CN102316120A - Dynamic password lock based on network privacy protection - Google Patents
Dynamic password lock based on network privacy protection Download PDFInfo
- Publication number
- CN102316120A CN102316120A CN201110313944A CN201110313944A CN102316120A CN 102316120 A CN102316120 A CN 102316120A CN 201110313944 A CN201110313944 A CN 201110313944A CN 201110313944 A CN201110313944 A CN 201110313944A CN 102316120 A CN102316120 A CN 102316120A
- Authority
- CN
- China
- Prior art keywords
- user
- password
- rule
- dynamic password
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention relates to a dynamic password lock based on network privacy protection, which is a dynamic password identification mechanism based on a challenge/response method. On the basis of a certain algorithm, during registration, a user randomly selects an algorithm rule and keeps the rule in mind to replace the past static password for direct registration; and during logging in, the user uses the registered algorithm rule and verification codes (random numbers) provided by a server to conduct simple calculation, a calculation result is used as password input at the time and therefore the goal of dynamic safe identification is achieved. The dynamic password lock based on the network privacy protection is characterized in that on the premise that privacy security is guaranteed, password dynamism can be realized without requiring third parties or any additional equipment and the privacy of the user can be prevented from being disclosed. According to experiments, the technique is safe, reliable, simple and convenient to use and the application cost is very low. The dynamic password lock based on the network privacy protection can be widely used in network systems for banks, social insurance, automatic teller machines, personal credit acquisition and the like which require network servers for logging in. The dynamic password lock based on the network privacy protection belongs to the technical field of communication and computers.
Description
Technical field
Communication under this invention, field of computer technology.
Background technology
At present on the network main popular be static password or hardware based dynamic password.Static password technology easy crack, and hardware based dynamic password is technological, relies on external equipment or third party's authentication, then reduces convenient degree greatly, cost is higher simultaneously.
Summary of the invention
In order to overcome the deficiency of existing dynamic password technology; Dynamic puzzle-lock ID authentication mechanism based on challenge-response has been proposed; Solved by the third party in the inconvenience of communicating by letter, carry, aspect such as external security being brought, utilized client and server two sides can reach dynamic authentication fully, prevent the purpose that privacy of user is revealed.
This invention solves the technical scheme that its technical problem adopted: the algorithm with certain is the basis.During registration; Optional algorithmic rule of user and memory; The static password that replaces is in the past directly registered, and during login, the user utilizes the identifying code that algorithmic rule and server provided (random number) of registration to carry out simple operation; And with operation result as the input of this password, reach dynamically, the purpose of safety identification authentication.
The principles of science of technical scheme institute foundation: the dynamic password lock mechanism based on secret protection is the password of change, and its change derives from the operational factor that produces password and changes.The generation factor of dynamic password generally all adopts two operational factors (Two Factors): one of which is user's privately owned password (rule).The identification code of its representative of consumer identity is changeless.Its two, be the change factor.Change the continuous variation of the factor just, just produced the dynamic password of continuous variation.
The invention has the beneficial effects as follows, under the prerequisite that guarantees personal secrets, need not any optional equipment of tyre and just can realize the password mobilism, prevent the privacy of user leakage.
Description of drawings
Below in conjunction with accompanying drawing and instance the present invention is further specified.
Fig. 1 is based on the dynamic puzzle-lock structure chart of network privacy protection.
Fig. 2 is a registration selection algorithm instance graph.
Among Fig. 1, constitute by client and server.Wherein, client comprises login and registration; Server end comprises random number mechanism, decrypts information, login calculating, registration requirement, user's algorithms library, user management storehouse and encryption rule storehouse etc.
Among Fig. 2, comprise information such as two algorithms (operation rule, shift rule), user name.
Embodiment
In Fig. 1, user's registration, concrete steps are following:
(1) user is at client-requested visit (registration) server.Server guarantees to be in opening, keeps at any time monitoring, and waits for user's connection.
(2) server returns enrollment page.
(3) user fills in log-on message, encryption, and sends to server.
The user fills in log-on message in client, comprises routine information (user name etc.) and specific information---" selection algorithm ".In order to prevent to register user name and registration algorithm the two be exposed to screen fully, thereby cause the password theft means of screen record, this program is designed to " * " type implicit expression with the input of user name, and reduces the mistake of user name with twice input.
Selection algorithm (like operation rule, shift rule) in operation rule, is set a certain or several and is added 5, then when login, random number (identifying code) R corresponding positions is added 5, and delivery is password.If the crypto-operation method when not wanting to use above rule as login, then operation rule is selected "+0 "; Shift rule, can select does not have displacement.Again upload the personalized algorithm of oneself, and select.
Client sends to server after log-on message is encrypted.
(4) return the registration feedback.
Server is deciphered after receiving information, deposits in the background data base according to user name then.Whether database detects registered user name automatically has repetition.If repeat then to show that registration is unsuccessful, return enrollment page then and rewrite information.If do not repeat, then show and succeed in registration, jump to login page after the affirmation.
In Fig. 1, username and password is mainly imported in user's login.The algorithmic rule of selecting when password is registered by identifying code and user dynamically generates.Concrete steps are following:
(1) user is at client-requested visit (login) server.Server guarantees to be in opening, keeps at any time monitoring, and waits for user's connection.
(2) server returns login page.Simultaneously, server returns to a random number of client (identifying code) R, and temporarily preserves this random number (identifying code) R.
(3) user's filling login information, encryption automatically, and send to server.
After the user has inputed user name, need to draw corresponding password d according to the algorithmic rule f (x) in random number (identifying code) R and oneself memory; And input, in operation rule, set a certain position and add 5; Then when login, random number (identifying code) R corresponding positions is added 5, delivery is password.Client is carried out irreversible MD5 computing to password and is encrypted for guaranteeing TRANSEC transmission security, becomes M (x) and passes to server together with user name.
(4) return the login feedback.
Server finds the corresponding algorithm of this user and utilizes this algorithm to random number (identifying code) R according to user name after receiving information in database, carry out computing and draw f ' (x), then f ' (x) is also carried out the MD5 computing and draws M ' (x).Server (x) judges whether allow this user's login through contrast M (x) and M ', and returns the login feedback.
In Fig. 2, comprise information such as two algorithms (operation rule, shift rule), user name at present.The supposing the system password is 6.
Algorithm 1, operation rule: mainly comprise+,-, * ,/.For example, addition rule, the user can select to do add operation on the meaning in office position, promptly on random number (identifying code) R basis, carries out the add operation of corresponding positions, and the corresponding positions operation result is during greater than 9 (decimal numbers), delivery.In like manner the user can select to do computings such as subtraction, multiplication and division on the meaning in office position, and the corresponding positions operation result is greater than 9 or during less than 0 (decimal number), and delivery is as shown in Figure 2.
Arthmetic statement:
/ * calculates according to user's operation rule, and it is correct to return 1 password; Return 0 password mistake */
int?Algorithm?l(User,Password,R){
/ * R be random number (identifying code) * that produces of system/
(1) 6 random number R is split as 61 figure places; // (supposing 6 passwords here)
Parameter when (2) from the user management storehouse, finding the user to register (comprising operation rule, computing parameter) according to user User;
(3) according to the parameter in (2), to bits per inch computing successively, greater than 9 or less than 0 o'clock, modulo operation;
(4) 6 numbers are reassembled as one 6 figure place R ';
(5) R ' compares with Password, then returns 1 as if identical, otherwise returns 0.
}
Algorithm 2, shift rule: can select to the X position that moves to left, operations such as X position, inverted order move right.If to the X position that moves to left, the right side is the circulation polishing, or with 0 or other digital polishing, the user can select.As shown in Figure 2.
Arthmetic statement:
/ * calculates according to the shift rule that the user selects, and it is correct to return 1 password; Return 0 password mistake */
int?Algorithm2(User,Password,R){
/ * R be random number (identifying code) * that produces of system/
(1) 6 random numbers is split as 61 figure places; // (supposing 6 passwords here)
Parameter when (2) from the user management storehouse, finding the user to register (comprising operation rule, computing parameter) according to user User;
(3) according to the parameter in (2), be shifted;
(4) 6 numbers are reassembled as one 6 figure place R ';
(5) R ' compares with Password, then returns 1 as if identical, otherwise returns 0.
}
Claims (3)
1. the dynamic puzzle-lock of a secret protection Network Based is based on the dynamic password ID authentication mechanism of challenge-response mode, and it is characterized in that: during registration, the static password that the user selects an algorithmic rule to replace is in the past directly registered; During login, the user utilizes the identifying code that algorithmic rule and server provided (random number) of registration to carry out computing, and operation result is imported as this password.
2. the dynamic puzzle-lock of secret protection Network Based according to claim 1 is characterized in that: during registration, the static password that the optional algorithmic rule of user replaces is in the past directly registered, and algorithmic rule freely is selected by the user, and remembers.
3. the dynamic puzzle-lock of secret protection Network Based according to claim 1; It is characterized in that: during login; The user utilizes the identifying code that algorithmic rule and server provided (random number) of registration to carry out computing; And with operation result as the input of this password, can reach dynamically, the purpose of safety identification authentication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110313944A CN102316120A (en) | 2011-10-17 | 2011-10-17 | Dynamic password lock based on network privacy protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110313944A CN102316120A (en) | 2011-10-17 | 2011-10-17 | Dynamic password lock based on network privacy protection |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102316120A true CN102316120A (en) | 2012-01-11 |
Family
ID=45428936
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110313944A Pending CN102316120A (en) | 2011-10-17 | 2011-10-17 | Dynamic password lock based on network privacy protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102316120A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102609646A (en) * | 2012-01-20 | 2012-07-25 | 华为终端有限公司 | Information protection method, information protection device and terminal equipment |
CN104320767A (en) * | 2014-11-10 | 2015-01-28 | 吴东辉 | Short message verification system and method |
CN104378199A (en) * | 2014-12-05 | 2015-02-25 | 珠海格力电器股份有限公司 | Dynamic password generating method and system and dynamic password generator of unit |
CN104767863A (en) * | 2014-01-06 | 2015-07-08 | 腾讯科技(深圳)有限公司 | Terminal screen unlocking method and terminal |
CN106534170A (en) * | 2016-12-06 | 2017-03-22 | 北京金和网络股份有限公司 | Smart registration method capable of recognition of registration information source |
CN107426163A (en) * | 2017-05-10 | 2017-12-01 | 深圳天珑无线科技有限公司 | A kind of method and device of encryption |
CN107590372A (en) * | 2017-09-06 | 2018-01-16 | 叶进蓉 | Touch-screen encrypts unlocking method and device |
CN107733650A (en) * | 2016-08-11 | 2018-02-23 | 中国二十冶集团有限公司 | The dynamic setting method of account password |
CN108205781A (en) * | 2017-09-07 | 2018-06-26 | 新疆惠恩金融服务有限公司 | Internet Electronic Finance authentification of message system |
CN108537038A (en) * | 2018-03-22 | 2018-09-14 | 平安科技(深圳)有限公司 | Custom rule cipher management method, device, terminal device and storage medium |
CN108833439A (en) * | 2018-07-18 | 2018-11-16 | 上海掌门科技有限公司 | A kind of authentication method based on dynamic password, equipment and storage medium |
CN109347835A (en) * | 2018-10-24 | 2019-02-15 | 苏州科达科技股份有限公司 | Information transferring method, client, server and computer readable storage medium |
CN113158171A (en) * | 2021-05-26 | 2021-07-23 | 成都优信创展信息技术有限公司 | Verification code generation method, verification code authentication method, electronic device, and medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1929475A (en) * | 2005-09-09 | 2007-03-14 | 乐金电子(昆山)电脑有限公司 | SyncML protocol based identification method |
CN1980127A (en) * | 2005-12-08 | 2007-06-13 | 中国银联股份有限公司 | Command identifying method and command identifying method |
CN101023626A (en) * | 2004-07-20 | 2007-08-22 | 高通股份有限公司 | Controlling and managing access to multiple networks |
CN101174942A (en) * | 2006-10-31 | 2008-05-07 | 华为技术有限公司 | Method and system for implementing cryptographic key protection |
CN101577917A (en) * | 2009-06-16 | 2009-11-11 | 深圳市星龙基电子技术有限公司 | Safe dynamic password authentication method based on mobile phone |
CN102177695A (en) * | 2008-08-07 | 2011-09-07 | 爱立信电话股份有限公司 | Method and apparatus for creating an instance ID based on a unique device identifier |
CN102185863A (en) * | 2011-05-13 | 2011-09-14 | 北京瑞信在线系统技术有限公司 | Intelligent data interactive publishing system and method between server and client |
-
2011
- 2011-10-17 CN CN201110313944A patent/CN102316120A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101023626A (en) * | 2004-07-20 | 2007-08-22 | 高通股份有限公司 | Controlling and managing access to multiple networks |
CN1929475A (en) * | 2005-09-09 | 2007-03-14 | 乐金电子(昆山)电脑有限公司 | SyncML protocol based identification method |
CN1980127A (en) * | 2005-12-08 | 2007-06-13 | 中国银联股份有限公司 | Command identifying method and command identifying method |
CN101174942A (en) * | 2006-10-31 | 2008-05-07 | 华为技术有限公司 | Method and system for implementing cryptographic key protection |
CN102177695A (en) * | 2008-08-07 | 2011-09-07 | 爱立信电话股份有限公司 | Method and apparatus for creating an instance ID based on a unique device identifier |
CN101577917A (en) * | 2009-06-16 | 2009-11-11 | 深圳市星龙基电子技术有限公司 | Safe dynamic password authentication method based on mobile phone |
CN102185863A (en) * | 2011-05-13 | 2011-09-14 | 北京瑞信在线系统技术有限公司 | Intelligent data interactive publishing system and method between server and client |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102609646A (en) * | 2012-01-20 | 2012-07-25 | 华为终端有限公司 | Information protection method, information protection device and terminal equipment |
CN104767863A (en) * | 2014-01-06 | 2015-07-08 | 腾讯科技(深圳)有限公司 | Terminal screen unlocking method and terminal |
WO2015101354A1 (en) * | 2014-01-06 | 2015-07-09 | Tencent Technology (Shenzhen) Company Limited | Method for unlocking terminal screen and terminal |
US10530921B2 (en) | 2014-01-06 | 2020-01-07 | Tencent Technology (Shenzhen) Company Limited | Method for unlocking terminal screen and terminal |
CN104767863B (en) * | 2014-01-06 | 2018-11-09 | 腾讯科技(深圳)有限公司 | The unlocking method and terminal of terminal screen |
CN104320767A (en) * | 2014-11-10 | 2015-01-28 | 吴东辉 | Short message verification system and method |
CN104378199A (en) * | 2014-12-05 | 2015-02-25 | 珠海格力电器股份有限公司 | Dynamic password generating method and system and dynamic password generator of unit |
CN107733650A (en) * | 2016-08-11 | 2018-02-23 | 中国二十冶集团有限公司 | The dynamic setting method of account password |
CN106534170A (en) * | 2016-12-06 | 2017-03-22 | 北京金和网络股份有限公司 | Smart registration method capable of recognition of registration information source |
CN107426163A (en) * | 2017-05-10 | 2017-12-01 | 深圳天珑无线科技有限公司 | A kind of method and device of encryption |
CN107590372A (en) * | 2017-09-06 | 2018-01-16 | 叶进蓉 | Touch-screen encrypts unlocking method and device |
CN108205781A (en) * | 2017-09-07 | 2018-06-26 | 新疆惠恩金融服务有限公司 | Internet Electronic Finance authentification of message system |
CN108537038A (en) * | 2018-03-22 | 2018-09-14 | 平安科技(深圳)有限公司 | Custom rule cipher management method, device, terminal device and storage medium |
WO2019178981A1 (en) * | 2018-03-22 | 2019-09-26 | 平安科技(深圳)有限公司 | Password management method and device employing customized rules, terminal apparatus, and storage medium |
CN108833439A (en) * | 2018-07-18 | 2018-11-16 | 上海掌门科技有限公司 | A kind of authentication method based on dynamic password, equipment and storage medium |
CN108833439B (en) * | 2018-07-18 | 2020-11-03 | 上海掌门科技有限公司 | Authentication method, equipment and storage medium based on dynamic password |
CN109347835A (en) * | 2018-10-24 | 2019-02-15 | 苏州科达科技股份有限公司 | Information transferring method, client, server and computer readable storage medium |
CN109347835B (en) * | 2018-10-24 | 2021-09-07 | 苏州科达科技股份有限公司 | Information transmission method, client, server, and computer-readable storage medium |
CN113158171A (en) * | 2021-05-26 | 2021-07-23 | 成都优信创展信息技术有限公司 | Verification code generation method, verification code authentication method, electronic device, and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102316120A (en) | Dynamic password lock based on network privacy protection | |
Li et al. | A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments | |
EP2166697B1 (en) | Method and system for authenticating a user by means of a mobile device | |
Tsai | Efficient multi-server authentication scheme based on one-way hash function without verification table | |
CN102148685B (en) | Method and system for dynamically authenticating password by multi-password seed self-defined by user | |
Rezaeighaleh et al. | New secure approach to backup cryptocurrency wallets | |
CN102685093A (en) | Mobile-terminal-based identity authentication system and method | |
CN102804201A (en) | Offline two-factor user authentication system, method thereforthereof, and program thereforthereof | |
CN102187619A (en) | Authentication system | |
CN116318617B (en) | Medical rescue material charity donation method based on RFID and blockchain | |
Li et al. | Practical threshold multi-factor authentication | |
KR20120087095A (en) | Apparatus and method for generating a realtime password and storage medium | |
CN103297237A (en) | Identity registration method, identity authentication method, identity registration system, identity authentication system, personal authentication equipment and authentication server | |
CN104471892A (en) | User access control based on a graphical signature | |
Rossudowski et al. | A security privacy aware architecture and protocol for a single smart card used for multiple services | |
US11606196B1 (en) | Authentication system for a multiuser device | |
Xie et al. | Biometrics based authentication scheme for session initiation protocol | |
Borchert et al. | Indirect NFC-login | |
CN203243360U (en) | Identity registration system | |
KR101205391B1 (en) | Method for inputting confirmation number using secret puzzle | |
Akram et al. | A usable and secure two-factor authentication scheme | |
Lee et al. | Cryptanalysis and improvement of an ECC-based password authentication scheme using smart cards | |
Liou | Performance measures for evaluating the dynamic authentication techniques | |
US11949772B2 (en) | Optimized authentication system for a multiuser device | |
Xu et al. | OTP bidirectional authentication scheme based on MAC address |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120111 |