CN108462571A - A method of generating Crypted password using dynamic digital - Google Patents

A method of generating Crypted password using dynamic digital Download PDF

Info

Publication number
CN108462571A
CN108462571A CN201710119621.5A CN201710119621A CN108462571A CN 108462571 A CN108462571 A CN 108462571A CN 201710119621 A CN201710119621 A CN 201710119621A CN 108462571 A CN108462571 A CN 108462571A
Authority
CN
China
Prior art keywords
password
storage element
dynamic digital
digital
accumulator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710119621.5A
Other languages
Chinese (zh)
Other versions
CN108462571B (en
Inventor
申彦伦
申源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710119621.5A priority Critical patent/CN108462571B/en
Publication of CN108462571A publication Critical patent/CN108462571A/en
Application granted granted Critical
Publication of CN108462571B publication Critical patent/CN108462571B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of methods generating Crypted password using dynamic digital, particularly as being from the dynamic digital information of some unchanged rules, a kind of and/or several digital informations are selected, dynamic digital is extracted, the underlying parameter for generating Crypted password is calculated as platform end and user terminal.And by the preset of the dynamic digital, storage, cumulative, just obtaining multiple parameters, specific algorithm having been determined in conjunction with the password that client has submitted to platform, that is, original code, reselection, Crypted password is just appointed as by calculating acquired results.The password generated by this method is effective against interception of the pseudo-base station to information, effectively antagonizes and snatched password using high-tech means, and password encryption is made to have high security.

Description

A method of generating Crypted password using dynamic digital
Technical field
The present invention relates to password encryption field, specifically a kind of method for generating Crypted password using dynamic digital,
Background technology
Now due to pseudo-base station quantity increases, the payment risk for causing mobile payment field is increasing, this straight Connect the cipher mode using agreement password, it is easy to password be caused to reveal;Another kind relies on the cipher mode of identifying code, due to being Identifying code directly is copied word by word, once being intercepted by pseudo-base station, has also resulted in failed encryption.Although and scrambler and excellent shield encryption performance It is good, but carrying is too inconvenient.There is an urgent need to one kind currently on the market, can effectively antagonize pseudo-base station, the theft of confrontation password and make With convenient encryption method.
Invention content
The purpose of the present invention is to provide a kind of method generating Crypted password using dynamic digital, in solution State the problem of being proposed in background technology.
To achieve the above object, the present invention provides the following technical solutions:
A method of Crypted password being generated using dynamic digital, particularly as being dynamic digital from some unchanged rules In information, a kind of and/or several digital informations are selected, dynamic digital is extracted, calculated and generate as platform end and user terminal The underlying parameter of Crypted password.And by the preset of the dynamic digital, storage, cumulative, multiple parameters just being obtained, in conjunction with visitor The password that family has been submitted to platform, that is, original code, reselection determine specific algorithm, are just specified by calculating acquired results For Crypted password.The specific method for calculating generation Crypted password is as follows:
S1:Cryptographic calculations generate the initialization of system;
a:The number of one group of aligned orderly is pre-set into dynamic digital storage element, and each number is compiled Number.
b:Initial reading of the number as accumulator is determined at random.
C:The common each letter of computer, symbol are generated a number and corresponded at random, and list stores This correspondence.
d:Take the rear n-bit character of original code, it is in situ to retain number therein, and according to the correspondence in the table, Letter therein, symbol are converted into number in situ, this is formed by n bit digitals by original code conversion, is known as former number Password.
e:The rear two digits for choosing former numerical ciphers, specify and are used as two reference numbers, and duplication is stored into reference number In storage element.
f:The end number of former numerical ciphers is chosen as number, out of dynamic digital storage unit, finds out the number institute Corresponding number, then the reading union the number and accumulator.
g:The reading union of number and accumulator most front-seat in dynamic digital storage element, again acquired results It is stored into the most heel row that content has been deposited in dynamic digital storage element, then again the reading logic phase of the result and accumulator Add;Most front-seat number in dynamic digital storage element, used primary rear just deleted, other numbers move forward one successively Sequence;It recycles in such a way, until pre-set dynamic digital is all deleted.
h:Choose under current state in dynamic digital storage element rearmost number several, replicate to be stored into successively and replace It changes in digital storage unit, as the number that can be recycled.
J:Choose foremost in dynamic digital storage element under current state number several, replicate successively be stored into it is tired Add in device reading storage element.
K:To form each of former numerical ciphers number as number, under current state in dynamic digital storage element, look for Go out the number corresponding to each number, replicates being stored into initialized cryptographic storage element successively, and number consecutively.
L:Whole Digital Logic in initialized cryptographic storage element are added, it is close that acquired results are known as the second number Code.To form each of second numerical ciphers number as number, under current state in dynamic digital storage element, find out every Number corresponding to a number replicates be stored into excessive phase password storage element successively.
S2:The storage of dynamic digital;After client receives the dynamic digital of platform end transmission, accumulator is detected first and is read Whether several last one-bit digitals is identical as one of reference number, if it is different, the dynamic digital is then stored into dynamic digital storage The most heel row of content has been deposited in memory cell.If identical, with number most front-seat in digital storage unit is replaced, replace current Dynamic digital, which is deleted, then the replacement digital storage is arrived, and content has been deposited in dynamic digital storage element Most heel row is just recycled to most heel row after most front-seat replacement number is previously used once.
By the obtained parameter of storage to dynamic digital, just become the ginseng of a past tense when calculating generation password Number, the information that pseudo-base station is intercepted all is present tense, so it can not utilize the information intercepted to calculate password.
S3:The cumulative storage with accumulator readings of dynamic digital;An accumulator is exactly established, being stored into dynamic number Each number in word storage element is all calculated with the reading of accumulator by the determining algorithm of selection, then the result of gained with The form of accumulator readings preserves;Then it again the reading of the accumulator, is stored into accumulator readings storage element in having deposited The most heel row held.
The reading of accumulator in this way is exactly a governed parameter changing, irregular.It is participated in by such dynamic parameter The password generated is calculated, the difficulty that malice calculates password can be greatly improved.
S4:The generation of Crypted password;After completing dynamic digital storage and adding up, it is single that excessive phase password storage is detected first Whether there is or not excessive phase passwords in first;If so, then first rear three bit digital of former numerical ciphers is repeated to write, a n bit digital is formed, The obtained n bit digitals are just appointed as third password;Then it uses most front-seat digital, cumulative in dynamic digital storage element In the reading of device, accumulator readings storage element number most front-seat in most front-seat digital, excessive phase password storage element and Third password is calculated, acquired results are just appointed as this Crypted password as parameter by the determining specific algorithm of selection;Dynamically Most front-seat digital and excessive phase password storage in most front-seat number, accumulator readings storage element in digital storage unit Most front-seat number in unit is previously used primary rear just deleted.If no, just with most front-seat in dynamic digital storage element Most front-seat digital and former numerical ciphers are as parameter in number, the reading of accumulator, accumulator readings storage element, by selection Determining specific algorithm calculates, and acquired results are just appointed as this Crypted password.It is most front-seat in dynamic digital storage element Number, number most front-seat in accumulator readings storage element, be previously used it is primary after, be just deleted, other numbers are successively Move forward a sequence.
Introduce transitional period password, be in order to prevent in initial phase, dynamic digital preset to user terminal from platform end, Once these data are intercepted by pseudo-base station, then the most preceding Crypted password several times after the completion of initialization, it is possible to be deduced Come;The method that transitional period password generates, determines its unpredictability, also ensures that mistake after the completion of initialization in this way It crosses in the phase, the safety of Crypted password;Since within the entire transitional period, pseudo-base station intercepts the probability very little of all information, therefore in mistake The ciphering process crossed after the phase is also safe.
Introduce and replace number, be in order to prevent under extreme case, client in a long time all information by malicious intercepted, this Sample is possible to calculate password.It introduces after replacing number, it is this to be just not present.
As the further scheme of the present invention, the dynamic digital information can be:The identifying code that platform is sent;In platform The upper random code for completing to send when an action;Time when completing an action on platform;It is produced during system operations Raw intermediate result;The amount of money of success payment;The quantity and/or weight of commodity are bought in success.
As the further scheme of the present invention, the method that above-mentioned calculating generates password is compiled into software, client is institute It states on software download to mobile phone, that is, cell phone application, platform end and client are all calculated using the software and generate password;Only Unlike one, platform end uses former numerical ciphers as one of the parameter for generating password, the password institute that cell phone application is inputted with client The numerical ciphers being converted into, as one of the parameter for generating password;It is dynamic when basic information when system initialization, normal operation State number, is to be sent to client by platform end.The dynamic digital information specifically selected is identifying code;Select the specific of determination Algorithm is to participate in the parameter logistics calculated addition and/or logical multiplication each;Choose rear six character, that is, n=of original code 6, it is converted into former numerical ciphers.After cell phone application receives the identifying code of platform end transmission, it is pre- that identifying code is first stored into identifying code In storage element, APP starts to work after client inputs password;The password of input is converted into numerical ciphers first, then presses institute It states method and calculates generation new password.The password that generation is calculated in cell phone application is submitted to platform end by client, if being generated with platform end Password it is identical, then be considered as and pass through.
The results code is exactly after platform end receives client input password application, to a long number of client transmission Word, typically six bit digitals;The union and/or logical multiplication are exactly with a position the number for participating in calculating to a Position, ten to ten ... mode align addition and/or multiplication, the result of calculation on every only retains an a position;
As the further scheme of the present invention, after the APP receives identifying code, in the case of use not yet, and receive Identifying code has been arrived, at this moment just identifying code is arranged in order and is stored in identifying code pre-stored unit, after client inputs password, has been pressed It is described to calculate the method for generating password, the password that the identifying code first received is generated, but not output password are calculated successively;Until making With the identifying code being currently received, that is, in identifying code pre-stored unit when the last one identifying code, then output password;Identifying code Identifying code in pre-stored unit is previously used primary rear i.e. deleted.
As the further scheme of the present invention, when platform end has sent identifying code, and client does not receive, in this way with The password of generation is calculated afterwards, just will appear the inconsistent situation of password that platform end and client generate, at this moment will be applied pair System is initialized.After platform receives the initialization application of client, just a digital number, APP are sent to client Out of initialized cryptographic storage element, the number corresponding to the digital number is found out, the number and former numerical ciphers logic is used in combination It is added, acquired results are just appointed as the password of application initialization.The password is submitted to platform end by client, if being calculated with platform end The password of generation is identical, is considered as and passes through.
As the further scheme of the present invention, apply for the method to system initialization, platform end and visitor can also be used The method for the modification original code that family end has been arranged.
The invention has the advantages that original code makes the encryption method and currently popular agreement as calculating parameter The encryption method of password has good compatibility, and in the case where mobile phone is lost, other people also can not malicious operation;Due to Original code is not transmitted in client and platform end, is effectively reduced the risk of password leakage.
Description of the drawings
Below in conjunction with attached drawing, the present invention is further illustrated
One group of identifying code that platform is sent to client when Fig. 1 is initialization;
The common letter of computer, symbol and random pair for generating number that platform is sent to client when Fig. 2 is initialization According to table;
Fig. 3 is that reference number stores table;
Fig. 4 is the interior identifying code stored of identifying code storage element after being computed;
Fig. 5 is to replace digital storage table;
Fig. 6 is that initialized cryptographic stores table;
Fig. 7 is that excessive phase password stores table;
Fig. 8 is that accumulator readings store table
Specific implementation mode
Embodiment 1
The password that client has been filed on to platform end is ab7de3gh,.After client has downloaded the App from platform, platform It holds and is had sent in one group of identifying code to identifying code storage element to the APP, as shown in Figure 1;Have sent the common letter of computer, Symbol and the table of comparisons of number are as shown in Figure 2;The accumulator truth of a matter of transmission is " 536178 ".
Rear six " 7de3gh " for taking original code, it is former obtained from converted according to the correspondence on the table of comparisons Numerical ciphers are " 752302 ";
Former numerical ciphers " 752302 " final two digits " 0 ", " 2 " are taken, are stored into reference number storage element, such as Fig. 3 It is shown;
Former numerical ciphers end digital " 2 " is chosen as number, the number corresponding to number " 2 " from Fig. 1 Reading " 536178 " union of " 346588 " and accumulator:
346588
536178
______
872656
The reading of accumulator reforms into " 872656 ".
Number " 552123 " most front-seat in identifying code storage element, reading " 872656 " logic phase with accumulator Add:
872656
552123
______
324779
Acquired results " 324779 " are stored into most heel row in identifying code storage element, then again the result and logic device Reading union.Most front-seat number " 552123 " in identifying code storage element, it is used primary rear i.e. deleted.
It recycles, is deleted until the identifying code shown in FIG. 1 that platform is sent is whole, at this moment identifying code successively by above-mentioned algorithm The deposited content of storage element becomes as shown in figure 4, the reading of accumulator becomes:“712502”.
Under current state in identifying code storage element, rearmost ten numbers are copied to replacement digital storage successively In unit, as shown in Figure 5.
Six numbers 7,5,2,3,0,2 to form former numerical ciphers " 752302 " are number, from current state under verify In code storage element, finding out corresponding number is:153152,741563,782341,563987,324779,782341, according to It is secondary to be stored into initialized cryptographic storage element, and each digital number is given, as shown in Figure 6.
Six in initialized cryptographic storage element digital unions,
153152
741536
782341
563987
324779
782341
______
035816
So the second password is exactly:035816.It is to number corresponding six with form the second password 0,3,5,8,1,6 Number is respectively:324779,563987,714536,963621,712501,528971, this six numbers were stored into successively It spends in phase password storage element, as shown in Figure 7.
Under current state in identifying code storage element, ten numbers of foremost, replicates be stored into accumulator successively It reads in storage element, as shown in Figure 8.
After the completion of the initialization of cell phone application, the identifying code received for the first time is 176588, it is stored into identifying code first In pre-stored unit, after client inputs original code ab7de3gh, 7de3gh according to Fig. 2 tables of comparisons, is converted to original by the APP Numerical ciphers are " 752302 ";It detects in reading " 712502 " end digital " 2 " and reference number storage element of accumulator One of number " 2 " is consistent, therefore testing of receiving is replaced with number " 326536 " most front-seat in the digital storage element of cycle Code " 176588 " is demonstrate,proved, and " 326532 " are stored into the most heel row in identifying code storage element, then with " 326536 " and current shape Reading " 712502 " union of accumulator under state:
326536
712502
______
038038
So when accumulator reading become 038038;Then it is stored into accumulator readings storage element 038038 again The most heel row of content is deposited.
It detects in excessive phase password storage element and has number, then rear three numbers weight of former numerical ciphers " 752302 " Manifolding, obtained third password is exactly " 302302 ";Again " 324779 " most front-seat in identifying code storage element, accumulator Reading " 038038 ", number " 324779 " most front-seat in excessive phase password storage element, in accumulator readings storage element Most front-seat number " 324779 " and the digital union of five, third password " 302302 ":
324779
324779
038038
324779
302302
______
292447
So " 292447 " are exactly current Crypted password.Most front-seat " 324779 " in identifying code storage element, excessively Most front-seat number " 324779 ", quilt in most front-seat " 324779 " in phase password storage element, accumulator readings storage element It is used it is primary after be all deleted.
After 7th time receives identifying code and store, detecting in excessive phase password storage element has not had number, just with verification Most front-seat number in code storage element, the reading of accumulator, former numerical ciphers union, acquired results be exactly encrypt it is close Code.
Embodiment 2
The identifying code that cell phone application is currently received is " 321578 ", had in identifying code pre-stored unit " 256381 ", " 659817 " two identifying codes;After client inputs original code ab7de3gh, original code is converted to former numerical ciphers by the APP It is most front-seat " 256381 " to be calculated generation password according to the method for generating password is calculated first, but do not show after " 752302 " Show password, " 256381 " are previously used primary rear i.e. deleted;" 659817 " are calculated according to the method for generating password is calculated again Password is generated, does not still show password, " 659817 " are also deleted after being previously used once;In identifying code pre-stored unit only When identifying code " 321578 " being currently received, is calculated according to the method for calculating generation password after generating password, show the close of generation Code;" 321578 " are also deleted after being previously used once.
Embodiment 3
Client submits the password generated to platform, cannot all pass through several times, is at this moment just generated to platform application to password System initialization;Platform end has sent the information of " 5 " to client, after cell phone application receives information, is just stored in initialized cryptographic In unit, finding out the number corresponding to number " 5 " is:" 324779 ", after client inputs original code ab7de3gh, the APP handles It is " 752302 " that original code, which is converted to former numerical ciphers, then " 324779 " with former numerical ciphers " 752302 " union:
324779
752302
______
076071
Acquired results " 076071 " are exactly the password of application initialization." 076071 " is submitted to platform end, experience by client Card is passed through.

Claims (10)

1. a kind of method generating Crypted password using dynamic digital, it is characterized in that:From the dynamic digital of some unchanged rules In information, a kind of and/or several digital informations are selected, dynamic digital is extracted, calculated and generate as platform end and user terminal The underlying parameter of Crypted password;And by the preset of the dynamic digital, storage, cumulative, multiple parameters just being obtained, in conjunction with visitor The password that family has been submitted to platform, that is, original code, reselection determine specific algorithm, are just specified by calculating acquired results For Crypted password.
2. a method of Crypted password being generated using dynamic digital, it is characterized in that:The common each letter of computer, symbol It all generates a number at random to correspond, and list stores this correspondence;
Then the rear n-bit character of original code is taken, it is in situ to retain number therein, and according to the correspondence in the list, Alphabetical, symbol therein is converted into number in situ, this is formed by n bit digitals by original code conversion, and it is close to be known as former number Code.
3. the method according to claim 1 for generating Crypted password using dynamic digital, it is characterized in that:System is generated to calculating When system initialization:
a:The number of one group of aligned orderly is pre-set into dynamic digital storage element, and each number is numbered;
b:Initial reading of the number as accumulator is determined at random;
c:The rear two digits for choosing former numerical ciphers specify and are used as two reference numbers, and duplication is stored into reference number storage In unit;
d:The end number of former numerical ciphers is chosen as number, out of dynamic digital storage unit, is found out corresponding to the number Number, then the reading union the number and accumulator;
e:The reading union of number and accumulator most front-seat in dynamic digital storage element, acquired results are stored again The most heel row of content is deposited in dynamic digital storage element, then again the reading union of the result and accumulator;It is dynamic Most front-seat number in state digital storage unit, used primary rear just deleted, other numbers move forward one and sort successively, It recycles in such a way, until pre-set dynamic digital is all deleted;
f:Rearmost digital several groups in dynamic digital storage element, replicate be stored into replacement number successively under selection current state In word storage element, as the number that can be recycled;
g:Choose foremost in dynamic digital storage element under current state number several, replicate be stored into accumulator successively It reads in storage element;
h:To form each of former numerical ciphers number as number, under current state in dynamic digital storage element, find out every Number corresponding to a number replicates be stored into initialized cryptographic storage element successively, and number consecutively;
j:Whole Digital Logic in initialized cryptographic storage element are added, acquired results are known as the second numerical ciphers;With Each of second numerical ciphers number is formed as number, under current state in dynamic digital storage element, finds out each volume Number corresponding to number replicates be stored into excessive phase password storage element successively.
4. the method according to claim 1 for generating Crypted password using dynamic digital, it is characterized in that:When client receives After the dynamic digital that platform is sent, the last one-bit digital for detecting accumulator readings first is no identical as one of reference number, if Difference is then stored into the dynamic digital the most heel row that content has been deposited in dynamic digital storage element;If identical, with replacement number That most front-seat number, replaces current dynamic digital, which is deleted, then the replacement in word storage element Digital storage arrives, and the most heel row of content has been deposited in dynamic digital storage element and has just been recycled to after replacement number is previously used once Most heel row.
5. the method according to claim 1 for generating Crypted password using dynamic digital, it is characterized in that:One is established to add up Device is all calculated each number being stored into dynamic digital storage element by the determining algorithm of selection with the reading of accumulator, The result of gained is preserved in the form of accumulator readings again;Then the reading of the accumulator is stored into accumulator readings again The most heel row of content has been deposited in storage element.
6. the method according to claim 1 for generating Crypted password using dynamic digital, it is characterized in that:Complete dynamic number Word store with it is cumulative after, detect in excessive phase password storage element that whether there is or not excessive phase passwords first;If so, then first former number Rear three bit digital of password repeats to write, as soon as composition n bit digitals, the obtained n bit digitals are appointed as third password;Then With most front-seat in the reading of most front-seat number, accumulator in dynamic digital storage element, accumulator readings storage element Most front-seat number and third password are as parameter in digital, excessive phase password storage element, by the determining specific algorithm of selection It calculates, acquired results are just appointed as this Crypted password;Most front-seat number, accumulator in dynamic digital storage element are read Most front-seat number and number most front-seat in excessive phase password storage element, are just deleted after being previously used once in number storage element It removes.If no, just with number most front-seat in dynamic digital storage element, reading, the accumulator readings storage element of accumulator Inside most front-seat number and former numerical ciphers are calculated, acquired results are just appointed as parameter by the determining specific algorithm of selection This Crypted password;It is most front-seat in most front-seat number, accumulator readings storage element in dynamic digital storage element Number after being previously used once, is just deleted, and other numbers move forward one and sort successively.
7. the method according to claim 1 for generating Crypted password using dynamic digital, it is characterized in that:The dynamic digital Information can be:The identifying code that platform is sent;The random code sent when completing an action on platform;One is completed on platform Time when a action;Intermediate result caused by during system operations;The amount of money of success payment;Commodity are bought in success Quantity and/or weight.
8. according to claim 2, claim 3, claim 4, claim 5, claim 6 and claim 7 The method for generating Crypted password using dynamic digital, it is characterized in that:The method that above-mentioned calculating generates password is compiled into software, visitor Family is on the software download to mobile phone, that is, cell phone application, platform end and client all calculated using the software generate it is close Code;Unlike unique, platform end uses former numerical ciphers as one of the parameter for generating password, and cell phone application is inputted with client The numerical ciphers that password is converted into, as one of the parameter for generating password;Basic information, normal operation when system initialization When dynamic digital, be that client is sent to by platform end;
The dynamic digital information specifically selected is identifying code;Selecting determining specific algorithm is, each parameter for participating in calculating Union and/or logical multiplication;The rear six character, that is, n=6 for choosing original code, are converted into former numerical ciphers;Work as cell phone application After the identifying code for receiving the transmission of platform end, first identifying code is stored into identifying code pre-stored unit, after client inputs password APP starts to work;The password of input is converted into numerical ciphers first, then calculates generate new password according to the method;Client's handle The password that generation is calculated in cell phone application is submitted to platform end, if identical as the password that platform end generates, be considered as and pass through;
The results code is exactly the long number sent to client after platform end receives client input password application, Typically six bit digitals;The union and/or logical multiplication, be exactly participate in calculate number with a position to a position, Ten to ten ... mode align addition and/or multiplication, the result of calculation on every only retains position.
9. the method according to claim 8 for generating Crypted password using dynamic digital, it is characterized in that:The APP is received After identifying code, in the case of use not yet, and identifying code is received, at this moment just identifying code is arranged in order by order of receipt It is stored in identifying code pre-stored unit;After client inputs password, by the method for calculating and generating password, calculate successively first The password that the identifying code received is generated, but not output password;Until pre- using the identifying code being currently received, that is, identifying code In storage element when the last one identifying code, then output password;After identifying code in identifying code pre-stored unit is previously used once It is deleted.
10. the method according to claim 8 for generating Crypted password using dynamic digital, it is characterized in that:When platform end is sent out Identifying code has been sent, and client does not receive, and calculates the password generated later in this way, just will appear platform end and is generated with client The inconsistent situation of password, at this moment will apply initializing system;Detailed process is:When platform receives client After initialization application, a digital number just is sent to client, APP finds out the number out of initialized cryptographic storage element Corresponding number is used in combination the number and former numerical ciphers union, acquired results to be just appointed as the password of application initialization; The password is submitted to platform end by client, if identical with the password of platform end generation, be considered as and passed through.
CN201710119621.5A 2017-02-20 2017-02-20 Method for generating encrypted password by using dynamic number Active CN108462571B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710119621.5A CN108462571B (en) 2017-02-20 2017-02-20 Method for generating encrypted password by using dynamic number

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710119621.5A CN108462571B (en) 2017-02-20 2017-02-20 Method for generating encrypted password by using dynamic number

Publications (2)

Publication Number Publication Date
CN108462571A true CN108462571A (en) 2018-08-28
CN108462571B CN108462571B (en) 2020-10-02

Family

ID=63220897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710119621.5A Active CN108462571B (en) 2017-02-20 2017-02-20 Method for generating encrypted password by using dynamic number

Country Status (1)

Country Link
CN (1) CN108462571B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040083393A1 (en) * 2002-10-24 2004-04-29 Jordan Royce D. Dynamic password update for wireless encryption system
CN101964792A (en) * 2010-09-27 2011-02-02 华南理工大学 Multimode mapping based strong authentication method
CN105357210A (en) * 2015-11-23 2016-02-24 贾如银 Dynamic password
CN105871546A (en) * 2016-05-24 2016-08-17 张雪莱 Verification method combining static password and dynamic password and terminal equipment
CN108337680A (en) * 2017-01-18 2018-07-27 申彦伦 A method of generating Crypted password using dynamic digital

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040083393A1 (en) * 2002-10-24 2004-04-29 Jordan Royce D. Dynamic password update for wireless encryption system
CN101964792A (en) * 2010-09-27 2011-02-02 华南理工大学 Multimode mapping based strong authentication method
CN105357210A (en) * 2015-11-23 2016-02-24 贾如银 Dynamic password
CN105871546A (en) * 2016-05-24 2016-08-17 张雪莱 Verification method combining static password and dynamic password and terminal equipment
CN108337680A (en) * 2017-01-18 2018-07-27 申彦伦 A method of generating Crypted password using dynamic digital

Also Published As

Publication number Publication date
CN108462571B (en) 2020-10-02

Similar Documents

Publication Publication Date Title
JP6929776B2 (en) Cryptographic key generation from a physically non-replicatable function
CN104704768B (en) System for generating cryptographic key from the memory as the unclonable function of physics
CA2202566C (en) Digital signatures on a smart card
EP2987267B1 (en) System and methods for encrypting data
CN107683502A (en) According to compact source code building encryption function parameter
CN103559454B (en) Data protection system and method
CN109274484B (en) A kind of pair of data carry out the method and quantum key distribution terminal of secrecy enhancing
CN106612277A (en) Method and system for realizing CAPTCHA verification using cipher disk
CN109274485A (en) A kind of data ciphering method, data authentication method and relevant device and system
CN106789063B (en) A kind of double factor authentication method based on convolution sum circulation dual coding
CN115659409A (en) Financial asset transaction data safe storage method
CN110519037A (en) The image encryption method of ultra-chaos pseudo random sequence
CN108337680A (en) A method of generating Crypted password using dynamic digital
CN107147494B (en) A method of the quantum dual signature based on the phased cryptographic operation of chain type
US11025426B2 (en) Encryption function and authentication of a replaceable printer component
CN107483182A (en) A kind of anti-power consumption attack method towards aes algorithm based on Out-of-order execution
CN108462571A (en) A method of generating Crypted password using dynamic digital
Ur Rehman et al. Security of a control key in quantum key distribution
CN112001717A (en) Method, system and storage medium for calculating encryption currency of digital television
CN106712957B (en) A kind of double factor authentication method based on convolutional encoding
Short et al. The physics of no-bit-commitment: Generalized quantum non-locality versus oblivious transfer
EP3811220B1 (en) Generating a target data based on a function associated with a physical variation of a device
CN103870552B (en) Scrambling and recovery method for GIS (Geographic Information System) vector data line and plane graphic layer
JP5391212B2 (en) Secure search system, secret search device, secure search method, secure search program
KR101790325B1 (en) Encryption and Decryption System

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant