CN101604366B - Password separate dynamic verification method and system - Google Patents

Password separate dynamic verification method and system Download PDF

Info

Publication number
CN101604366B
CN101604366B CN2009100410965A CN200910041096A CN101604366B CN 101604366 B CN101604366 B CN 101604366B CN 2009100410965 A CN2009100410965 A CN 2009100410965A CN 200910041096 A CN200910041096 A CN 200910041096A CN 101604366 B CN101604366 B CN 101604366B
Authority
CN
China
Prior art keywords
password
subcipher
user
random cipher
cipher group
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009100410965A
Other languages
Chinese (zh)
Other versions
CN101604366A (en
Inventor
余元龙
罗笑南
卢林发
叶灿才
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHONGSHAN IKER DIGITAL TECHNOLOGY Co Ltd
Original Assignee
ZHONGSHAN IKER DIGITAL TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHONGSHAN IKER DIGITAL TECHNOLOGY Co Ltd filed Critical ZHONGSHAN IKER DIGITAL TECHNOLOGY Co Ltd
Priority to CN2009100410965A priority Critical patent/CN101604366B/en
Publication of CN101604366A publication Critical patent/CN101604366A/en
Application granted granted Critical
Publication of CN101604366B publication Critical patent/CN101604366B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a password verification technique, in particular to a password separate dynamic verification method and a system, which is characterized by comprising the following steps: A. users separate the existing passwords into two groups of subpasswords, namely a first password and a second password; B. users input a first subpassword or a second subpassword in a operational interface and transmit to the system for verification; C. the system carries out partial verification on the password according to the subpassword; if passing, a random password group is generated and transmitted to the operational interface for display; D. users combine the random password group and the other remained subpassword according to the prompting of the operational interface; and E. the system extracts the other subpassword which is to be verified from the received combination passwords and verifies; if passing, then the verification is successful. In the invention, the password can be protected in the initial stage when users input the password, and simultaneously original user password length and content are not changed, thus having the characteristics of convenient use and high safety and the like.

Description

A kind of password separate dynamic verification method
Technical field:
The present invention relates to the password authentification verification technique, particularly a kind of method and system that existing password is carried out segmentation, dynamic authentication.
Background technology
At present, the user logs on various systems, pays, the operation such as modification often needs to carry out first password authentification.Password itself may be exactly string number, but but often links together with various forms of wealth, data, information, resource etc., so in case password is stolen, the user will cause loss more or less.
Along with the development of computer technology and mechanics of communication, people have worked out the method for various assurance cryptosecurities.For example utilize various cipher modes and algorithm to realize safety in the password transport process; Utilization reduces the risk that is cracked and releases by increasing Password Length or type; Assist to produce disposal password by various encryption apparatus; Guarantee user's authenticity by multiple authentication; Exchanging policy by various passwords improves security of password etc.
Along with the development of computer technology, various trojan horses also arise at the historic moment.A kind of wooden horse is wherein arranged, and it can realize the operation of keyboard etc. is monitored by program, so no matter what kind of encryption people or system carry out at last to password, also just of no avail, because if original password is stolen, even adopted very complicated algorithm that password is carried out very strange encryption to password, perhaps significantly improve the figure place of password etc., others equally can by steal original password obtain various authorities.In addition, in the daily life, when people operate in some ATM (automatic teller machine), some are felt people agaainst the law and go out its corresponding password by telemonitoring and the operating gesture by people and position judgment, so will conscientiously guarantee the safety of password, a kind of good cryptosecurity scheme should just play a role from the moment of input password.In the reality, owing to ignored the cryptoguard of the user being carried out the Password Input stage, also lost the function that guarantees cryptosecurity so much guarantee the method for cryptosecurity.
Summary of the invention
The present invention discloses a kind of password separate dynamic verification method and system, by the method or system, can solve effectively that keyboard operation is monitored, input operation is monitored etc. and cause the stolen problem of password.Enforcement of the present invention; can not change on the one hand length and the content of the existing password of user; do not increase the difficulty of people's memory cipher, be fit on the other hand cooperate with the encryption method of various complexity yet, the safety of the processes such as real performance protection Password Input, transmission, checking.
The present invention is achieved by the following scheme:
A kind of password separate dynamic verification method is characterized in that, the method comprises:
A. the user will have password and be divided into two groups of subciphers, i.e. the first subcipher and the second subcipher;
B. the user inputs the first subcipher or the second subcipher and the system that is sent in operation interface and accepts checking;
C. system carries out checking partial according to subcipher to password, as passes through, and then produces a random cipher group and be sent to operation interface to show;
D. the user makes up random cipher group and remaining another subcipher according to the prompting of operation interface, and password and the system that is sent to after operation interface input combination accept checking;
E. system will extract another subcipher to be verified and verify from the combination pin of receiving; By then being proved to be successful.
As a supplement, the method can also comprise: if step e place checking not by point out input error, system regenerates a random cipher group and is sent to operation interface and shows, and forwards step D to;
The checking of step C place is not by then pointing out input error and return interface, and the user re-enters subcipher;
One Security Audit Strategy, the input error number of times when step C or E place reaches setting value, and system stops/lock out action this user's subsequent authentication automatically.
As optimization, the password dividing method at the steps A place of the above comprises in order and cutting apart, uniformly-spaced cut apart to extract with intermediate mass and cut apart;
The described password combination method in step D place comprises that subcipher integral body assigns arbitrary position, subcipher in the random cipher group to disperse in order to assign in the random cipher group.
In order to guarantee the checking quality to subcipher, the first subcipher of the above and the second subcipher are to have two or more passwords.
Further, the figure place of the described random cipher group of step C is a random number, and namely the random cipher group is not for fixing.
A kind ofly adopt logging in or payment system of password separate dynamic verification, it comprises and one logging in/payment interface, a password authentification platform that be characterised in that: the method for password authentication that this system logs in/adopts when paying is the password separate dynamic verification method of the above.
The present invention in contrast to existing method of password authentication, and its outstanding beneficial effect comprises:
1. the length and the content that have kept the original password of user, additionally increase has made things convenient for the user to remember difficulty, and is simultaneously easy to use;
2. by wooden horse automatic monitoring or the artificial stolen problem of password that causes such as monitor, just protect from the password operational phase when effectively having solved the user because of the input password;
3. the random cipher group that produces by introduction system, and the length of this cipher code set also is at random, realizes the dynamic password protection;
4. also there is kinds of schemes in the combination of original password with multiple splitting scheme, subcipher and random cipher group, has the security audit function that a pair of input error number of times calculates, even subcipher is stolen going all, steal taker and also can't in limited number of times, reduce to original password.
Embodiment
Embodiment one
A kind of password separate dynamic verification method, password that provide according to the service side for a kind of user or voluntarily registration is inputted this password and is accepted the method that system/service side verifies in operation interface.
With reference to shown in Figure 1, be one in this method of password authentication checking flow process.By this flow process, can reproduce clearly the present invention program's core content;
At first as Fig. 1 101 shown in, the password that the user will have first is divided into two groups of subciphers, i.e. the first subcipher and the second subcipher; The method of cutting apart can comprise in order and cutting apart, uniformly-spaced cut apart to extract with intermediate mass and the method such as cut apart.
For example, establishing the existing password of user is six password (X 1X 2X 3X 4X 5X 6), X wherein 1, X 2, X 3, X 4, X 5, X 6Can be numeral, letter, punctuation mark even Chinese character etc.The first subcipher can have following splitting scheme according to different dividing methods with the second subcipher:
1. cut apart in order, be about to password and be divided in order two piecemeals, each password position of two piecemeals keeps original neighbouring relations.Namely the first subcipher and the second subcipher correspond to respectively:
The first subcipher The second subcipher
X 1 X 2 X 3 X 4 X 5 X 6
X 3 X 4 X 5 X 6 X 1 X 2
X 1 X 2 X 3 X 4 X 5 X 6
X 4 X 5 X 6 X 1 X 2 X 3
X 1 X 2 X 3 X 4 X 5 X 6
X 5 X 6 X 1 X 2 X 3 X 4
2. uniformly-spaced cut apart, namely from original code, extract password unit separated by a certain interval and be reassembled into subcipher.Namely the first subcipher and the second subcipher correspond to respectively:
The first subcipher The second subcipher
X 1 X 3 X 5 X 2 X 4 X 6
X 2 X 4 X 6 X 1 X 3 X 5
[0035]3. intermediate mass extracts and cuts apart, and namely extracts some adjacent passwords as a subcipher from original code, and remaining is another password.Namely the first subcipher and the second subcipher correspond to respectively:
The first subcipher The second subcipher
X 2 X 3 X 1 X 4 X 5 X 6
X 1 X 4 X 5 X 6 X 2 X 3
X 3 X 4 X 1 X 2 X 5 X 6
X 1 X 2 X 5 X 6 X 3 X 4
X 4 X 5 X 1 X 2 X 3 X 6
X 1 X 2 X 3 X 6 X 4 X 5
X 2 X 3 X 4 X 1 X 5 X 6
X 1 X 5 X 6 X 2 X 3 X 4
X 3 X 4 X 5 X 1 X 2 X 6
X 1 X 2 X 6 X 3 X 4 X 5
By contrast, can know that the array configuration that intermediate mass extracts dividing method is more complicated, the risk that password is stolen at last is also just lower.
If in order to make the cipher anti theft function reach optimum, that verification system can all be verified support to above-mentioned arbitrary dividing method, even two subciphers are stolen like this, that probability that successfully it is combined into original code also drops to minimum.
But, if consider for the convenience of user's use, can only carry out the password cutting operation by first method, namely cut apart in order; In such operation time,, operation interface is in addition promptings such as " please input the front three of password ... " again, and the user then can understand rapidly dividing method wherein, and carries out next step operation.
At present, the general employing of the system of bank is the method for password authentication of six bit digital.For being known, the user how password is cut apart, if method of the present invention is applied to the cash dispenser of bank, then the cash dispenser operation interface can be made corresponding prompting such as " please inputting in order the front two numeral of original code ... ", " please inputting in order the front three numeral of original code ... ", " please inputting in order any three bit digital of original code ... " etc.
At present, the risk that is stolen in order to reduce password, a lot of online login systems have all adopted the password more than six such as eight, ten etc., and password can be comprised of numeral, letter, punctuation mark even Chinese character etc.So when these passwords were cut apart, its scheme was also just more, the array configuration of the first subcipher and the second subcipher is also just more complicated, and the risk that password is stolen is just lower.
In order to guarantee the checking quality to system's subcipher, namely the first subcipher and the second subcipher should be and have two or more passwords.If namely existing password is six password (X 1X 2X 3X 4X 5X 6) and X 1, X 2, X 3, X 4, X 5, X 6Be numeral.So, cut apart by split plot design in order, scheme can comprise that " 2+4 ", " 3+3 " (are X 1X 2And X 3X 4X 5X 6, X 1X 2X 3And X 4X 5X 6); If eight passwords can comprise that then " 2+6 ", " 3+5 ", " 4+4 " (are X 1X 2And X 3X 4X 5X 6X 7X 8, X 1X 2X 3And X 4X 5X 6X 7X 8, X 1X 2X 3X 4And X 5X 6X 7X 8).For six and eight passwords, can select respectively " 3+3 ", " 3+5 " to be preferred version.The probability that subcipher such as the input of 102 places of Fig. 1 is 1, then hit it is 1/10th; If 2, the probability of then being hit it is one of percentage; If 3, the probability of then being hit it is per mille.So for the checking quality at 103 places that guarantee Fig. 1, the subcipher of 102 places input is more than 2 or 2, namely the first subcipher and the second subcipher are to have two or more passwords.
