CN108989051A - A kind of dynamic password and its generating mode - Google Patents

A kind of dynamic password and its generating mode Download PDF

Info

Publication number
CN108989051A
CN108989051A CN201810980886.9A CN201810980886A CN108989051A CN 108989051 A CN108989051 A CN 108989051A CN 201810980886 A CN201810980886 A CN 201810980886A CN 108989051 A CN108989051 A CN 108989051A
Authority
CN
China
Prior art keywords
password
code
minutes
practical
seconds
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810980886.9A
Other languages
Chinese (zh)
Other versions
CN108989051B (en
Inventor
徐晓君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Ruikejia Technology Co Ltd
Original Assignee
Zhejiang Ruikejia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Ruikejia Technology Co Ltd filed Critical Zhejiang Ruikejia Technology Co Ltd
Priority to CN201810980886.9A priority Critical patent/CN108989051B/en
Publication of CN108989051A publication Critical patent/CN108989051A/en
Application granted granted Critical
Publication of CN108989051B publication Critical patent/CN108989051B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0872Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention provides a kind of dynamic password and its generating modes, belong to field of information security technology.It solves the problems, such as that existing dynamic password generating mode is single.This dynamic password is made of at least four groups of numbers, including one group of practical door-opening password, one group of minutes code, one group of seconds code and one group of password type code, practical minute, seconds when the minutes code is by application password convert to obtain, practical seconds when the seconds code is by application password convert to obtain, and the password type code is converted to obtain by cryptographic validity and practical minutes.Dynamic password of the invention can be automatically generated according to the time of application password according to ad hoc rules, and safety is good.Cipher random generates, primary effectively to become invalid after the specified date, and fundamentally solves bring risk due to password leakage, promotes management safety.

Description

A kind of dynamic password and its generating mode
Technical field
The invention belongs to field of information security technology, it is related to a kind of dynamic password and its generating mode.
Background technique
Dynamic password is that a uncertain random digit combination is generated according to special algorithm, and each password can only make With primary, it is widely used in the application fields such as Internetbank, network game, telecom operators, E-Government, enterprise at present.
Dynamic password is a kind of account anti-theft technology of safe and convenient, the certification peace that can be traded and be logged in effective protection Entirely, it is just not necessarily to periodic modification password using dynamic password, saves worry safely, this is an extra value of this technology, to enterprise's thing Industry internal applications are particularly useful.The generating mode of existing dynamic password is relatively simple, is easy to generate rule by broken pick out of criminal Then, it still needs further improvement for safety.
Summary of the invention
The first purpose of this invention be for the above problem present in existing dynamic password, and propose it is a kind of with Application time is according to the dynamic password generated.
The first purpose of this invention can be realized by the following technical scheme:
A kind of dynamic password, which is characterized in that it is made of at least four groups of numbers, including one group of practical door-opening password, and one Group minutes code, one group of seconds code and one group of password type code, the minutes code are close by applying Practical minute, seconds when code convert to obtain, the practical seconds when seconds code is by application password Conversion obtains, and the password type code is converted to obtain by cryptographic validity and practical minutes.
The practical door-opening password has two, and minutes code has two, and seconds code has one, cipher type Type code has one.
The sequence of the dynamic password is followed successively by practical door-opening password, minutes code, seconds code and password Type code, each code are decimal number.
In a kind of above-mentioned dynamic password, the minutes code (XY) have third gear, when XY be in 00-29 it Between when, indicate application password when practical minutes be located in this minutes section XY*2~XY*2+1, at XY When between 30~59, indicate to be located at (XY-30) * 2~(XY-30) * 2+1 by practical minutes when application password that this is a In minutes section, and seconds code has tens " 1 ";When XY is between 60~89, indicate that application is close Practical minutes when code are located in this minutes section (XY-60) * 2~(XY-60) * 2+1, and seconds Code has tens " 2 ".
In a kind of above-mentioned dynamic password, described seconds code (MN) numerical value indicates application between 00-29 Practical seconds when password are located in this seconds section MN*2~MN * 2+1, and ten of seconds code Number is hidden.Password digit is reduced, two seconds codes can be indicated with one digit number combination third gear minutes code.
In a kind of above-mentioned dynamic password, the password type code is divided into 0-1,2-3,4-5,6-7,8-9 five Shelves, five grades of password type codes correspond five grades of cryptographic validities, and practical minutes are before corresponding to minutes section When digit, password type code is also the preceding digit of corresponding shelves, and practical minutes are the rear digit in corresponding minutes section When, password type code is also the rear digit of corresponding shelves.
In a kind of above-mentioned dynamic password, when the password type code is 0-1, corresponding cryptographic validity is 5 Minute, when the password type code is 2-3, corresponding cryptographic validity is 10 minutes, and the password type code is When 4-5, corresponding cryptographic validity is 15 minutes, and when the password type code is 6-7, corresponding cryptographic validity is 20 Minute, when the password type code is 8-9, corresponding cryptographic validity is 30 minutes.
In a kind of above-mentioned dynamic password, there are also one group of password application Ser. No, the password Shens for the dynamic password Please serial number indicate number of the period indicated in minutes code and seconds code to platform application password.
Password application Ser. No is hidden when being equal to 1.
Second object of the present invention be for the above problem present in existing dynamic password, and propose it is a kind of with Application time is the method according to the dynamic password generated.
Second object of the present invention can be realized by the following technical scheme:
A kind of generating mode of dynamic password, which is characterized in that it includes the following steps:
1, user sends application signal to platform and carries out password application;
2, platform generates the 5th bps clock time code and 3-4 minutes according to the inquiry for receiving the password application moment Time code;
3, the 6th password type code is generated according to the practical minute of cryptographic validity type and application;
4, platform records the number of application password in the time interval, generates the 7th password application Ser. No;
5, correct the GMT value for participating in calculating according to rule according to 3-6 place value, then by 4 byte times of GMT time stamp and 7th data AES128 key corresponding with application equipment is assembled into seed, generates 1-2 through dynamic password algorithm and actually opens Door password;
6, practical door-opening password and the 3rd, 4,5,6 generated are combined into 6 passwords again;
If 7, password application Ser. No is greater than 1,7 passwords are formed in step 6;
8, applicant is handed down to after password order conversions algorithm carries out order conversions.
Compared with prior art, dynamic password of the invention can give birth to automatically according to the time of application password according to ad hoc rules At safety is good.Get rid of the constraint of conventional cipher memory management, it is no longer necessary to remember many and diverse, a large amount of number, also no longer need It regularly updates, promotes the efficiency of management;It avoids post personnel from adjusting the transition of bring password, lowers management cost.Password It is randomly generated, it is primary effectively to become invalid after the specified date, it fundamentally solves bring risk due to password leakage, promotes management safety.
