CN102316120A - Dynamic password lock based on network privacy protection - Google Patents

Dynamic password lock based on network privacy protection Download PDF

Info

Publication number
CN102316120A
CN102316120A CN201110313944A CN201110313944A CN102316120A CN 102316120 A CN102316120 A CN 102316120A CN 201110313944 A CN201110313944 A CN 201110313944A CN 201110313944 A CN201110313944 A CN 201110313944A CN 102316120 A CN102316120 A CN 102316120A
Authority
CN
China
Prior art keywords
user
password
rule
dynamic password
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201110313944A
Other languages
Chinese (zh)
Inventor
康海燕
陈宇航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Information Science and Technology University
Original Assignee
Beijing Information Science and Technology University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Information Science and Technology University filed Critical Beijing Information Science and Technology University
Priority to CN201110313944A priority Critical patent/CN102316120A/en
Publication of CN102316120A publication Critical patent/CN102316120A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a dynamic password lock based on network privacy protection, which is a dynamic password identification mechanism based on a challenge/response method. On the basis of a certain algorithm, during registration, a user randomly selects an algorithm rule and keeps the rule in mind to replace the past static password for direct registration; and during logging in, the user uses the registered algorithm rule and verification codes (random numbers) provided by a server to conduct simple calculation, a calculation result is used as password input at the time and therefore the goal of dynamic safe identification is achieved. The dynamic password lock based on the network privacy protection is characterized in that on the premise that privacy security is guaranteed, password dynamism can be realized without requiring third parties or any additional equipment and the privacy of the user can be prevented from being disclosed. According to experiments, the technique is safe, reliable, simple and convenient to use and the application cost is very low. The dynamic password lock based on the network privacy protection can be widely used in network systems for banks, social insurance, automatic teller machines, personal credit acquisition and the like which require network servers for logging in. The dynamic password lock based on the network privacy protection belongs to the technical field of communication and computers.

Description

The dynamic puzzle-lock of secret protection Network Based
Technical field
Communication under this invention, field of computer technology.
Background technology
At present on the network main popular be static password or hardware based dynamic password.Static password technology easy crack, and hardware based dynamic password is technological, relies on external equipment or third party's authentication, then reduces convenient degree greatly, cost is higher simultaneously.
Summary of the invention
In order to overcome the deficiency of existing dynamic password technology; Dynamic puzzle-lock ID authentication mechanism based on challenge-response has been proposed; Solved by the third party in the inconvenience of communicating by letter, carry, aspect such as external security being brought, utilized client and server two sides can reach dynamic authentication fully, prevent the purpose that privacy of user is revealed.
This invention solves the technical scheme that its technical problem adopted: the algorithm with certain is the basis.During registration; Optional algorithmic rule of user and memory; The static password that replaces is in the past directly registered, and during login, the user utilizes the identifying code that algorithmic rule and server provided (random number) of registration to carry out simple operation; And with operation result as the input of this password, reach dynamically, the purpose of safety identification authentication.
The principles of science of technical scheme institute foundation: the dynamic password lock mechanism based on secret protection is the password of change, and its change derives from the operational factor that produces password and changes.The generation factor of dynamic password generally all adopts two operational factors (Two Factors): one of which is user's privately owned password (rule).The identification code of its representative of consumer identity is changeless.Its two, be the change factor.Change the continuous variation of the factor just, just produced the dynamic password of continuous variation.
The invention has the beneficial effects as follows, under the prerequisite that guarantees personal secrets, need not any optional equipment of tyre and just can realize the password mobilism, prevent the privacy of user leakage.
Description of drawings
Below in conjunction with accompanying drawing and instance the present invention is further specified.
Fig. 1 is based on the dynamic puzzle-lock structure chart of network privacy protection.
Fig. 2 is a registration selection algorithm instance graph.
Among Fig. 1, constitute by client and server.Wherein, client comprises login and registration; Server end comprises random number mechanism, decrypts information, login calculating, registration requirement, user's algorithms library, user management storehouse and encryption rule storehouse etc.
Among Fig. 2, comprise information such as two algorithms (operation rule, shift rule), user name.
Embodiment
In Fig. 1, user's registration, concrete steps are following:
(1) user is at client-requested visit (registration) server.Server guarantees to be in opening, keeps at any time monitoring, and waits for user's connection.
(2) server returns enrollment page.
(3) user fills in log-on message, encryption, and sends to server.
The user fills in log-on message in client, comprises routine information (user name etc.) and specific information---" selection algorithm ".In order to prevent to register user name and registration algorithm the two be exposed to screen fully, thereby cause the password theft means of screen record, this program is designed to " * " type implicit expression with the input of user name, and reduces the mistake of user name with twice input.
Selection algorithm (like operation rule, shift rule) in operation rule, is set a certain or several and is added 5, then when login, random number (identifying code) R corresponding positions is added 5, and delivery is password.If the crypto-operation method when not wanting to use above rule as login, then operation rule is selected "+0 "; Shift rule, can select does not have displacement.Again upload the personalized algorithm of oneself, and select.
Client sends to server after log-on message is encrypted.
(4) return the registration feedback.
Server is deciphered after receiving information, deposits in the background data base according to user name then.Whether database detects registered user name automatically has repetition.If repeat then to show that registration is unsuccessful, return enrollment page then and rewrite information.If do not repeat, then show and succeed in registration, jump to login page after the affirmation.
In Fig. 1, username and password is mainly imported in user's login.The algorithmic rule of selecting when password is registered by identifying code and user dynamically generates.Concrete steps are following:
(1) user is at client-requested visit (login) server.Server guarantees to be in opening, keeps at any time monitoring, and waits for user's connection.
(2) server returns login page.Simultaneously, server returns to a random number of client (identifying code) R, and temporarily preserves this random number (identifying code) R.
(3) user's filling login information, encryption automatically, and send to server.
After the user has inputed user name, need to draw corresponding password d according to the algorithmic rule f (x) in random number (identifying code) R and oneself memory; And input, in operation rule, set a certain position and add 5; Then when login, random number (identifying code) R corresponding positions is added 5, delivery is password.Client is carried out irreversible MD5 computing to password and is encrypted for guaranteeing TRANSEC transmission security, becomes M (x) and passes to server together with user name.
(4) return the login feedback.
Server finds the corresponding algorithm of this user and utilizes this algorithm to random number (identifying code) R according to user name after receiving information in database, carry out computing and draw f ' (x), then f ' (x) is also carried out the MD5 computing and draws M ' (x).Server (x) judges whether allow this user's login through contrast M (x) and M ', and returns the login feedback.
In Fig. 2, comprise information such as two algorithms (operation rule, shift rule), user name at present.The supposing the system password is 6.
Algorithm 1, operation rule: mainly comprise+,-, * ,/.For example, addition rule, the user can select to do add operation on the meaning in office position, promptly on random number (identifying code) R basis, carries out the add operation of corresponding positions, and the corresponding positions operation result is during greater than 9 (decimal numbers), delivery.In like manner the user can select to do computings such as subtraction, multiplication and division on the meaning in office position, and the corresponding positions operation result is greater than 9 or during less than 0 (decimal number), and delivery is as shown in Figure 2.
Arthmetic statement:
/ * calculates according to user's operation rule, and it is correct to return 1 password; Return 0 password mistake */
int?Algorithm?l(User,Password,R){
/ * R be random number (identifying code) * that produces of system/
(1) 6 random number R is split as 61 figure places; // (supposing 6 passwords here)
Parameter when (2) from the user management storehouse, finding the user to register (comprising operation rule, computing parameter) according to user User;
(3) according to the parameter in (2), to bits per inch computing successively, greater than 9 or less than 0 o'clock, modulo operation;
(4) 6 numbers are reassembled as one 6 figure place R ';
(5) R ' compares with Password, then returns 1 as if identical, otherwise returns 0.
}
Algorithm 2, shift rule: can select to the X position that moves to left, operations such as X position, inverted order move right.If to the X position that moves to left, the right side is the circulation polishing, or with 0 or other digital polishing, the user can select.As shown in Figure 2.
Arthmetic statement:
/ * calculates according to the shift rule that the user selects, and it is correct to return 1 password; Return 0 password mistake */
int?Algorithm2(User,Password,R){
/ * R be random number (identifying code) * that produces of system/
(1) 6 random numbers is split as 61 figure places; // (supposing 6 passwords here)
Parameter when (2) from the user management storehouse, finding the user to register (comprising operation rule, computing parameter) according to user User;
(3) according to the parameter in (2), be shifted;
(4) 6 numbers are reassembled as one 6 figure place R ';
(5) R ' compares with Password, then returns 1 as if identical, otherwise returns 0.
}

Claims (3)

1. the dynamic puzzle-lock of a secret protection Network Based is based on the dynamic password ID authentication mechanism of challenge-response mode, and it is characterized in that: during registration, the static password that the user selects an algorithmic rule to replace is in the past directly registered; During login, the user utilizes the identifying code that algorithmic rule and server provided (random number) of registration to carry out computing, and operation result is imported as this password.
2. the dynamic puzzle-lock of secret protection Network Based according to claim 1 is characterized in that: during registration, the static password that the optional algorithmic rule of user replaces is in the past directly registered, and algorithmic rule freely is selected by the user, and remembers.
3. the dynamic puzzle-lock of secret protection Network Based according to claim 1; It is characterized in that: during login; The user utilizes the identifying code that algorithmic rule and server provided (random number) of registration to carry out computing; And with operation result as the input of this password, can reach dynamically, the purpose of safety identification authentication.
CN201110313944A 2011-10-17 2011-10-17 Dynamic password lock based on network privacy protection Pending CN102316120A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110313944A CN102316120A (en) 2011-10-17 2011-10-17 Dynamic password lock based on network privacy protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110313944A CN102316120A (en) 2011-10-17 2011-10-17 Dynamic password lock based on network privacy protection

Publications (1)

Publication Number Publication Date
CN102316120A true CN102316120A (en) 2012-01-11

Family

ID=45428936

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110313944A Pending CN102316120A (en) 2011-10-17 2011-10-17 Dynamic password lock based on network privacy protection

Country Status (1)

Country Link
CN (1) CN102316120A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609646A (en) * 2012-01-20 2012-07-25 华为终端有限公司 Information protection method, information protection device and terminal equipment
CN104320767A (en) * 2014-11-10 2015-01-28 吴东辉 Short message verification system and method
CN104378199A (en) * 2014-12-05 2015-02-25 珠海格力电器股份有限公司 Dynamic password generating method and system and dynamic password generator of unit
CN104767863A (en) * 2014-01-06 2015-07-08 腾讯科技(深圳)有限公司 Terminal screen unlocking method and terminal
CN106534170A (en) * 2016-12-06 2017-03-22 北京金和网络股份有限公司 Smart registration method capable of recognition of registration information source
CN107426163A (en) * 2017-05-10 2017-12-01 深圳天珑无线科技有限公司 A kind of method and device of encryption
CN107590372A (en) * 2017-09-06 2018-01-16 叶进蓉 Touch-screen encrypts unlocking method and device
CN107733650A (en) * 2016-08-11 2018-02-23 中国二十冶集团有限公司 The dynamic setting method of account password
CN108205781A (en) * 2017-09-07 2018-06-26 新疆惠恩金融服务有限公司 Internet Electronic Finance authentification of message system
CN108537038A (en) * 2018-03-22 2018-09-14 平安科技(深圳)有限公司 Custom rule cipher management method, device, terminal device and storage medium
CN108833439A (en) * 2018-07-18 2018-11-16 上海掌门科技有限公司 A kind of authentication method based on dynamic password, equipment and storage medium
CN109347835A (en) * 2018-10-24 2019-02-15 苏州科达科技股份有限公司 Information transferring method, client, server and computer readable storage medium
CN113158171A (en) * 2021-05-26 2021-07-23 成都优信创展信息技术有限公司 Verification code generation method, verification code authentication method, electronic device, and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1929475A (en) * 2005-09-09 2007-03-14 乐金电子(昆山)电脑有限公司 SyncML protocol based identification method
CN1980127A (en) * 2005-12-08 2007-06-13 中国银联股份有限公司 Command identifying method and command identifying method
CN101023626A (en) * 2004-07-20 2007-08-22 高通股份有限公司 Controlling and managing access to multiple networks
CN101174942A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Method and system for implementing cryptographic key protection
CN101577917A (en) * 2009-06-16 2009-11-11 深圳市星龙基电子技术有限公司 Safe dynamic password authentication method based on mobile phone
CN102177695A (en) * 2008-08-07 2011-09-07 爱立信电话股份有限公司 Method and apparatus for creating an instance ID based on a unique device identifier
CN102185863A (en) * 2011-05-13 2011-09-14 北京瑞信在线系统技术有限公司 Intelligent data interactive publishing system and method between server and client

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101023626A (en) * 2004-07-20 2007-08-22 高通股份有限公司 Controlling and managing access to multiple networks
CN1929475A (en) * 2005-09-09 2007-03-14 乐金电子(昆山)电脑有限公司 SyncML protocol based identification method
CN1980127A (en) * 2005-12-08 2007-06-13 中国银联股份有限公司 Command identifying method and command identifying method
CN101174942A (en) * 2006-10-31 2008-05-07 华为技术有限公司 Method and system for implementing cryptographic key protection
CN102177695A (en) * 2008-08-07 2011-09-07 爱立信电话股份有限公司 Method and apparatus for creating an instance ID based on a unique device identifier
CN101577917A (en) * 2009-06-16 2009-11-11 深圳市星龙基电子技术有限公司 Safe dynamic password authentication method based on mobile phone
CN102185863A (en) * 2011-05-13 2011-09-14 北京瑞信在线系统技术有限公司 Intelligent data interactive publishing system and method between server and client

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609646A (en) * 2012-01-20 2012-07-25 华为终端有限公司 Information protection method, information protection device and terminal equipment
CN104767863A (en) * 2014-01-06 2015-07-08 腾讯科技(深圳)有限公司 Terminal screen unlocking method and terminal
WO2015101354A1 (en) * 2014-01-06 2015-07-09 Tencent Technology (Shenzhen) Company Limited Method for unlocking terminal screen and terminal
US10530921B2 (en) 2014-01-06 2020-01-07 Tencent Technology (Shenzhen) Company Limited Method for unlocking terminal screen and terminal
CN104767863B (en) * 2014-01-06 2018-11-09 腾讯科技(深圳)有限公司 The unlocking method and terminal of terminal screen
CN104320767A (en) * 2014-11-10 2015-01-28 吴东辉 Short message verification system and method
CN104378199A (en) * 2014-12-05 2015-02-25 珠海格力电器股份有限公司 Dynamic password generating method and system and dynamic password generator of unit
CN107733650A (en) * 2016-08-11 2018-02-23 中国二十冶集团有限公司 The dynamic setting method of account password
CN106534170A (en) * 2016-12-06 2017-03-22 北京金和网络股份有限公司 Smart registration method capable of recognition of registration information source
CN107426163A (en) * 2017-05-10 2017-12-01 深圳天珑无线科技有限公司 A kind of method and device of encryption
CN107590372A (en) * 2017-09-06 2018-01-16 叶进蓉 Touch-screen encrypts unlocking method and device
CN108205781A (en) * 2017-09-07 2018-06-26 新疆惠恩金融服务有限公司 Internet Electronic Finance authentification of message system
CN108537038A (en) * 2018-03-22 2018-09-14 平安科技(深圳)有限公司 Custom rule cipher management method, device, terminal device and storage medium
WO2019178981A1 (en) * 2018-03-22 2019-09-26 平安科技(深圳)有限公司 Password management method and device employing customized rules, terminal apparatus, and storage medium
CN108833439A (en) * 2018-07-18 2018-11-16 上海掌门科技有限公司 A kind of authentication method based on dynamic password, equipment and storage medium
CN108833439B (en) * 2018-07-18 2020-11-03 上海掌门科技有限公司 Authentication method, equipment and storage medium based on dynamic password
CN109347835A (en) * 2018-10-24 2019-02-15 苏州科达科技股份有限公司 Information transferring method, client, server and computer readable storage medium
CN109347835B (en) * 2018-10-24 2021-09-07 苏州科达科技股份有限公司 Information transmission method, client, server, and computer-readable storage medium
CN113158171A (en) * 2021-05-26 2021-07-23 成都优信创展信息技术有限公司 Verification code generation method, verification code authentication method, electronic device, and medium

Similar Documents

Publication Publication Date Title
CN102316120A (en) Dynamic password lock based on network privacy protection
Li et al. A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments
EP2166697B1 (en) Method and system for authenticating a user by means of a mobile device
Tsai Efficient multi-server authentication scheme based on one-way hash function without verification table
CN102148685B (en) Method and system for dynamically authenticating password by multi-password seed self-defined by user
Rezaeighaleh et al. New secure approach to backup cryptocurrency wallets
CN102685093A (en) Mobile-terminal-based identity authentication system and method
CN102804201A (en) Offline two-factor user authentication system, method thereforthereof, and program thereforthereof
CN102187619A (en) Authentication system
CN116318617B (en) Medical rescue material charity donation method based on RFID and blockchain
Li et al. Practical threshold multi-factor authentication
KR20120087095A (en) Apparatus and method for generating a realtime password and storage medium
CN103297237A (en) Identity registration method, identity authentication method, identity registration system, identity authentication system, personal authentication equipment and authentication server
CN104471892A (en) User access control based on a graphical signature
Rossudowski et al. A security privacy aware architecture and protocol for a single smart card used for multiple services
US11606196B1 (en) Authentication system for a multiuser device
Xie et al. Biometrics based authentication scheme for session initiation protocol
Borchert et al. Indirect NFC-login
CN203243360U (en) Identity registration system
KR101205391B1 (en) Method for inputting confirmation number using secret puzzle
Akram et al. A usable and secure two-factor authentication scheme
Lee et al. Cryptanalysis and improvement of an ECC-based password authentication scheme using smart cards
Liou Performance measures for evaluating the dynamic authentication techniques
US11949772B2 (en) Optimized authentication system for a multiuser device
Xu et al. OTP bidirectional authentication scheme based on MAC address

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120111