As Fig. 1 102 shown in, the user is from being about to that password is cut apart or after cutting apart under the prompting of operation interface, in Password Input frame Position input the first subcipher or second subcipher of operation interface.The principle of wherein inputting the first subcipher or the second subcipher is identical, and for convenience, what suppose the input of this place is the first subcipher, and employing is the first dividing method.After then the user inputted the first subcipher, password was transferred into system and accepts checking.Password is transmitted also to have coding, encryption, adds the processes such as source address and destination address in the process, these processes are because non-emphasis of the present invention, so and this area can be easy to per capita understand and realize not being described in detail.The system that in addition subcipher is verified can be the verification platform (for example, if the cash dispenser of bank then refers to its system software backstage) of this locality or long-range verification system (for example the service device of certain on the network and supporting service system).
As Fig. 1 103 and 104 shown in, system verifies the first subcipher of user input (i.e. 102 places input password).If eligible then verify by and forward 108 to, otherwise forward 105 to; Described checking, final the first subcipher that obtains of the system that refers to compares with the original code that is pre-stored in system, if judge that the first subcipher is the local password that splits of original code after the contrast, that checking is passed through.That is, if original code is (X 1X 2X 3X 4X 5X 6), according to the first dividing method, when the first subcipher of input is ABK, and (A=X 1, B=X 2, K=X 3) or (A=X 4, B=X 5, K=X 6) time checking passes through, otherwise do not pass through; And for example, if cut apart according to the second dividing method, the first subcipher when input is ABK so, when being (A=X 1, B=X 3, K=X 5) or (A=X 2, B=X 4, K=X 6) time, checking is passed through, otherwise does not pass through.
For the various password dividing methods of compatibility (namely no matter how cutting apart), then its by the condition of checking for being defined as: as long as the password potential energy that respectively forms of the first subcipher of input finds with its corresponding composition password position and the relative sequencing that respectively forms the password position at original code respectively and is consistent then by verifying with original password.When realizing with program, can read by turn subcipher respectively by two loop statements (being two stage cycle), and contrast by turn realization with the password of former preservation.
As Fig. 1 105 shown in, if the first subcipher checking is not passed through, then input error is pointed out in operation interface by system, and the number of times of the number of times of record input error or this input error adds 1 and turn to 106 places;
As Fig. 1 106 shown in, judge whether the input error number of times behind 105 places reaches setting value (can arrange according to actual needs, generally can be made as 3), if it is stop/locking the follow-up password verification operation of this user, be cracked to prevent password; The input error number of times does not reach setting value, then returns 102 places, and the user re-enters the first subcipher;
As Fig. 1 108 shown in, system passes through the first subcipher checking, then automatically produces a random cipher array, the random cipher array is sent to operation interface and shows behind system storage.Different systems, the random cipher array can comprise different components, such as numeral, letter, symbol, punctuate even Chinese character etc.The figure place of random cipher array is random number, and namely the length of random cipher array is uncertain.The at random degree of random cipher array and figure place thereof is higher in theory, and the security of password is also just better, but actual use can be established a upper limit to the length of random cipher group.
As Fig. 1 109 shown in, the user makes up random cipher array and remaining another subcipher (i.e. the second subcipher) according to the prompting of operation interface.The mode of random cipher array and the second subcipher combination comprises that subcipher integral body assigns arbitrary position, subcipher in the random cipher group to disperse in order to assign in the random cipher group etc.For example, suppose that original code is (X 1X 2X 3X 4X 5X 6), the user inputs the first subcipher (X 1X 2X 3) by system verification, the random cipher group of supposing the system auto-returned is six random number (Y 1Y 2Y 3Y 4Y 5Y 6), so random cipher array and the second subcipher (X 4X 5X 6) combination form can for:
Method one. subcipher integral body is assigned the arbitrary position in the random cipher group;
Y 1 X 4 X 5 X 6 Y 2 Y 3 Y 4 Y 5 Y 6
Y 1 Y 2 X 4 X 5 X 6 Y 3 Y 4 Y 5 Y 6
Y 1 Y 2 Y 3 X 4 X 5 X 6 Y 4 Y 5 Y 6
Y 1 Y 2 Y 3 Y 4 X 4 X 5 X 6 Y 5 Y 6
Y 1 Y 2 Y 3 Y 4 Y 5 X 4 X 5 X 6 Y 6
Method two. subcipher disperses to assign in order in the random cipher group;
Y 1 X 4 Y 2 X 5 Y 3 X 6 Y 4 Y 5 Y 6
Y 1 Y 2 X 4 Y 3 X 5 Y 4 X 6 Y 5 Y 6
Y 1 Y 2 Y 3 X 4 Y 4 X 5 Y 5 X 6 Y 6
Y 1 Y 2 Y 3 Y 4 X 4 Y 5 X 5 Y 6 X 6
Y 1 Y 2 Y 3 Y 4 X 4 Y 5 X 5 Y 6 X 6
Y 1 X 4 Y 2 Y 3 X 5 Y 4 X 6 Y 5 Y 6
Y 1 X 4 Y 2 Y 3 X 5 Y 4 Y 5 X 6 Y 6
......
Method three. other array mode;
In the actual use procedure of system, the user generally compares indigestibility and how to carry out the combination of random cipher array and the second subcipher, so operation interface can be done some promptings, for example: the demonstration of random cipher component two parts (is assumed to be A section and B section, wherein the figure place of A section is random number, the length that is A section is unfixing), then can input in order " A+ remains password+B " by prompting user; And for example, can be with the whole demonstration of random cipher array, the position that needs to fill the second subcipher stays the room, and then prompting user is inputted in order the random cipher array of seeing and is inserted remaining password in vacant position and gets final product; The user is made up according to the prompting of system, both user-friendly, also make things convenient for system to the extraction of the second subcipher.
As Fig. 1 110 shown in, the user is the password after operation interface input combination in order.
As Fig. 1 111 shown in, the password after the combination is received by system, and extracts remaining another subcipher, i.e. the second subcipher from the password after this combination.The method of extracting, according to the difference of array mode, flow process is not identical yet.For example, if operation interface is to input combination pin with the mode prompting user of " A+ remains password+B ", that method of extracting the second subcipher is fairly simple, namely only need the random cipher group of the combination pin that will receive and storage relatively, in the combination pin with A section and B part from obtaining the second subcipher; If other array mode, then can namely read by turn combination pin with general extracting method, and whether identical on judgement and the random cipher group, extract the composition identical with the random cipher group, remaining composition reconfigures and can obtain by former relative sequencing.
As Fig. 1 112 shown in, system verifies the second subcipher that extracts.Verification method is for to compare the second subcipher and existing password, if can judge that the second subcipher for the part of existing password, then is proved to be successful (i.e. 113 places).The principle of checking is identical with 103 and 104 places with method.
As Fig. 1 114 and 115 shown in, if the checking at 112 places does not have by then the input error number of times is recorded and calculate the input error number of times, and judge whether the input error number of times reaches setting value and (can arrange according to actual needs, generally be made as 3 times), if reach setting value then stop/locking the follow-up password verification operation of this user (namely 116), be cracked to prevent password; Otherwise forward 108 to, system regenerates a random cipher group and is shown in operation interface, then repeats the operation of 109,110,111 grades.
Embodiment two
A kind ofly adopt logging in or payment system of password separate dynamic verification, this system is comprised of hardware supported and software support two large divisions.Wherein, system should have one and log in/payment interface and a guidance panel, and its effect is to make things convenient for the user to carry out the Password Input operation; One password authentification platform, its effect are that user's password is verified.
System can be the payment system of bank such as ATM ATM (automatic teller machine) etc., also can be Web bank's payment system, online login system etc.
A kind ofly adopt logging in or payment system of password separate dynamic verification, it is characterised in that: the method for password authentication that this system logs in/adopts when paying is embodiment one described method of password authentication.
The below as an example of Web bank's payment system example to how realizing that password authentification is described further:
Suppose the user on the net bank payment system registered a user name and payment cipher, this password is eight passwords, is designated as (X 1X 2X 3X 4X 5X 6X 7X 8), then its password authentification can adopt according to the invention core of embodiment one following scheme to realize:
1. the user is according to the front three of interface prompt (as shown in Figure 2) input payment cipher, i.e. X 1X 2X 3
2. system contrasts the front three password of user input and judges whether consistent with the front three of original password.If unanimously then produce a random cipher array and be shown in operation interface, suppose that the random cipher array is " 87487654654 ", and minute two parts show; The interface prompt user inputs random cipher array and remaining five passwords, (as shown in Figure 3); Otherwise judge whether the input error number of times reaches set point number, do not reach and then point out input error, and show operation interface such as Fig. 4, the user re-enters the front three of payment cipher, if reach set point number then show interface shown in Figure 5, and stop this user's follow-up checking;
3. the user inputs random cipher group and remaining five passwords in order according to interface prompt as shown in Figure 3;
4. system compares the random cipher group of the combination pin of user input and storage and extracts remaining five seat passwords, and this five seats password and original password compared judges whether it is the part that original password splits.If it is be proved to be successful closing the transaction or carry out other follow-up operation; Otherwise prompting input password mistake, and judge whether the input error number of times reaches set point number, reach set point number and then show interface shown in Figure 5, and stop this user's follow-up checking, if do not reach then show operation interface such as Fig. 6, namely system produces another random cipher group automatically (such as " 6896685248 ", and minute two parts show, i.e. " 689668 " and " 5248 "), and be sent to interface display, prompting user re-enters password; The user re-enters password by prompting;
The operation interface of the above and implementation are a simple mode; the extracting mode of the actual partitioning scheme that can increase according to the explanation of embodiment one content, change original password, change random cipher group and the array mode of residue password, the suggestion content that changes the interface and style, change subcipher and checking flow process then should be considered as in protection scope of the present invention at the core content that does not break away from the inventive method realization.
In addition, native system can also have one and notify this user cipher authentication error number of times to reach setting value prior to the contact method (such as phone number, mail, telephone number etc.) of this system registry and by modes such as note, mail, voice in advance by reading the user, and notify the registered user to carry out the operations such as release and Modify password, can further guarantee the risk that password is stolen like this.

Claims (9)

1. password separate dynamic verification method is characterized in that the method comprising the steps of:
A. the user will have password and be divided into two groups of subciphers, i.e. the first subcipher and the second subcipher;
B. the user inputs the first subcipher or the second subcipher and the system that is sent in operation interface and accepts checking;
C. system carries out checking partial according to the first subcipher or the second subcipher inputted to password, as passes through, and then produces a random cipher group and be sent to operation interface to show;
D. the user makes up random cipher group and remaining another subcipher according to the prompting of operation interface, and password and the system that is sent to after operation interface input combination accept checking;
E. system will extract another subcipher to be verified and verify from the combination pin of receiving; By then being proved to be successful.
2. method of password authentication as claimed in claim 1 is characterized in that: the checking of step e place does not show by then pointing out input error, system to regenerate a random cipher group and being sent to operation interface, and forwards step D to.
3. method of password authentication as claimed in claim 1, it is characterized in that: step C place verifies that not by then pointing out input error and return interface the user re-enters subcipher.
4. method of password authentication as claimed in claim 1, it is characterized in that: the method also comprises a Security Audit Strategy, and the input error number of times when step C or E place reaches setting value, and system stops/lock out action this user's subsequent authentication automatically.
5. such as the arbitrary described method of password authentication of claim 1 to 4, it is characterized in that: the password dividing method at steps A place comprises in order and cutting apart, uniformly-spaced cut apart to extract with intermediate mass and cut apart.
6. such as the arbitrary described method of password authentication of claim 1 to 4, it is characterized in that: the described password combination method in step D place comprises that subcipher integral body assigns arbitrary position, subcipher in the random cipher group to disperse in order to assign in the random cipher group.
7. method of password authentication as claimed in claim 5 is characterized in that: the described password combination method in step D place comprises that subcipher integral body assigns arbitrary position, subcipher in the random cipher group to disperse in order to assign in the random cipher group.
8. method of password authentication as claimed in claim 7, it is characterized in that: the first subcipher and the second subcipher are to have two or more passwords.
9. method of password authentication as claimed in claim 8, it is characterized in that: the figure place of the described random cipher group of step C is a random number.
CN2009100410965A 2009-07-13 2009-07-13 Password separate dynamic verification method and system Expired - Fee Related CN101604366B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100410965A CN101604366B (en) 2009-07-13 2009-07-13 Password separate dynamic verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100410965A CN101604366B (en) 2009-07-13 2009-07-13 Password separate dynamic verification method and system

Publications (2)

Publication Number Publication Date
CN101604366A CN101604366A (en) 2009-12-16
CN101604366B true CN101604366B (en) 2013-03-06

Family

ID=41470093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100410965A Expired - Fee Related CN101604366B (en) 2009-07-13 2009-07-13 Password separate dynamic verification method and system

Country Status (1)

Country Link
CN (1) CN101604366B (en)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2386973A1 (en) 2010-05-11 2011-11-16 Thomson Licensing Methods, devices and computer program supports for password generation and verification
CN101882193A (en) * 2010-07-14 2010-11-10 中兴通讯股份有限公司 Method and equipment for unlocking handheld device
TWI454121B (en) * 2011-05-30 2014-09-21 Chunghwa Telecom Co Ltd Method for generating dynamic code over secure network connection
CN102271035B (en) * 2011-09-02 2014-12-24 华为技术有限公司 Password transmission method and device
CN103136462B (en) * 2011-12-05 2016-03-30 联想(北京)有限公司 A kind of method and system of password authentification
CN103220140A (en) * 2012-01-18 2013-07-24 华为终端有限公司 Encryption and decryption method, encryption and decryption device and electronic equipment
CN103365581B (en) * 2012-03-31 2019-01-25 百度在线网络技术(北京)有限公司 A kind of method and apparatus that user equipment is carried out touching unlock based on unlocking pin
CN103457730B (en) * 2012-06-05 2016-12-14 中国银联股份有限公司 Safety information interaction device and method and for the mutual IC-card of safety information
CN103490874A (en) * 2012-06-14 2014-01-01 中国银联股份有限公司 Safety information interaction system, method, device and server
CN102737195A (en) * 2012-07-04 2012-10-17 周灿旭 Master and slave dynamic passwords
CN102957688B (en) * 2012-08-16 2016-05-04 中国商用飞机有限责任公司 password input and verification method and device
CN102881079B (en) * 2012-08-28 2015-04-22 汪风珍 Trampled multi-password early-warning type different card controllable bank card
CN104021322A (en) * 2013-02-28 2014-09-03 北京旋极信息技术股份有限公司 Electronic signature method, electronic signature equipment and electronic signature client
JP5796725B2 (en) 2013-03-22 2015-10-21 カシオ計算機株式会社 Authentication processing apparatus, authentication processing method, and program
CN103679935A (en) * 2013-05-01 2014-03-26 汪风珍 Keyword formed by synthesis through terminal
CN103714626B (en) * 2013-05-01 2017-09-08 汪风珍 Many password early warning types can different card control bank card
CN103971048B (en) * 2014-04-30 2017-12-15 宇龙计算机通信科技(深圳)有限公司 A kind of method and its password input system for inputting password
CN104834840B (en) * 2014-07-03 2018-05-08 中国人民解放军92728部队 Cipher code protection method based on mapping drift technology
CN104143068B (en) * 2014-07-16 2017-10-17 宇龙计算机通信科技(深圳)有限公司 Method of password authentication and system
CN105488365B (en) * 2014-09-16 2020-01-24 阿里巴巴集团控股有限公司 Verification method and device
CN105656844A (en) * 2014-11-12 2016-06-08 江苏威盾网络科技有限公司 Method for preventing network hacker from stealing password
CN104504316A (en) * 2014-12-04 2015-04-08 英业达科技有限公司 Login system and method thereof for integrating verification codes and passwords
WO2017028241A1 (en) * 2015-08-18 2017-02-23 赵政荣 Dual-password authentication unlocking method, and portable safe
CN105373921A (en) * 2015-10-13 2016-03-02 中国银联股份有限公司 Method and system for inputting identity information relative to transaction data
JP6551352B2 (en) * 2016-09-28 2019-07-31 京セラドキュメントソリューションズ株式会社 Password authentication device
CN107506653B (en) * 2017-07-17 2020-11-24 深圳前海微众银行股份有限公司 Password management method, device and computer readable storage medium
CN108229186A (en) * 2017-12-28 2018-06-29 深圳天珑无线科技有限公司 Verification method, verification system and electronic equipment
CN116580487B (en) * 2023-07-14 2023-09-26 深圳市旭子科技有限公司 Password information security management method and object interlocking management system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1848726A (en) * 2005-04-15 2006-10-18 王岳 Dynamic identifying method
CN101291225A (en) * 2007-04-27 2008-10-22 丁洪涛 Authentication method adopting complex cryptographic technique
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1848726A (en) * 2005-04-15 2006-10-18 王岳 Dynamic identifying method
CN101291225A (en) * 2007-04-27 2008-10-22 丁洪涛 Authentication method adopting complex cryptographic technique
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method

Also Published As

Publication number Publication date
CN101604366A (en) 2009-12-16

Similar Documents

Publication Publication Date Title
CN101604366B (en) Password separate dynamic verification method and system
CN103944722B (en) Identification method for user trusted behaviors under internet environment
CN104464117B (en) Based on dynamic two-dimension code ATM (automatic teller machine) withdrawal method and system
CN106503589A (en) The method of calibration of block chain Transaction Information correctness, apparatus and system
CN102158488B (en) Dynamic countersign generation method and device and authentication method and system
CN101252439A (en) System and method for increasing information safety equipment security
CN107592308A (en) A kind of two server multiple-factor authentication method towards mobile payment scene
CN101895513A (en) Log-in authentication system for service website and implementation method
CN101562525A (en) Method, device and system for signature
CN101241572A (en) Electronic signing tool operation method and electronic signing tool
CN103888255A (en) Identity authentication method, device and system
CN101374149A (en) Method and system for preventing cipher from being stolen
CN101236675A (en) Method for checking bank terminal equipment legitimacy by user mobile phones SMS
US20100268754A1 (en) Method and System for Electronic Delivery of Essential Mail Items
CN101316166A (en) Dynamic password identity authentication method based on accidental character set
CN106713370A (en) Identity authentication method, server and mobile terminal
CN107819571A (en) The generation method and device of private key
CN1889421A (en) Account number protecting apparatus and method
CN106572082A (en) Approval signature verifying method, mobile device, terminal device and system
CN102025506A (en) User authentication method and device
CN105989259B (en) User ID authentication method, apparatus and system
CN106850693A (en) The method and real-name authentication system of a kind of real-name authentication
CN106204952A (en) Self-service move back X 2 method and self-service move back card system
CN110175439A (en) User management method, device, equipment and computer readable storage medium
CN104657860A (en) Mobile banking security authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent for invention or patent application
CB02 Change of applicant information

Address after: 528400 No. three Xin Road 92, triangle town, Guangdong, Zhongshan

Applicant after: Zhongshan Iker Digital Technology Co., Ltd.

Address before: 528400 No. three Xin Road 92, triangle town, Guangdong, Zhongshan

Applicant before: Zhongshan Aike Digital Technology Co., Ltd.

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: ZHONGSHAN AIKE DIGITAL TECHNOLOGY CO., LTD. TO: ZHONGSHAN IKER DIGITAL TECHNOLOGY CO., LTD.

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130306

Termination date: 20180713

CF01 Termination of patent right due to non-payment of annual fee