Specific embodiment
The following is specific embodiments of the present invention, and technical scheme of the present invention will be further described, but the present invention is simultaneously It is not limited to these embodiments.
A kind of dynamic password provided by the invention is made of at least four groups of numbers, including one group of practical door-opening password, and one group Minutes code, one group of seconds code and one group of password type code, the minutes code is by application password When practical minute, seconds convert to obtain, the practical seconds when seconds code is by application password change It obtains, the password type code is converted to obtain by cryptographic validity and practical minutes.
Practical door-opening password has two, and minutes code has two, and seconds code has one, password type code There is one.
In the present embodiment, the sequence of dynamic password is followed successively by practical door-opening password, minutes code, seconds code With password type code, each code is decimal number, and the 1st~2 is practical door-opening password, and the 3rd~4 is minutes generation Code, the 5th is seconds code, and the 6th is password type code.
Minutes code (XY) has third gear, when XY is between 00-29, indicates practical minute when application password Time is located in this minutes section XY*2~XY*2+1, for example, XY be " 00 " when, corresponding minutes section is " 0~1 ", when XY is " 15 ", corresponding minutes section is " 30~31 ", when XY is " 29 ", corresponding minutes section For " 58~59 ";When XY be in 30~59 between when, indicate application password when practical minutes be located at (XY-30) * 2~ (XY-30) in this minutes section * 2+1, for example, XY be " 30 " when, corresponding minutes section be " 0~1 ", XY When for " 45 ", corresponding minutes section is " 30~31 ", when XY is " 59 ", corresponding minutes section be " 58~ 59 ", and the 5th bps clock time code has tens " 1 ";When XY is between 60~89, when indicating to apply for password Practical minutes are located in this minutes section (XY-60) * 2~(XY-60) * 2+1, for example, XY be " 60 " when, it is right The minutes section answered is " 0~1 ", and when XY is " 75 ", corresponding minutes section is " 30~31 ", when XY is " 89 ", Corresponding minutes section is " 58~59 ", and the 5th bps clock time code has tens " 2 ".From the foregoing, it will be observed that any Minutes section was constituted by continuous 2 minutes, and the preceding digit in minutes section is even minutes, and rear digit is odd number Minute.
Seconds code (MN) numerical value applies for that practical seconds when password are located at MN*2~MN* between 00-29 In the seconds section of 2+1.Any seconds section was constituted by continuous 2 seconds, the preceding digit in seconds section For even number second, rear digit is odd number second.When MN is units, the 5th directly displays units, and tens " 0 " is hidden;When When MN has tens " 1 " or " 2 ", units is only shown, and hide its tens.When MN is 0, reality when application password is indicated Border second is located in this seconds section " 0-1 ", when MN is 15, indicates being located in for practical second when application password In this seconds section " 30-31 ", MN be 29 when, indicate application password when be located within practical second " 58-59 " this In one seconds section.Therefore system can be according to practical second determining MN numerical value of application password, for example, application password When practical second when being " 37 ", in this practical second seconds section positioned at " 36-37 ", i.e. MN is " 18 ", and should Second have tens " 1 " (but tens " 1 " is not shown on the 5th), indicate minutes code XY be in 30~59 this In one grade;Practical second when applying for password when being " 11 ", in this practical second seconds section positioned at " 10-11 ", MN As " 5 " indicate that minutes code XY is in 00~29 this shelves;Apply password when practical second be " 57 " when, should MN is " 28 ", and this second has tens " 2 " in the seconds section of " 56-57 " within practical second, indicates minute Time code XY is in 60~89 this shelves.After which shelves minutes code (XY) when determining application password belongs to, In conjunction with practical minutes, that is, it can determine the numerical value of XY, however, it is determined that minutes code XY is in 60~89 this shelves, table Show that practical minutes when application password are located in this minutes section (XY-60) * 2~(XY-60) * 2+1, it is false If practical application minutes are 20 points, then XY is " 70 ".
Password type code has 5 grades, respectively " 0~1 ", " 2~3 ", " 4~5 ", " 6~7 ", " 8~9 ", password type generation It when code is " 0 ", indicates that cryptographic validity is 5 minutes, and indicates that practical minutes are the preceding digit in minutes section, it is close It when code type code is " 1 ", indicates that cryptographic validity is 5 minutes, and indicates practical minutes for behind minutes section Digit.Therefore first passing through can be true after digit after determining preceding digit of the practical minutes in corresponding minutes section still The password type code of this fixed grade, such as practical minutes are 21 minutes, and cryptographic validity is 5 minutes, then the practical minute Time is the rear digit in " 20~21 " this minutes section, then password type code is " 1 " at this time;Practical minutes When being 40 minutes, cryptographic validity is 5 minutes, which is the anteposition in " 40~41 " this minutes section Number, then password type code is " 0 " at this time.
When password type code is " 2 ", when indicating that cryptographic validity is 10 minutes, and indicating that practical minutes are minute Between section preceding digit, when password type code is " 3 ", indicates that cryptographic validity is 10 minutes, and indicate practical minutes For the rear digit in minutes section;When password type code is " 4 ", indicate that cryptographic validity is 15 minutes, and indicate practical Minutes are the preceding digit in minutes section, when password type code is " 5 ", indicate that cryptographic validity is 15 minutes, and Indicate that practical minutes are the rear digit in minutes section;When password type code is " 6 ", indicate that cryptographic validity is 20 Minute, and indicate that practical minutes are the preceding digit in minutes section, when password type code is " 7 ", indicate that password has The effect phase is 20 minutes, and indicates that practical minutes are the rear digit in minutes section;When password type code is " 8 ", table Show that cryptographic validity is 30 minutes, and indicate that practical minutes are the preceding digit in minutes section, password type code is It when " 9 ", indicates that cryptographic validity is 30 minutes, and indicates that practical minutes are the rear digit in minutes section.
Dynamic password further includes the 7th password application Ser. No, which is the Shen indicated at 3-5 Please the received password request times of time interval inner platform, a platform password application of every reception, password application Ser. No be incremented by 1, highest is incremented to 9.Server at most receives 9 password applications in 2S seconds.
For example, practical second is " 15 " when the application password real time is 20 points and 15 seconds, it is located at 14-15 within this practical second Seconds section in, MN*2+1=15, MN=7, thus apply password when practical minutes be located at XY*2~XY*2+ In 1 this minutes section, the numerical value of XY*2=20, XY are " 10 ", and 3-5 numerical value is " 107 ", it is assumed that password is effective Phase is 5 minutes, then password type code is " 0 ", and 3-6 data are " 1070 ".
When the real time for applying for password is 20 points and 14 seconds, practical second is " 14 ", is located within this practical second the second of 14-15 In clock time section, MN*2=14, MN=7, therefore apply password when practical minutes be located at XY*2~XY*2+1 this In minutes section, the numerical value of XY*2=20, XY are " 10 ", and 3-5 numerical value is " 107 ", it is assumed that cryptographic validity 5 Minute, then password type code is " 0 ", and 3-6 data are " 1070 ".Therefore, apply for dynamic password produced by password in 2 seconds 3-6 be possible to it is identical, need at this time to participate in calculate GMT be modified, be modified to " 14~15 " this second The time that time interval starts.
Platform end dynamic password generating mode includes the following steps:
S1, user send application signal to platform and carry out password application, and cryptographic validity type may be selected when transmission;
S2, platform are generated according to the time (namely above-mentioned described application time) of the time of reception according to the above method 3-4 minutes codes and the 5th bps clock time code;
S3, the 6th password type code is generated according to the practical minute of cryptographic validity type and application;
S4, platform record the number of application password in the seconds segment where this application time, generate the 7th it is close Code application Ser. No;
The GMT for participating in calculating is modified to corresponding seconds by S5, the 3-6 data obtained according to step S2 and S3 The time numerical value that section starts, then the 4 byte times stamp of revised inquiry and the 7th data is corresponding with application equipment AES128 key be assembled into seed, through dynamic password algorithm generate 1-2 practical door-opening passwords;
S6, again by practical door-opening password and generate the 3rd, 4,5,6, be combined into 6 passwords;
If S7, application password code of number are greater than 1,7 passwords are formed in step 6;
S8, the binary-coded decimal convenient for sending is converted by metric 7 passwords;
S9, applicant is handed down to after the binary-coded decimal in S8 is carried out order conversions by password order conversions algorithm.
The binary-coded decimal received is converted to decimal number by S10, cell phone application, this is the unlocking cipher that user is immediately seen.
The dissection process of door lock end password:
When being unlocked using unlocking cipher, the unlocking cipher received is sent to (the " # " number end of intelligent door lock end by user Password Input), system first carries out order conversions reduction order with " order conversions algorithm ", and converts and be reduced to decimal number, root According to the 3rd of dynamic password the, 4,5,6 data, the correction value for generating GMT (it should be noted that when midnight alternation is at morning, is answered correct Amendment participates in the GMT date calculated, such as: the time of server is 2018.05.10 23:59:58 when password application, by password After being input to door lock, the time of door lock is 2018.05.11 00:01:10, should be by the GMT time complexity curve of calculating at this time 2018.05.10 23:59:58), then obtained by the 4 byte times stamp of revised inquiry and from server AES128 key and the 7th password application Ser. No are assembled into seed (if without the 7th, filling the 7th digit " 1 "), 2 passwords are generated through dynamic password algorithm, are compared with 1-2 of the password of input, it is identical, it opens the door, it is different then send out It alerts out.According to the 6th determining cryptographic validity, i.e., by the practical inquiry of door lock and after being corrected according to password inquiry into Row compares, and is greater than corresponding time, password failure.If each password is used only once, door lock end will be to just normally opened mistake The password of door is recorded, even if should be rejected with the secret number for the second time in cryptographic validity.
System can be divided into user terminal peace end, and user terminal commonly cell phone application knows that Binary Conversion is ten in advance The transformation rule of system number, platform end have signal transmitting module and signal receiving module.
It should be understood that in claims of the present invention, specification, all " including ... " should be understood as open Meaning, that is, its meaning is equal to " at least containing ... ", but should not be understood as enclosed meaning, i.e., its meaning is not answered This is interpreted as " only including ... ".
Specific embodiment described herein is only an example for the spirit of the invention.The neck of technology belonging to the present invention The technical staff in domain can make various modifications or additions to the described embodiments or replace by a similar method In generation, however, it does not deviate from the spirit of the invention or beyond the scope of the appended claims.

Claims (10)

1. a kind of dynamic password, which is characterized in that it is made of at least four groups of numbers, including one group of practical door-opening password, and one group Minutes code, one group of seconds code and one group of password type code, the minutes code is by application password When practical minute, seconds convert to obtain, the practical seconds when seconds code is by application password change It obtains, the password type code is converted to obtain by cryptographic validity and practical minutes.
2. a kind of dynamic password according to claim 1, which is characterized in that the practical door-opening password has two, point Clock time code has two, and seconds code has one, and password type code has one.
3. a kind of dynamic password according to claim 2, which is characterized in that the sequence of the dynamic password is followed successively by reality Door-opening password, minutes code, seconds code and password type code, each code are decimal number.
4. a kind of dynamic password according to claim 3, which is characterized in that the minutes code (XY) has three Shelves indicate that practical minutes when application password are located at this minute of XY*2~XY*2+1 when XY is between 00-29 In time interval, when XY be in 30~59 between when, indicate application password when practical minutes be located at (XY-30) * 2~ (XY-30) in this minutes section * 2+1, and seconds code has tens " 1 ";When XY is in 60~89 Between when, indicate application password when practical minutes be located at this minutes area (XY-60) * 2~(XY-60) * 2+1 In, and seconds code has tens " 2 ".
5. a kind of dynamic password according to claim 3, which is characterized in that described seconds code (MN) numerical value exists Between 00-29, indicate that practical seconds when application password are located in this seconds section MN*2~MN*2+1, the second The tens of clock time code is hidden.
6. a kind of dynamic password according to claim 3, which is characterized in that the password type code is divided into 0-1,2- 3, five grades of 4-5,6-7,8-9, five grades of password type codes correspond five grades of cryptographic validities, and practical minutes are corresponding point When the preceding digit in clock time section, password type code is also the preceding digit of corresponding shelves, when practical minutes are corresponding minute Between section rear digit when, password type code is also the rear digit of corresponding shelves.
7. a kind of dynamic password according to claim 3, which is characterized in that right when the password type code is 0-1 The cryptographic validity answered is 5 minutes, and when the password type code is 2-3, corresponding cryptographic validity is 10 minutes, described Password type code when being 4-5, corresponding cryptographic validity is 15 minutes, corresponding when the password type code is 6-7 Cryptographic validity be 20 minutes, the password type code be 8-9 when, corresponding cryptographic validity be 30 minutes.
8. a kind of dynamic password according to claim 3, which is characterized in that there are also one group of password Shens for the dynamic password Please serial number, which indicates the period indicated in minutes code and seconds code to platform Shen Please password number.
9. a kind of dynamic password according to claim 8, which is characterized in that password application Ser. No is hidden when being equal to 1.
10. a kind of generating mode of dynamic password, which is characterized in that it includes the following steps:
S1, user send application signal to platform and carry out password application;
When S2, platform generate the 5th bps clock time code and 3-4 minutes according to the inquiry for receiving the password application moment Between code;
S3, the 6th password type code is generated according to the practical minute of cryptographic validity type and application;
S4, platform record the number of application password in the time interval, generate the 7th password application Ser. No;
S5, it is stabbed and the 7th according to 3-6 place value according to the regular GMT value corrected and participate in calculating, then by 4 byte times of inquiry Data AES128 key corresponding with application equipment is assembled into seed, and it is close to generate 1-2 practical enablings through dynamic password algorithm Code;
S6, again by practical door-opening password and generate the 3rd, 4,5,6, be combined into 6 passwords;
If S7, password application Ser. No are greater than 1,7 passwords are formed in step S6;
S8, applicant is handed down to after password order conversions algorithm carries out order conversions.
CN201810980886.9A 2018-08-27 2018-08-27 Method for generating dynamic password Active CN108989051B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810980886.9A CN108989051B (en) 2018-08-27 2018-08-27 Method for generating dynamic password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810980886.9A CN108989051B (en) 2018-08-27 2018-08-27 Method for generating dynamic password

Publications (2)

Publication Number Publication Date
CN108989051A true CN108989051A (en) 2018-12-11
CN108989051B CN108989051B (en) 2021-04-23

Family

ID=64546681

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810980886.9A Active CN108989051B (en) 2018-08-27 2018-08-27 Method for generating dynamic password

Country Status (1)

Country Link
CN (1) CN108989051B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110517389A (en) * 2019-08-30 2019-11-29 联永智能科技(上海)有限公司 Generation, verification method, device, equipment and the storage medium of device password
CN114257455A (en) * 2021-12-28 2022-03-29 北京爱学习博乐教育科技有限公司 Method and system for connecting enterprise VPN by using dynamic password

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090013390A1 (en) * 2007-07-06 2009-01-08 Li Gong Ling Security Device And Method Incorporating Multiple Varying Password Generator
CN104539421A (en) * 2014-08-22 2015-04-22 南京速帕信息科技有限公司 Realizing method for mobile token based on dynamic algorithm seed
CN105515769A (en) * 2016-01-12 2016-04-20 汉柏科技有限公司 Dynamic password generation method and dynamic password generation system for network equipment
CN106254068A (en) * 2016-08-18 2016-12-21 张晓辉 The generation of pure software dynamic password and verification method thereof
CN106869616A (en) * 2017-03-05 2017-06-20 宁波亿拍客网络科技有限公司 A kind of dynamic puzzle-lock, dynamic cipher system and dynamic encryption and decryption system
CN107146303A (en) * 2017-04-25 2017-09-08 深圳市万睿智能科技有限公司 Device, method and the gate control system opened the door using dynamic password

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090013390A1 (en) * 2007-07-06 2009-01-08 Li Gong Ling Security Device And Method Incorporating Multiple Varying Password Generator
CN104539421A (en) * 2014-08-22 2015-04-22 南京速帕信息科技有限公司 Realizing method for mobile token based on dynamic algorithm seed
CN105515769A (en) * 2016-01-12 2016-04-20 汉柏科技有限公司 Dynamic password generation method and dynamic password generation system for network equipment
CN106254068A (en) * 2016-08-18 2016-12-21 张晓辉 The generation of pure software dynamic password and verification method thereof
CN106869616A (en) * 2017-03-05 2017-06-20 宁波亿拍客网络科技有限公司 A kind of dynamic puzzle-lock, dynamic cipher system and dynamic encryption and decryption system
CN107146303A (en) * 2017-04-25 2017-09-08 深圳市万睿智能科技有限公司 Device, method and the gate control system opened the door using dynamic password

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110517389A (en) * 2019-08-30 2019-11-29 联永智能科技(上海)有限公司 Generation, verification method, device, equipment and the storage medium of device password
CN110517389B (en) * 2019-08-30 2021-11-09 联永智能科技(上海)有限公司 Method, device, equipment and storage medium for generating and verifying equipment password
CN114257455A (en) * 2021-12-28 2022-03-29 北京爱学习博乐教育科技有限公司 Method and system for connecting enterprise VPN by using dynamic password

Also Published As

Publication number Publication date
CN108989051B (en) 2021-04-23

Similar Documents

Publication Publication Date Title
CN109523683B (en) Anonymous electronic voting method based on block chain technology
Cachin On-line secret sharing
US5315658A (en) Fair cryptosystems and methods of use
CN110098923A (en) A kind of method and apparatus of generation and verifying temporary password
CN106789047A (en) A kind of block chain identification system
CN107274532A (en) The temporary password gate control system that encryption parameter dynamically updates
CN101753304B (en) Method for binding biological specificity and key
USRE36918E (en) Fair cryptosystems and methods of use
KR102011042B1 (en) Certificated quantum cryptosystem amd method
CN107146303A (en) Device, method and the gate control system opened the door using dynamic password
CN108777616B (en) Electronic election method, management device and electronic election system for resisting quantum computer attack
CN108989051A (en) A kind of dynamic password and its generating mode
CN113378148A (en) Internet of things equipment identity authentication system and method based on block chain
CN102045349B (en) Time and event based one-time password generation and authentication method
CN103718501B (en) Information processing device and method
CN110457928B (en) Hospital-enterprise cooperation internet hospital data security guarantee method based on block chain
CN116260587A (en) Quantum-resistant signature authentication method based on hash signature and having small size
Gao et al. Quantum election protocol based on quantum public key cryptosystem
CN115277040B (en) Medical health data storage and sharing method and system based on blockchain technology
CN110298941A (en) A kind of disposable temporary password generation method of intelligent door lock
CN112217632B (en) Identity authentication method and device based on intelligent contract and hash chain
CN109728908A (en) A kind of key management method based on quantum safety moving storage medium
Kim A reverse sequence hash chain-based access control for a smart home system
CN113691513A (en) Network security encryption method and system based on artificial intelligence
CN111708996A (en) Enterprise internal management consultation information sharing system based on Internet

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant