is transferred to passwordBeginningization unit and password storage unit.The codeword information include user input password, external equipment identification code and figure,The auxiliary informations such as time, color.
Cryptographic initialization unit be used to generate random code, or the code that the external equipment received is inputted as neededWord information is converted to the character string of predetermined format, and random code or character string are transferred to cryptographic calculations unit.
The character string of above-mentioned predetermined format is broadly divided into digit strings, alphabetic character string or mixed characters string.
Random code is directly generated according to above-mentioned predetermined format, without conversion;If external equipment input is also onlyIt only include the codeword information of number or letter, without conversion;But if being the letter of the formats such as color, figure, date-timeBreath, then need to carry out corresponding conversion.
Specifically: the format " yyyymmdd " of only umerical date is converted to for date-time format;It is rgb format for color format conversion, and the color of each point is arranged according to the sequence of R, G, B, such as (100,53,68) 1005368 are just denoted as;For graphical format, either preset gesture line either face figure etc. is all desirableIt presets and stores, and each figure corresponds to a mark, above-mentioned mark is subjected to unified representation, such asFig1, fig2 ... figN, N are natural number, are equivalent to the word that each figure is collectively expressed as to letter and number combination in this waySymbol string.
Cryptographic calculations unit be used to carry out the conversion of random code and character string according to scheduled rule, and public by calculatingAbove-mentioned scaling results are carried out operation or combination by formula, the dynamic password after being calculated, finally by comprehensive passwordArrangement obtains final dynamic authentication password, and above-mentioned dynamic authentication password is transferred to password output unit and password storage listMember.
Cryptographic calculations unit carries out the conversion of random code and character string according to scheduled rule, specifically:
(1) each in random code and character string after cryptographic initialization cell translation is converted first, in accordance with ruleFor decimal number, the decimal number is then scaled defined content, respective content combines to form transition character string, the contentIt can be binary system, octal system, hexadecimal or other characters.Above-mentioned transition character string successively includes random code, Yong HumiCode, the correspondence character string on date and device identification.
Such as: transformation rule are as follows: digital 0-9 corresponds to decimal number 0-9;
Lowercase a-z corresponds to decimal number 10-35;
Capitalization A-Z corresponds to decimal number 36-51.
If random code is 1F2g3b, corresponding decimal number is 1 41 2 16 3 11;
If the codeword information of external equipment input is user password+date+device identification form, initial by passwordCharacter string after changing cell translation is ABC 180510ab28, and corresponding decimal number is 36 37 38 18 0510 1011 2 8。
Character string after combination is 1F2g3b ABC 180510ab28;
Being converted to decimal number is 1 41 2 16 3 11 36 37 38 180510 10 11 28;
Being scaled octadic transition character string is 1 51 2 20 3 13 44 45 46 1 10 0510 12 13210。
(2) transition character string split according to certain rule and form substring one and substring two, then willSubstring one and substring two after fractionation are weighted read group total using formula and obtain dynamic password, later will be above-mentionedPassword intercepts certain digit or retains alphabet, forms dynamic authentication password.If retaining alphabet, by oneComplete dynamic authentication password, that is, dynamic password;If the certain digit of interception, formed a dynamic authentication password withAnd a remaining digit password and corresponding interception digit mark, the mark are used to refer to dynamic authentication password from interceptionWhich digit of preceding dynamic password.
Specific fractionation mode can be takes former positions or several latter in order, is also possible to be torn open according to certain requirementPoint, that is to say, that substring one and substring two can be the fixed character string information only extracted, and such as user password is setStandby mark etc., or what is only extracted are not fixed character string information, such as random code, date.
Specific formula are as follows:
Dynamic password=a* extracts character string
B* residue character string
Here since last position, successively forward, each corresponds to weighting, if the zero padding that digit is inadequate.
It is illustrated for extracting and being not fixed character string information below:
For octadic transition character string " 1 51 2 20 3 13 44 45 46 1 10 0 51 0 above-mentioned12 13 2 10 ", it is not fixed character string for random code and date, specially " 1 51 2 20 3 13 " and " 1 10 0510".Extraction character string after extraction is " 1 51 2 20 3 13 1 10 0510 ", and remaining character string is " 44 45 4612 13 2 10".A is set as 2, b and is set as 1.When calculating, remaining character string position is less, before be " 00000 after zero padding44 45 46 12 13 2 10”。
Utilize above-mentioned formula: each bit digital is corresponding to be calculated
Dynamic password=2* (1 51 2 20 3 13 1 10 0 51 0)
1*(0 0000 4445461213 2 10)
Dynamic password is (2 102 4 40 6 26 2 20 0 10 2 0)
(0 0000 44 45 46 12 13 2 10) retain alphabet and form dynamic authentication password, moved with above-mentionedState password is identical.
The dynamic authentication password and corresponding interception digit that password output unit be used to obtain identify (if there is)It is transferred to cipher authentication subsystem or other external equipments.
Password storage unit be used to store dynamic authentication password and corresponding codeword information.
In addition, as shown in Fig. 2, cipher authentication subsystem includes password acceptance unit, cipher decoding unit and cipher authenticationUnit.
Password acceptance unit be used to receive password and generate the dynamic authentication password that subsystem is sent, and be sent to password solutionAnalyse unit.
Cipher decoding unit be used for according to above-mentioned character string convert mode obtained from dynamic authentication password device identification,The user password and random code of input, and corresponding preset user password is found according to device identification, meanwhile, it is generated from passwordUnit obtains corresponding random code.Then, cipher decoding unit is by the user password of the input obtained from dynamic authentication passwordCipher authentication unit is sent to random code and preset user password and corresponding random code.From dynamic authentication passwordBefore obtaining device identification, the user password of input and random code, whether cipher decoding unit judges receive interception digit markKnow, thinks that dynamic authentication password is complete dynamic authentication password, i.e. dynamic password if being not received by, and carry out subsequent solutionAnalysis processing;If receiving the mark, according to the complete dynamic authentication password of identification information synthesis, i.e. dynamic password, then intoThe subsequent dissection process of row.
The user password for the input that cipher authentication unit be used to obtain from dynamic authentication password and preset userPassword is matched, while the random code obtained from dynamic authentication password is corresponding random with from password generation unit acquisitionCode is matched.If above-mentioned two matching is all successful, that is, in all identical situation of user password and random code, transmission is recognizedDemonstrate,prove success message.If above-mentioned two be matched with unsuccessful, that is, user password or the different situation of random codeUnder, it sends and authenticates unsuccessful message.
Cipher decoding unit according to above-mentioned character string convert mode is obtained from dynamic authentication password device identification, inputUser password and random code, specially (by taking the dynamic authentication password that above-mentioned password generation unit generates as an example):
(1) judge whether to receive the corresponding interception digit mark of dynamic authentication password, if so, then according to identification informationThe formula for synthesizing dynamic password, and being used using cryptographic calculations unit is calculated reduction and obtains substring one and substring two,The fractionation rules integration substring one and substring two used followed by cryptographic calculations unit forms transition character string.
Such as:
The dynamic authentication password received is (2 102 4 40 6 26 2 20 0 10 2 0)
(0 0000 44 45 46 12 13 2 10) judge above-mentioned dynamic due to being not received by interception digit markState authentication password is complete, i.e. dynamic password.
Using parameter a=2, b=1 and
Formula: dynamic password=a* extracts character string
B* residue character string
It calculates and extracts character string and remaining character string, be to be not fixed character string information, i.e. random code due to extracting character stringAnd date, remaining character string are fixed character string information, i.e. user password and device identification.
Extract character string=1 51 2 20 3 13 1 10 0510;
Remaining character string=44 45 46 12 13 2 10;
It combines above-mentioned character string and is obtained and cross character string " 1 51 2 20 3 13 44 45 46 1 10 051 01213 2 10”。
(2) the character string transformation rule used according to cryptographic calculations unit by transition character string be reduced to ten's digit andThe original character string of monogram.The original character string format is random code+user password+date+device identification.It then can be withRandom code and user password are extracted according to above-mentioned format from above-mentioned original character string.
For above-mentioned transition character string, being reduced to character to decimal string is " 1 41 2 16 3 11 36 37 38 18 05 1 0 10 11 2 8".Due to for each, original is to be only possible to be 0-9 if number, if it is 10 or withOn number, all letter obtained according to above-mentioned transformation rule, therefore number and monogram original character string be " 1F2g3bABC 180510ab28”。
Since combined original character string format is random code+user password+date+device identification, extract randomCode 1F2g3b, user password ABC.
The present invention also provides a kind of generation of password and authentication methods, as shown in figure 3, method particularly includes:
Step 1: receive external equipment transmission codeword information, and by codeword information be transferred to cryptographic initialization unit andPassword storage unit.The codeword information includes the identification code and figure, time, color of the password of user's input, external equipmentEtc. auxiliary informations.
Step 2: generating random code as needed, or the codeword information that the external equipment received inputs is converted toThe character string of predetermined format, and random code or character string are transferred to cryptographic calculations unit.
The character string of above-mentioned predetermined format is broadly divided into digit strings, alphabetic character string or mixed characters string.
Random code is directly generated according to above-mentioned predetermined format, without conversion;If external equipment input is also onlyIt only include the codeword information of number or letter, without conversion;But if being the letter of the formats such as color, figure, date-timeBreath, then need to carry out corresponding conversion.
Specifically: the format " yyyymmdd " of only umerical date is converted to for date-time format;It is rgb format for color format conversion, and the color of each point is arranged according to the sequence of R, G, B, such as (100,53,68) 1005368 are just denoted as;For graphical format, either preset gesture line either face figure etc. is all desirableIt presets and stores, and each figure corresponds to a mark, above-mentioned mark is subjected to unified representation, such asFig1, fig2 ... figN, N are natural number, are equivalent to the word that each figure is collectively expressed as to letter and number combination in this waySymbol string.
Step 3: carrying out the conversion of random code and character string according to scheduled rule, and changed by calculation formula by above-mentionedIt calculates result and carries out operation or combination, the dynamic password after being calculated finally obtains most by the arrangement to comprehensive passwordWhole dynamic authentication password.
The conversion of random code and character string is carried out according to scheduled rule, specifically:
(1) each in random code and character string after cryptographic initialization cell translation is converted first, in accordance with ruleFor decimal number, the decimal number is then scaled defined content, respective content combines to form transition character string, the contentIt can be binary system, octal system, hexadecimal or other characters.Above-mentioned transition character string successively includes random code, Yong HumiCode, the correspondence character string on date and device identification.
Such as: transformation rule are as follows: digital 0-9 corresponds to decimal number 0-9;
Lowercase a-z corresponds to decimal number 10-35;
Capitalization A-Z corresponds to decimal number 36-51.
If random code is 1F2g3b, corresponding decimal number is 1 41 2 16 3 11;
If the codeword information of external equipment input is user password+date+device identification form, initial by passwordCharacter string after changing cell translation is ABC 180510ab28, and corresponding decimal number is 36 37 38 18 0510 1011 2 8。
Character string after combination is 1F2g3b ABC 180510ab28;
Being converted to decimal number is 1 41 2 16 3 11 36 37 38 180510 10 11 28;
Being scaled octadic transition character string is 1 51 2 20 3 13 44 45 46 1 10 0510 12 13210。
(2) transition character string split according to certain rule and form substring one and substring two, then willSubstring one and substring two after fractionation are weighted read group total using formula and obtain dynamic password, later will be above-mentionedPassword intercepts certain digit or retains alphabet, forms dynamic authentication password.If retaining alphabet, by oneComplete dynamic authentication password, that is, dynamic password;If the certain digit of interception, formed a dynamic authentication password withAnd a remaining digit password and corresponding interception digit mark, the mark are used to refer to dynamic authentication password from interceptionWhich digit of preceding dynamic password.
Specific fractionation mode can be takes former positions or several latter in order, is also possible to be torn open according to certain requirementPoint, that is to say, that substring one and substring two can be the fixed character string information only extracted, and such as user password is setStandby mark etc., or what is only extracted are not fixed character string information, such as random code, date.
Specific formula are as follows:
Dynamic password=a* extracts character string
B* residue character string
Here since last position, successively forward, each corresponds to weighting, if the zero padding that digit is inadequate.
It is illustrated for extracting and being not fixed character string information below:
For octadic transition character string " 1 51 2 20 3 13 44 45 46 1 10 0 51 0 above-mentioned12 13 2 10 ", it is not fixed character string for random code and date, specially " 1 51 2 20 3 13 " and " 1 10 0510".Extraction character string after extraction is " 1 51 2 20 3 13 1 10 0510 ", and remaining character string is " 44 45 4612 13 2 10".A is set as 2, b and is set as 1.When calculating, remaining character string position is less, before be " 00000 after zero padding44 45 46 12 13 2 10”。
Utilize above-mentioned formula: each bit digital is corresponding to be calculated
Dynamic password=2* (1 51 2 20 3 13 1 10 051 0)
1*(0 0 0 0 0 44 45 46 12 13 2 10)
Dynamic password is (2 102 4 40 6 26 2 20 0 10 2 0)
(0 0000 44 45 46 12 13 2 10) 5-10 of the every a line of dynamic password since the left side are interceptedNumber formed dynamic authentication password, specially (6 26 2 20 0 10)
(0 44 45 46 12 13) then remaining digit password is (2 102 4 40 2 0)
(0 0002 10) interception digit is identified as " L1-2R5-10 "
Step 4: obtained dynamic authentication password and corresponding interception digit mark (if there is) to be transferred to password and recognizeDemonstrate,prove subsystem or other external equipments.
Step 5: receiving password generates the dynamic authentication password that subsystem is sent, and it is sent to cipher decoding unit.
Step 6: the user of device identification, input is obtained from dynamic authentication password according to above-mentioned character string conversion modePassword and random code, and corresponding preset user password is found according to device identification, meanwhile, obtain corresponding random code.WithAfterwards, by the user password of the input obtained from dynamic authentication password and random code and preset user password and it is corresponding withMachine code is sent to cipher authentication unit.
Before the user password and random code for obtaining device identification, input, judge whether to receive interception digit mark,Think that dynamic authentication password is complete dynamic authentication password, i.e. dynamic password if being not received by, and carries out subsequent parsingProcessing;If receiving the mark, complete dynamic authentication password, i.e. dynamic password are synthesized according to identification information, then carry outSubsequent dissection process.
Step 7: by the user password of the input obtained from dynamic authentication password and the progress of preset user passwordThe random code matched, while will acquire is matched with corresponding random code.If above-mentioned two matching is all successful, that is, userUnder password and all identical situation of random code, certification success message is sent.As soon as if it is above-mentioned two be matched with it is unsuccessful,It is to send in user password or the different situation of random code and authenticate unsuccessful message.
According to above-mentioned character string convert mode obtained from dynamic authentication password device identification, input user password and withMachine code, specially (by taking the dynamic authentication password of above-mentioned generation as an example):
(1) judge whether to receive the corresponding interception digit mark of dynamic authentication password, if so, then according to identification informationThe formula for synthesizing dynamic password, and being used using above-mentioned calculating is calculated reduction and obtains substring one and substring two, thenTransition character string is formed using the above-mentioned fractionation rules integration substring one used and substring two.
Such as:
The dynamic authentication password received is (6 26 2 20 0 10)
(0 44 45 46 12 13) remaining digit password is (2 102 4 40 2 0)
(0 0002 10) are identified as " L1-2R5-10 " due to receiving interception digit, then press dynamic authentication passwordIt is inserted into remaining digit password according to mark rule, that is, after being inserted into every a line the 4th, before the 11st, is formed original dynamicState password.
Specifically: (2 102 4 40 6 26 2 20 0 10 2 0)
(0 0000 44 45 46 12 13 2 10) utilize parameter a=2, b=1 and
Formula: dynamic password=a* extracts character string
B* residue character string
It calculates and extracts character string and remaining character string, be to be not fixed character string information, i.e. random code due to extracting character stringAnd date, remaining character string are fixed character string information, i.e. user password and device identification.
Extract character string=1 51 2 20 3 13 1 10 0510;
Remaining character string=44 45 46 12 13 2 10;
It combines above-mentioned character string and is obtained and cross character string " 1 51 2 20 3 13 44 45 46 1 10 051 01213 2 10”。
(2) transition character string is reduced to by ten's digit and monogram according to the above-mentioned character string transformation rule usedOriginal character string.The original character string format is random code+user password+date+device identification.It then can be from above-mentioned originalRandom code and user password are extracted according to above-mentioned format in beginning character string.
For above-mentioned transition character string, being reduced to character to decimal string is " 1 41 2 16 3 11 36 37 38 18 05 1 0 10 11 2 8".Due to for each, original is to be only possible to be 0-9 if number, if it is 10 or withOn number, all letter obtained according to above-mentioned transformation rule, therefore number and monogram original character string be " 1F2g3bABC 180510ab28”。
Since combined original character string format is random code+user password+date+device identification, extract randomCode 1F2g3b, user password ABC.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, anyThose skilled in the art is in technical scope disclosed by the invention, and any changes or substitutions that can be easily thought of, all answersIt is included within the scope of the present invention.Therefore, protection scope of the present invention should be with the scope of protection of the claimsIt is quasi-.

Claims (10)

CN201810813953.8A2018-07-232018-07-23Password generates and Verification SystemPendingCN109086600A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201810813953.8ACN109086600A (en)2018-07-232018-07-23Password generates and Verification System

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201810813953.8ACN109086600A (en)2018-07-232018-07-23Password generates and Verification System

Publications (1)

Publication NumberPublication Date
CN109086600Atrue CN109086600A (en)2018-12-25

Family

ID=64838128

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201810813953.8APendingCN109086600A (en)2018-07-232018-07-23Password generates and Verification System

Country Status (1)

CountryLink
CN (1)CN109086600A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110474766A (en)*2019-07-302019-11-19河南兄弟科技发展有限公司Random cipher generation method, device and auth method
CN110830451A (en)*2019-10-212020-02-21上海百事通信息技术股份有限公司Data transmission method, device, storage medium and terminal
CN111262946A (en)*2020-02-022020-06-09老肯医疗科技股份有限公司Online monitoring system and monitoring method for equipment maintenance
CN111342959A (en)*2020-02-172020-06-26德施曼机电(中国)有限公司 A password security setting and identification method, system, device and storage medium
CN112381553A (en)*2020-11-202021-02-19王永攀Product anti-counterfeiting method
CN112769543A (en)*2019-10-212021-05-07千寻位置网络有限公司Method and system for protecting dynamic secret key
CN113066215A (en)*2021-03-152021-07-02长沙广缘物业管理有限公司Two-dimensional code access control management method, system and storage medium
CN113901440A (en)*2021-12-092022-01-07北京网界科技有限公司User login system and method, and user login setting system and method

Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103152172A (en)*2011-12-072013-06-12中国电信股份有限公司Method and client side and server and system for mobile token dynamic password generation
CN103745151A (en)*2014-01-082014-04-23杭州晟元芯片技术有限公司System and method for authenticating identity through combination of two-dimension codes and dynamic passwords
CN104125055A (en)*2014-06-252014-10-29小米科技有限责任公司Encryption and decryption method and electronic device
CN105991290A (en)*2015-03-062016-10-05科大讯飞股份有限公司 Pseudo-random voiceprint cipher text generation method and system
CN106101159A (en)*2016-08-272016-11-09谢志豪Dynamic cipher generating method, dynamic cipher authentication method and device
CN107171789A (en)*2017-04-202017-09-15努比亚技术有限公司A kind of safe login method, client device and server
CN108173661A (en)*2018-02-092018-06-15上海林果实业股份有限公司A kind of dynamic password formation method, device and E-token dynamic password card

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103152172A (en)*2011-12-072013-06-12中国电信股份有限公司Method and client side and server and system for mobile token dynamic password generation
CN103745151A (en)*2014-01-082014-04-23杭州晟元芯片技术有限公司System and method for authenticating identity through combination of two-dimension codes and dynamic passwords
CN104125055A (en)*2014-06-252014-10-29小米科技有限责任公司Encryption and decryption method and electronic device
CN105991290A (en)*2015-03-062016-10-05科大讯飞股份有限公司 Pseudo-random voiceprint cipher text generation method and system
CN106101159A (en)*2016-08-272016-11-09谢志豪Dynamic cipher generating method, dynamic cipher authentication method and device
CN107171789A (en)*2017-04-202017-09-15努比亚技术有限公司A kind of safe login method, client device and server
CN108173661A (en)*2018-02-092018-06-15上海林果实业股份有限公司A kind of dynamic password formation method, device and E-token dynamic password card

Cited By (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110474766B (en)*2019-07-302022-06-17河南兄弟科技发展有限公司Random password generation method and device and identity authentication method
CN110474766A (en)*2019-07-302019-11-19河南兄弟科技发展有限公司Random cipher generation method, device and auth method
CN110830451A (en)*2019-10-212020-02-21上海百事通信息技术股份有限公司Data transmission method, device, storage medium and terminal
CN112769543A (en)*2019-10-212021-05-07千寻位置网络有限公司Method and system for protecting dynamic secret key
CN110830451B (en)*2019-10-212022-03-29上海百事通信息技术股份有限公司Data transmission method, device, storage medium and terminal
CN112769543B (en)*2019-10-212022-06-28千寻位置网络有限公司Method and system for protecting dynamic secret key
CN111262946A (en)*2020-02-022020-06-09老肯医疗科技股份有限公司Online monitoring system and monitoring method for equipment maintenance
CN111262946B (en)*2020-02-022022-12-06老肯医疗科技股份有限公司Online monitoring system and monitoring method for equipment maintenance
CN111342959A (en)*2020-02-172020-06-26德施曼机电(中国)有限公司 A password security setting and identification method, system, device and storage medium
CN111342959B (en)*2020-02-172022-12-06德施曼机电(中国)有限公司 Password security setting and identification method, system, device and storage medium
CN112381553A (en)*2020-11-202021-02-19王永攀Product anti-counterfeiting method
CN112381553B (en)*2020-11-202024-05-28王永攀Product anti-counterfeiting method
CN113066215B (en)*2021-03-152022-09-13长沙广缘物业管理有限公司Two-dimensional code access control management method, system and storage medium
CN113066215A (en)*2021-03-152021-07-02长沙广缘物业管理有限公司Two-dimensional code access control management method, system and storage medium
CN113901440B (en)*2021-12-092022-04-08北京网界科技有限公司User login system and method, and user login setting system and method
CN113901440A (en)*2021-12-092022-01-07北京网界科技有限公司User login system and method, and user login setting system and method
WO2023104116A1 (en)*2021-12-092023-06-15马山河User login system and method and user login setting system and method

Similar Documents

PublicationPublication DateTitle
CN109086600A (en)Password generates and Verification System
US8407463B2 (en)Method of authentication of users in data processing systems
CN106161006B (en)Digital encryption algorithm
JP4741629B2 (en) Authentication method using icon encryption
CN102752115B (en)Challenge code generating method and device, dynamic password authentication method and system
CN104683115B (en)Based on the identity identifying method of finger print information
US20070174628A1 (en)User authentication
CN101110667B (en)User authentication method and user authentication system
CN101702191A (en)Device and method for verifying passwords
CN104158664A (en)Identity authentication method and system
CN107077559A (en)Verification System, prompting terminal and information recording carrier
CN107111479A (en)Computer safety system and the method for preventing thump from recording
CN101951320A (en)Implementation method, device and system of dynamic password
CN104168117B (en)A kind of speech digit endorsement method
CN113449829A (en)Data transmission method based on optical character recognition technology and related device
CN104657860A (en)Mobile banking security authentication method
CN111651516B (en)Financial block chain big data processing system and method
US20090013180A1 (en)Method and Apparatus for Ensuring the Security of an Electronic Certificate Tool
CN103684784B (en)Two-factor identity authentication method based on Chinese character format information
CN101640591A (en)Authentication method
CN203243360U (en)Identity registration system
TW201843613A (en)Personal identity authentication method and system using graphic lock capable of ensuring a high-security identity authentication
CN109120397B (en)Document authentication method and system based on identification password
CN117596593B (en)Security authentication method based on wireless communication
KR20060019926A (en) Authentication system and authentication method using images

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20181225


[8]ページ先頭

©2009-2025 Movatter.jp