CN108462571A - A method of generating Crypted password using dynamic digital - Google Patents
A method of generating Crypted password using dynamic digital Download PDFInfo
- Publication number
- CN108462571A CN108462571A CN201710119621.5A CN201710119621A CN108462571A CN 108462571 A CN108462571 A CN 108462571A CN 201710119621 A CN201710119621 A CN 201710119621A CN 108462571 A CN108462571 A CN 108462571A
- Authority
- CN
- China
- Prior art keywords
- password
- storage element
- dynamic digital
- digital
- accumulator
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of methods generating Crypted password using dynamic digital, particularly as being from the dynamic digital information of some unchanged rules, a kind of and/or several digital informations are selected, dynamic digital is extracted, the underlying parameter for generating Crypted password is calculated as platform end and user terminal.And by the preset of the dynamic digital, storage, cumulative, just obtaining multiple parameters, specific algorithm having been determined in conjunction with the password that client has submitted to platform, that is, original code, reselection, Crypted password is just appointed as by calculating acquired results.The password generated by this method is effective against interception of the pseudo-base station to information, effectively antagonizes and snatched password using high-tech means, and password encryption is made to have high security.
Description
Technical field
The present invention relates to password encryption field, specifically a kind of method for generating Crypted password using dynamic digital,
Background technology
Now due to pseudo-base station quantity increases, the payment risk for causing mobile payment field is increasing, this straight
Connect the cipher mode using agreement password, it is easy to password be caused to reveal;Another kind relies on the cipher mode of identifying code, due to being
Identifying code directly is copied word by word, once being intercepted by pseudo-base station, has also resulted in failed encryption.Although and scrambler and excellent shield encryption performance
It is good, but carrying is too inconvenient.There is an urgent need to one kind currently on the market, can effectively antagonize pseudo-base station, the theft of confrontation password and make
With convenient encryption method.
Invention content
The purpose of the present invention is to provide a kind of method generating Crypted password using dynamic digital, in solution
State the problem of being proposed in background technology.
To achieve the above object, the present invention provides the following technical solutions:
A method of Crypted password being generated using dynamic digital, particularly as being dynamic digital from some unchanged rules
In information, a kind of and/or several digital informations are selected, dynamic digital is extracted, calculated and generate as platform end and user terminal
The underlying parameter of Crypted password.And by the preset of the dynamic digital, storage, cumulative, multiple parameters just being obtained, in conjunction with visitor
The password that family has been submitted to platform, that is, original code, reselection determine specific algorithm, are just specified by calculating acquired results
For Crypted password.The specific method for calculating generation Crypted password is as follows:
S1:Cryptographic calculations generate the initialization of system;
a:The number of one group of aligned orderly is pre-set into dynamic digital storage element, and each number is compiled
Number.
b:Initial reading of the number as accumulator is determined at random.
C:The common each letter of computer, symbol are generated a number and corresponded at random, and list stores
This correspondence.
d:Take the rear n-bit character of original code, it is in situ to retain number therein, and according to the correspondence in the table,
Letter therein, symbol are converted into number in situ, this is formed by n bit digitals by original code conversion, is known as former number
Password.
e:The rear two digits for choosing former numerical ciphers, specify and are used as two reference numbers, and duplication is stored into reference number
In storage element.
f:The end number of former numerical ciphers is chosen as number, out of dynamic digital storage unit, finds out the number institute
Corresponding number, then the reading union the number and accumulator.
g:The reading union of number and accumulator most front-seat in dynamic digital storage element, again acquired results
It is stored into the most heel row that content has been deposited in dynamic digital storage element, then again the reading logic phase of the result and accumulator
Add;Most front-seat number in dynamic digital storage element, used primary rear just deleted, other numbers move forward one successively
Sequence;It recycles in such a way, until pre-set dynamic digital is all deleted.
h:Choose under current state in dynamic digital storage element rearmost number several, replicate to be stored into successively and replace
It changes in digital storage unit, as the number that can be recycled.
J:Choose foremost in dynamic digital storage element under current state number several, replicate successively be stored into it is tired
Add in device reading storage element.
K:To form each of former numerical ciphers number as number, under current state in dynamic digital storage element, look for
Go out the number corresponding to each number, replicates being stored into initialized cryptographic storage element successively, and number consecutively.
L:Whole Digital Logic in initialized cryptographic storage element are added, it is close that acquired results are known as the second number
Code.To form each of second numerical ciphers number as number, under current state in dynamic digital storage element, find out every
Number corresponding to a number replicates be stored into excessive phase password storage element successively.
S2:The storage of dynamic digital;After client receives the dynamic digital of platform end transmission, accumulator is detected first and is read
Whether several last one-bit digitals is identical as one of reference number, if it is different, the dynamic digital is then stored into dynamic digital storage
The most heel row of content has been deposited in memory cell.If identical, with number most front-seat in digital storage unit is replaced, replace current
Dynamic digital, which is deleted, then the replacement digital storage is arrived, and content has been deposited in dynamic digital storage element
Most heel row is just recycled to most heel row after most front-seat replacement number is previously used once.
By the obtained parameter of storage to dynamic digital, just become the ginseng of a past tense when calculating generation password
Number, the information that pseudo-base station is intercepted all is present tense, so it can not utilize the information intercepted to calculate password.
S3:The cumulative storage with accumulator readings of dynamic digital;An accumulator is exactly established, being stored into dynamic number
Each number in word storage element is all calculated with the reading of accumulator by the determining algorithm of selection, then the result of gained with
The form of accumulator readings preserves;Then it again the reading of the accumulator, is stored into accumulator readings storage element in having deposited
The most heel row held.
The reading of accumulator in this way is exactly a governed parameter changing, irregular.It is participated in by such dynamic parameter
The password generated is calculated, the difficulty that malice calculates password can be greatly improved.
S4:The generation of Crypted password;After completing dynamic digital storage and adding up, it is single that excessive phase password storage is detected first
Whether there is or not excessive phase passwords in first;If so, then first rear three bit digital of former numerical ciphers is repeated to write, a n bit digital is formed,
The obtained n bit digitals are just appointed as third password;Then it uses most front-seat digital, cumulative in dynamic digital storage element
In the reading of device, accumulator readings storage element number most front-seat in most front-seat digital, excessive phase password storage element and
Third password is calculated, acquired results are just appointed as this Crypted password as parameter by the determining specific algorithm of selection;Dynamically
Most front-seat digital and excessive phase password storage in most front-seat number, accumulator readings storage element in digital storage unit
Most front-seat number in unit is previously used primary rear just deleted.If no, just with most front-seat in dynamic digital storage element
Most front-seat digital and former numerical ciphers are as parameter in number, the reading of accumulator, accumulator readings storage element, by selection
Determining specific algorithm calculates, and acquired results are just appointed as this Crypted password.It is most front-seat in dynamic digital storage element
Number, number most front-seat in accumulator readings storage element, be previously used it is primary after, be just deleted, other numbers are successively
Move forward a sequence.
Introduce transitional period password, be in order to prevent in initial phase, dynamic digital preset to user terminal from platform end,
Once these data are intercepted by pseudo-base station, then the most preceding Crypted password several times after the completion of initialization, it is possible to be deduced
Come;The method that transitional period password generates, determines its unpredictability, also ensures that mistake after the completion of initialization in this way
It crosses in the phase, the safety of Crypted password;Since within the entire transitional period, pseudo-base station intercepts the probability very little of all information, therefore in mistake
The ciphering process crossed after the phase is also safe.
Introduce and replace number, be in order to prevent under extreme case, client in a long time all information by malicious intercepted, this
Sample is possible to calculate password.It introduces after replacing number, it is this to be just not present.
As the further scheme of the present invention, the dynamic digital information can be:The identifying code that platform is sent;In platform
The upper random code for completing to send when an action;Time when completing an action on platform;It is produced during system operations
Raw intermediate result;The amount of money of success payment;The quantity and/or weight of commodity are bought in success.
As the further scheme of the present invention, the method that above-mentioned calculating generates password is compiled into software, client is institute
It states on software download to mobile phone, that is, cell phone application, platform end and client are all calculated using the software and generate password;Only
Unlike one, platform end uses former numerical ciphers as one of the parameter for generating password, the password institute that cell phone application is inputted with client
The numerical ciphers being converted into, as one of the parameter for generating password;It is dynamic when basic information when system initialization, normal operation
State number, is to be sent to client by platform end.The dynamic digital information specifically selected is identifying code;Select the specific of determination
Algorithm is to participate in the parameter logistics calculated addition and/or logical multiplication each;Choose rear six character, that is, n=of original code
6, it is converted into former numerical ciphers.After cell phone application receives the identifying code of platform end transmission, it is pre- that identifying code is first stored into identifying code
In storage element, APP starts to work after client inputs password;The password of input is converted into numerical ciphers first, then presses institute
It states method and calculates generation new password.The password that generation is calculated in cell phone application is submitted to platform end by client, if being generated with platform end
Password it is identical, then be considered as and pass through.
The results code is exactly after platform end receives client input password application, to a long number of client transmission
Word, typically six bit digitals;The union and/or logical multiplication are exactly with a position the number for participating in calculating to a
Position, ten to ten ... mode align addition and/or multiplication, the result of calculation on every only retains an a position;
As the further scheme of the present invention, after the APP receives identifying code, in the case of use not yet, and receive
Identifying code has been arrived, at this moment just identifying code is arranged in order and is stored in identifying code pre-stored unit, after client inputs password, has been pressed
It is described to calculate the method for generating password, the password that the identifying code first received is generated, but not output password are calculated successively;Until making
With the identifying code being currently received, that is, in identifying code pre-stored unit when the last one identifying code, then output password;Identifying code
Identifying code in pre-stored unit is previously used primary rear i.e. deleted.
As the further scheme of the present invention, when platform end has sent identifying code, and client does not receive, in this way with
The password of generation is calculated afterwards, just will appear the inconsistent situation of password that platform end and client generate, at this moment will be applied pair
System is initialized.After platform receives the initialization application of client, just a digital number, APP are sent to client
Out of initialized cryptographic storage element, the number corresponding to the digital number is found out, the number and former numerical ciphers logic is used in combination
It is added, acquired results are just appointed as the password of application initialization.The password is submitted to platform end by client, if being calculated with platform end
The password of generation is identical, is considered as and passes through.
As the further scheme of the present invention, apply for the method to system initialization, platform end and visitor can also be used
The method for the modification original code that family end has been arranged.
The invention has the advantages that original code makes the encryption method and currently popular agreement as calculating parameter
The encryption method of password has good compatibility, and in the case where mobile phone is lost, other people also can not malicious operation;Due to
Original code is not transmitted in client and platform end, is effectively reduced the risk of password leakage.
Description of the drawings
Below in conjunction with attached drawing, the present invention is further illustrated
One group of identifying code that platform is sent to client when Fig. 1 is initialization;
The common letter of computer, symbol and random pair for generating number that platform is sent to client when Fig. 2 is initialization
According to table;
Fig. 3 is that reference number stores table;
Fig. 4 is the interior identifying code stored of identifying code storage element after being computed;
Fig. 5 is to replace digital storage table;
Fig. 6 is that initialized cryptographic stores table;
Fig. 7 is that excessive phase password stores table;
Fig. 8 is that accumulator readings store table
Specific implementation mode
Embodiment 1
The password that client has been filed on to platform end is ab7de3gh,.After client has downloaded the App from platform, platform
It holds and is had sent in one group of identifying code to identifying code storage element to the APP, as shown in Figure 1;Have sent the common letter of computer,
Symbol and the table of comparisons of number are as shown in Figure 2;The accumulator truth of a matter of transmission is " 536178 ".
Rear six " 7de3gh " for taking original code, it is former obtained from converted according to the correspondence on the table of comparisons
Numerical ciphers are " 752302 ";
Former numerical ciphers " 752302 " final two digits " 0 ", " 2 " are taken, are stored into reference number storage element, such as Fig. 3
It is shown;
Former numerical ciphers end digital " 2 " is chosen as number, the number corresponding to number " 2 " from Fig. 1
Reading " 536178 " union of " 346588 " and accumulator:
346588
536178
______
872656
The reading of accumulator reforms into " 872656 ".
Number " 552123 " most front-seat in identifying code storage element, reading " 872656 " logic phase with accumulator
Add:
872656
552123
______
324779
Acquired results " 324779 " are stored into most heel row in identifying code storage element, then again the result and logic device
Reading union.Most front-seat number " 552123 " in identifying code storage element, it is used primary rear i.e. deleted.
It recycles, is deleted until the identifying code shown in FIG. 1 that platform is sent is whole, at this moment identifying code successively by above-mentioned algorithm
The deposited content of storage element becomes as shown in figure 4, the reading of accumulator becomes:“712502”.
Under current state in identifying code storage element, rearmost ten numbers are copied to replacement digital storage successively
In unit, as shown in Figure 5.
Six numbers 7,5,2,3,0,2 to form former numerical ciphers " 752302 " are number, from current state under verify
In code storage element, finding out corresponding number is:153152,741563,782341,563987,324779,782341, according to
It is secondary to be stored into initialized cryptographic storage element, and each digital number is given, as shown in Figure 6.
Six in initialized cryptographic storage element digital unions,
153152
741536
782341
563987
324779
782341
______
035816
So the second password is exactly:035816.It is to number corresponding six with form the second password 0,3,5,8,1,6
Number is respectively:324779,563987,714536,963621,712501,528971, this six numbers were stored into successively
It spends in phase password storage element, as shown in Figure 7.
Under current state in identifying code storage element, ten numbers of foremost, replicates be stored into accumulator successively
It reads in storage element, as shown in Figure 8.
After the completion of the initialization of cell phone application, the identifying code received for the first time is 176588, it is stored into identifying code first
In pre-stored unit, after client inputs original code ab7de3gh, 7de3gh according to Fig. 2 tables of comparisons, is converted to original by the APP
Numerical ciphers are " 752302 ";It detects in reading " 712502 " end digital " 2 " and reference number storage element of accumulator
One of number " 2 " is consistent, therefore testing of receiving is replaced with number " 326536 " most front-seat in the digital storage element of cycle
Code " 176588 " is demonstrate,proved, and " 326532 " are stored into the most heel row in identifying code storage element, then with " 326536 " and current shape
Reading " 712502 " union of accumulator under state:
326536
712502
______
038038
So when accumulator reading become 038038;Then it is stored into accumulator readings storage element 038038 again
The most heel row of content is deposited.
It detects in excessive phase password storage element and has number, then rear three numbers weight of former numerical ciphers " 752302 "
Manifolding, obtained third password is exactly " 302302 ";Again " 324779 " most front-seat in identifying code storage element, accumulator
Reading " 038038 ", number " 324779 " most front-seat in excessive phase password storage element, in accumulator readings storage element
Most front-seat number " 324779 " and the digital union of five, third password " 302302 ":
324779
324779
038038
324779
302302
______
292447
So " 292447 " are exactly current Crypted password.Most front-seat " 324779 " in identifying code storage element, excessively
Most front-seat number " 324779 ", quilt in most front-seat " 324779 " in phase password storage element, accumulator readings storage element
It is used it is primary after be all deleted.
After 7th time receives identifying code and store, detecting in excessive phase password storage element has not had number, just with verification
Most front-seat number in code storage element, the reading of accumulator, former numerical ciphers union, acquired results be exactly encrypt it is close
Code.
Embodiment 2
The identifying code that cell phone application is currently received is " 321578 ", had in identifying code pre-stored unit " 256381 ",
" 659817 " two identifying codes;After client inputs original code ab7de3gh, original code is converted to former numerical ciphers by the APP
It is most front-seat " 256381 " to be calculated generation password according to the method for generating password is calculated first, but do not show after " 752302 "
Show password, " 256381 " are previously used primary rear i.e. deleted;" 659817 " are calculated according to the method for generating password is calculated again
Password is generated, does not still show password, " 659817 " are also deleted after being previously used once;In identifying code pre-stored unit only
When identifying code " 321578 " being currently received, is calculated according to the method for calculating generation password after generating password, show the close of generation
Code;" 321578 " are also deleted after being previously used once.
Embodiment 3
Client submits the password generated to platform, cannot all pass through several times, is at this moment just generated to platform application to password
System initialization;Platform end has sent the information of " 5 " to client, after cell phone application receives information, is just stored in initialized cryptographic
In unit, finding out the number corresponding to number " 5 " is:" 324779 ", after client inputs original code ab7de3gh, the APP handles
It is " 752302 " that original code, which is converted to former numerical ciphers, then " 324779 " with former numerical ciphers " 752302 " union:
324779
752302
______
076071
Acquired results " 076071 " are exactly the password of application initialization." 076071 " is submitted to platform end, experience by client
Card is passed through.
Claims (10)
1. a kind of method generating Crypted password using dynamic digital, it is characterized in that:From the dynamic digital of some unchanged rules
In information, a kind of and/or several digital informations are selected, dynamic digital is extracted, calculated and generate as platform end and user terminal
The underlying parameter of Crypted password;And by the preset of the dynamic digital, storage, cumulative, multiple parameters just being obtained, in conjunction with visitor
The password that family has been submitted to platform, that is, original code, reselection determine specific algorithm, are just specified by calculating acquired results
For Crypted password.
2. a method of Crypted password being generated using dynamic digital, it is characterized in that:The common each letter of computer, symbol
It all generates a number at random to correspond, and list stores this correspondence;
Then the rear n-bit character of original code is taken, it is in situ to retain number therein, and according to the correspondence in the list,
Alphabetical, symbol therein is converted into number in situ, this is formed by n bit digitals by original code conversion, and it is close to be known as former number
Code.
3. the method according to claim 1 for generating Crypted password using dynamic digital, it is characterized in that:System is generated to calculating
When system initialization:
a:The number of one group of aligned orderly is pre-set into dynamic digital storage element, and each number is numbered;
b:Initial reading of the number as accumulator is determined at random;
c:The rear two digits for choosing former numerical ciphers specify and are used as two reference numbers, and duplication is stored into reference number storage
In unit;
d:The end number of former numerical ciphers is chosen as number, out of dynamic digital storage unit, is found out corresponding to the number
Number, then the reading union the number and accumulator;
e:The reading union of number and accumulator most front-seat in dynamic digital storage element, acquired results are stored again
The most heel row of content is deposited in dynamic digital storage element, then again the reading union of the result and accumulator;It is dynamic
Most front-seat number in state digital storage unit, used primary rear just deleted, other numbers move forward one and sort successively,
It recycles in such a way, until pre-set dynamic digital is all deleted;
f:Rearmost digital several groups in dynamic digital storage element, replicate be stored into replacement number successively under selection current state
In word storage element, as the number that can be recycled;
g:Choose foremost in dynamic digital storage element under current state number several, replicate be stored into accumulator successively
It reads in storage element;
h:To form each of former numerical ciphers number as number, under current state in dynamic digital storage element, find out every
Number corresponding to a number replicates be stored into initialized cryptographic storage element successively, and number consecutively;
j:Whole Digital Logic in initialized cryptographic storage element are added, acquired results are known as the second numerical ciphers;With
Each of second numerical ciphers number is formed as number, under current state in dynamic digital storage element, finds out each volume
Number corresponding to number replicates be stored into excessive phase password storage element successively.
4. the method according to claim 1 for generating Crypted password using dynamic digital, it is characterized in that:When client receives
After the dynamic digital that platform is sent, the last one-bit digital for detecting accumulator readings first is no identical as one of reference number, if
Difference is then stored into the dynamic digital the most heel row that content has been deposited in dynamic digital storage element;If identical, with replacement number
That most front-seat number, replaces current dynamic digital, which is deleted, then the replacement in word storage element
Digital storage arrives, and the most heel row of content has been deposited in dynamic digital storage element and has just been recycled to after replacement number is previously used once
Most heel row.
5. the method according to claim 1 for generating Crypted password using dynamic digital, it is characterized in that:One is established to add up
Device is all calculated each number being stored into dynamic digital storage element by the determining algorithm of selection with the reading of accumulator,
The result of gained is preserved in the form of accumulator readings again;Then the reading of the accumulator is stored into accumulator readings again
The most heel row of content has been deposited in storage element.
6. the method according to claim 1 for generating Crypted password using dynamic digital, it is characterized in that:Complete dynamic number
Word store with it is cumulative after, detect in excessive phase password storage element that whether there is or not excessive phase passwords first;If so, then first former number
Rear three bit digital of password repeats to write, as soon as composition n bit digitals, the obtained n bit digitals are appointed as third password;Then
With most front-seat in the reading of most front-seat number, accumulator in dynamic digital storage element, accumulator readings storage element
Most front-seat number and third password are as parameter in digital, excessive phase password storage element, by the determining specific algorithm of selection
It calculates, acquired results are just appointed as this Crypted password;Most front-seat number, accumulator in dynamic digital storage element are read
Most front-seat number and number most front-seat in excessive phase password storage element, are just deleted after being previously used once in number storage element
It removes.If no, just with number most front-seat in dynamic digital storage element, reading, the accumulator readings storage element of accumulator
Inside most front-seat number and former numerical ciphers are calculated, acquired results are just appointed as parameter by the determining specific algorithm of selection
This Crypted password;It is most front-seat in most front-seat number, accumulator readings storage element in dynamic digital storage element
Number after being previously used once, is just deleted, and other numbers move forward one and sort successively.
7. the method according to claim 1 for generating Crypted password using dynamic digital, it is characterized in that:The dynamic digital
Information can be:The identifying code that platform is sent;The random code sent when completing an action on platform;One is completed on platform
Time when a action;Intermediate result caused by during system operations;The amount of money of success payment;Commodity are bought in success
Quantity and/or weight.
8. according to claim 2, claim 3, claim 4, claim 5, claim 6 and claim 7
The method for generating Crypted password using dynamic digital, it is characterized in that:The method that above-mentioned calculating generates password is compiled into software, visitor
Family is on the software download to mobile phone, that is, cell phone application, platform end and client all calculated using the software generate it is close
Code;Unlike unique, platform end uses former numerical ciphers as one of the parameter for generating password, and cell phone application is inputted with client
The numerical ciphers that password is converted into, as one of the parameter for generating password;Basic information, normal operation when system initialization
When dynamic digital, be that client is sent to by platform end;
The dynamic digital information specifically selected is identifying code;Selecting determining specific algorithm is, each parameter for participating in calculating
Union and/or logical multiplication;The rear six character, that is, n=6 for choosing original code, are converted into former numerical ciphers;Work as cell phone application
After the identifying code for receiving the transmission of platform end, first identifying code is stored into identifying code pre-stored unit, after client inputs password
APP starts to work;The password of input is converted into numerical ciphers first, then calculates generate new password according to the method;Client's handle
The password that generation is calculated in cell phone application is submitted to platform end, if identical as the password that platform end generates, be considered as and pass through;
The results code is exactly the long number sent to client after platform end receives client input password application,
Typically six bit digitals;The union and/or logical multiplication, be exactly participate in calculate number with a position to a position,
Ten to ten ... mode align addition and/or multiplication, the result of calculation on every only retains position.
9. the method according to claim 8 for generating Crypted password using dynamic digital, it is characterized in that:The APP is received
After identifying code, in the case of use not yet, and identifying code is received, at this moment just identifying code is arranged in order by order of receipt
It is stored in identifying code pre-stored unit;After client inputs password, by the method for calculating and generating password, calculate successively first
The password that the identifying code received is generated, but not output password;Until pre- using the identifying code being currently received, that is, identifying code
In storage element when the last one identifying code, then output password;After identifying code in identifying code pre-stored unit is previously used once
It is deleted.
10. the method according to claim 8 for generating Crypted password using dynamic digital, it is characterized in that:When platform end is sent out
Identifying code has been sent, and client does not receive, and calculates the password generated later in this way, just will appear platform end and is generated with client
The inconsistent situation of password, at this moment will apply initializing system;Detailed process is:When platform receives client
After initialization application, a digital number just is sent to client, APP finds out the number out of initialized cryptographic storage element
Corresponding number is used in combination the number and former numerical ciphers union, acquired results to be just appointed as the password of application initialization;
The password is submitted to platform end by client, if identical with the password of platform end generation, be considered as and passed through.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710119621.5A CN108462571B (en) | 2017-02-20 | 2017-02-20 | Method for generating encrypted password by using dynamic number |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710119621.5A CN108462571B (en) | 2017-02-20 | 2017-02-20 | Method for generating encrypted password by using dynamic number |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108462571A true CN108462571A (en) | 2018-08-28 |
CN108462571B CN108462571B (en) | 2020-10-02 |
Family
ID=63220897
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710119621.5A Active CN108462571B (en) | 2017-02-20 | 2017-02-20 | Method for generating encrypted password by using dynamic number |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108462571B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040083393A1 (en) * | 2002-10-24 | 2004-04-29 | Jordan Royce D. | Dynamic password update for wireless encryption system |
CN101964792A (en) * | 2010-09-27 | 2011-02-02 | 华南理工大学 | Multimode mapping based strong authentication method |
CN105357210A (en) * | 2015-11-23 | 2016-02-24 | 贾如银 | Dynamic password |
CN105871546A (en) * | 2016-05-24 | 2016-08-17 | 张雪莱 | Verification method combining static password and dynamic password and terminal equipment |
CN108337680A (en) * | 2017-01-18 | 2018-07-27 | 申彦伦 | A method of generating Crypted password using dynamic digital |
-
2017
- 2017-02-20 CN CN201710119621.5A patent/CN108462571B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040083393A1 (en) * | 2002-10-24 | 2004-04-29 | Jordan Royce D. | Dynamic password update for wireless encryption system |
CN101964792A (en) * | 2010-09-27 | 2011-02-02 | 华南理工大学 | Multimode mapping based strong authentication method |
CN105357210A (en) * | 2015-11-23 | 2016-02-24 | 贾如银 | Dynamic password |
CN105871546A (en) * | 2016-05-24 | 2016-08-17 | 张雪莱 | Verification method combining static password and dynamic password and terminal equipment |
CN108337680A (en) * | 2017-01-18 | 2018-07-27 | 申彦伦 | A method of generating Crypted password using dynamic digital |
Also Published As
Publication number | Publication date |
---|---|
CN108462571B (en) | 2020-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6929776B2 (en) | Cryptographic key generation from a physically non-replicatable function | |
CN104704768B (en) | System for generating cryptographic key from the memory as the unclonable function of physics | |
CA2202566C (en) | Digital signatures on a smart card | |
EP2987267B1 (en) | System and methods for encrypting data | |
CN107683502A (en) | According to compact source code building encryption function parameter | |
CN103559454B (en) | Data protection system and method | |
CN109274484B (en) | A kind of pair of data carry out the method and quantum key distribution terminal of secrecy enhancing | |
CN106612277A (en) | Method and system for realizing CAPTCHA verification using cipher disk | |
CN109274485A (en) | A kind of data ciphering method, data authentication method and relevant device and system | |
CN106789063B (en) | A kind of double factor authentication method based on convolution sum circulation dual coding | |
CN115659409A (en) | Financial asset transaction data safe storage method | |
CN110519037A (en) | The image encryption method of ultra-chaos pseudo random sequence | |
CN108337680A (en) | A method of generating Crypted password using dynamic digital | |
CN107147494B (en) | A method of the quantum dual signature based on the phased cryptographic operation of chain type | |
US11025426B2 (en) | Encryption function and authentication of a replaceable printer component | |
CN107483182A (en) | A kind of anti-power consumption attack method towards aes algorithm based on Out-of-order execution | |
CN108462571A (en) | A method of generating Crypted password using dynamic digital | |
Ur Rehman et al. | Security of a control key in quantum key distribution | |
CN112001717A (en) | Method, system and storage medium for calculating encryption currency of digital television | |
CN106712957B (en) | A kind of double factor authentication method based on convolutional encoding | |
Short et al. | The physics of no-bit-commitment: Generalized quantum non-locality versus oblivious transfer | |
EP3811220B1 (en) | Generating a target data based on a function associated with a physical variation of a device | |
CN103870552B (en) | Scrambling and recovery method for GIS (Geographic Information System) vector data line and plane graphic layer | |
JP5391212B2 (en) | Secure search system, secret search device, secure search method, secure search program | |
KR101790325B1 (en) | Encryption and Decryption System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |