CN108989051A - A kind of dynamic password and its generating mode - Google Patents
A kind of dynamic password and its generating mode Download PDFInfo
- Publication number
- CN108989051A CN108989051A CN201810980886.9A CN201810980886A CN108989051A CN 108989051 A CN108989051 A CN 108989051A CN 201810980886 A CN201810980886 A CN 201810980886A CN 108989051 A CN108989051 A CN 108989051A
- Authority
- CN
- China
- Prior art keywords
- password
- code
- minutes
- practical
- seconds
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0872—Generation of secret information including derivation or calculation of cryptographic keys or passwords using geo-location information, e.g. location data, time, relative position or proximity to other entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention provides a kind of dynamic password and its generating modes, belong to field of information security technology.It solves the problems, such as that existing dynamic password generating mode is single.This dynamic password is made of at least four groups of numbers, including one group of practical door-opening password, one group of minutes code, one group of seconds code and one group of password type code, practical minute, seconds when the minutes code is by application password convert to obtain, practical seconds when the seconds code is by application password convert to obtain, and the password type code is converted to obtain by cryptographic validity and practical minutes.Dynamic password of the invention can be automatically generated according to the time of application password according to ad hoc rules, and safety is good.Cipher random generates, primary effectively to become invalid after the specified date, and fundamentally solves bring risk due to password leakage, promotes management safety.
Description
Technical field
The invention belongs to field of information security technology, it is related to a kind of dynamic password and its generating mode.
Background technique
Dynamic password is that a uncertain random digit combination is generated according to special algorithm, and each password can only make
With primary, it is widely used in the application fields such as Internetbank, network game, telecom operators, E-Government, enterprise at present.
Dynamic password is a kind of account anti-theft technology of safe and convenient, the certification peace that can be traded and be logged in effective protection
Entirely, it is just not necessarily to periodic modification password using dynamic password, saves worry safely, this is an extra value of this technology, to enterprise's thing
Industry internal applications are particularly useful.The generating mode of existing dynamic password is relatively simple, is easy to generate rule by broken pick out of criminal
Then, it still needs further improvement for safety.
Summary of the invention
The first purpose of this invention be for the above problem present in existing dynamic password, and propose it is a kind of with
Application time is according to the dynamic password generated.
The first purpose of this invention can be realized by the following technical scheme:
A kind of dynamic password, which is characterized in that it is made of at least four groups of numbers, including one group of practical door-opening password, and one
Group minutes code, one group of seconds code and one group of password type code, the minutes code are close by applying
Practical minute, seconds when code convert to obtain, the practical seconds when seconds code is by application password
Conversion obtains, and the password type code is converted to obtain by cryptographic validity and practical minutes.
The practical door-opening password has two, and minutes code has two, and seconds code has one, cipher type
Type code has one.
The sequence of the dynamic password is followed successively by practical door-opening password, minutes code, seconds code and password
Type code, each code are decimal number.
In a kind of above-mentioned dynamic password, the minutes code (XY) have third gear, when XY be in 00-29 it
Between when, indicate application password when practical minutes be located in this minutes section XY*2~XY*2+1, at XY
When between 30~59, indicate to be located at (XY-30) * 2~(XY-30) * 2+1 by practical minutes when application password that this is a
In minutes section, and seconds code has tens " 1 ";When XY is between 60~89, indicate that application is close
Practical minutes when code are located in this minutes section (XY-60) * 2~(XY-60) * 2+1, and seconds
Code has tens " 2 ".
In a kind of above-mentioned dynamic password, described seconds code (MN) numerical value indicates application between 00-29
Practical seconds when password are located in this seconds section MN*2~MN * 2+1, and ten of seconds code
Number is hidden.Password digit is reduced, two seconds codes can be indicated with one digit number combination third gear minutes code.
In a kind of above-mentioned dynamic password, the password type code is divided into 0-1,2-3,4-5,6-7,8-9 five
Shelves, five grades of password type codes correspond five grades of cryptographic validities, and practical minutes are before corresponding to minutes section
When digit, password type code is also the preceding digit of corresponding shelves, and practical minutes are the rear digit in corresponding minutes section
When, password type code is also the rear digit of corresponding shelves.
In a kind of above-mentioned dynamic password, when the password type code is 0-1, corresponding cryptographic validity is 5
Minute, when the password type code is 2-3, corresponding cryptographic validity is 10 minutes, and the password type code is
When 4-5, corresponding cryptographic validity is 15 minutes, and when the password type code is 6-7, corresponding cryptographic validity is 20
Minute, when the password type code is 8-9, corresponding cryptographic validity is 30 minutes.
In a kind of above-mentioned dynamic password, there are also one group of password application Ser. No, the password Shens for the dynamic password
Please serial number indicate number of the period indicated in minutes code and seconds code to platform application password.
Password application Ser. No is hidden when being equal to 1.
Second object of the present invention be for the above problem present in existing dynamic password, and propose it is a kind of with
Application time is the method according to the dynamic password generated.
Second object of the present invention can be realized by the following technical scheme:
A kind of generating mode of dynamic password, which is characterized in that it includes the following steps:
1, user sends application signal to platform and carries out password application;
2, platform generates the 5th bps clock time code and 3-4 minutes according to the inquiry for receiving the password application moment
Time code;
3, the 6th password type code is generated according to the practical minute of cryptographic validity type and application;
4, platform records the number of application password in the time interval, generates the 7th password application Ser. No;
5, correct the GMT value for participating in calculating according to rule according to 3-6 place value, then by 4 byte times of GMT time stamp and
7th data AES128 key corresponding with application equipment is assembled into seed, generates 1-2 through dynamic password algorithm and actually opens
Door password;
6, practical door-opening password and the 3rd, 4,5,6 generated are combined into 6 passwords again;
If 7, password application Ser. No is greater than 1,7 passwords are formed in step 6;
8, applicant is handed down to after password order conversions algorithm carries out order conversions.
Compared with prior art, dynamic password of the invention can give birth to automatically according to the time of application password according to ad hoc rules
At safety is good.Get rid of the constraint of conventional cipher memory management, it is no longer necessary to remember many and diverse, a large amount of number, also no longer need
It regularly updates, promotes the efficiency of management;It avoids post personnel from adjusting the transition of bring password, lowers management cost.Password
It is randomly generated, it is primary effectively to become invalid after the specified date, it fundamentally solves bring risk due to password leakage, promotes management safety.
Specific embodiment
The following is specific embodiments of the present invention, and technical scheme of the present invention will be further described, but the present invention is simultaneously
It is not limited to these embodiments.
A kind of dynamic password provided by the invention is made of at least four groups of numbers, including one group of practical door-opening password, and one group
Minutes code, one group of seconds code and one group of password type code, the minutes code is by application password
When practical minute, seconds convert to obtain, the practical seconds when seconds code is by application password change
It obtains, the password type code is converted to obtain by cryptographic validity and practical minutes.
Practical door-opening password has two, and minutes code has two, and seconds code has one, password type code
There is one.
In the present embodiment, the sequence of dynamic password is followed successively by practical door-opening password, minutes code, seconds code
With password type code, each code is decimal number, and the 1st~2 is practical door-opening password, and the 3rd~4 is minutes generation
Code, the 5th is seconds code, and the 6th is password type code.
Minutes code (XY) has third gear, when XY is between 00-29, indicates practical minute when application password
Time is located in this minutes section XY*2~XY*2+1, for example, XY be " 00 " when, corresponding minutes section is
" 0~1 ", when XY is " 15 ", corresponding minutes section is " 30~31 ", when XY is " 29 ", corresponding minutes section
For " 58~59 ";When XY be in 30~59 between when, indicate application password when practical minutes be located at (XY-30) * 2~
(XY-30) in this minutes section * 2+1, for example, XY be " 30 " when, corresponding minutes section be " 0~1 ", XY
When for " 45 ", corresponding minutes section is " 30~31 ", when XY is " 59 ", corresponding minutes section be " 58~
59 ", and the 5th bps clock time code has tens " 1 ";When XY is between 60~89, when indicating to apply for password
Practical minutes are located in this minutes section (XY-60) * 2~(XY-60) * 2+1, for example, XY be " 60 " when, it is right
The minutes section answered is " 0~1 ", and when XY is " 75 ", corresponding minutes section is " 30~31 ", when XY is " 89 ",
Corresponding minutes section is " 58~59 ", and the 5th bps clock time code has tens " 2 ".From the foregoing, it will be observed that any
Minutes section was constituted by continuous 2 minutes, and the preceding digit in minutes section is even minutes, and rear digit is odd number
Minute.
Seconds code (MN) numerical value applies for that practical seconds when password are located at MN*2~MN* between 00-29
In the seconds section of 2+1.Any seconds section was constituted by continuous 2 seconds, the preceding digit in seconds section
For even number second, rear digit is odd number second.When MN is units, the 5th directly displays units, and tens " 0 " is hidden;When
When MN has tens " 1 " or " 2 ", units is only shown, and hide its tens.When MN is 0, reality when application password is indicated
Border second is located in this seconds section " 0-1 ", when MN is 15, indicates being located in for practical second when application password
In this seconds section " 30-31 ", MN be 29 when, indicate application password when be located within practical second " 58-59 " this
In one seconds section.Therefore system can be according to practical second determining MN numerical value of application password, for example, application password
When practical second when being " 37 ", in this practical second seconds section positioned at " 36-37 ", i.e. MN is " 18 ", and should
Second have tens " 1 " (but tens " 1 " is not shown on the 5th), indicate minutes code XY be in 30~59 this
In one grade;Practical second when applying for password when being " 11 ", in this practical second seconds section positioned at " 10-11 ", MN
As " 5 " indicate that minutes code XY is in 00~29 this shelves;Apply password when practical second be " 57 " when, should
MN is " 28 ", and this second has tens " 2 " in the seconds section of " 56-57 " within practical second, indicates minute
Time code XY is in 60~89 this shelves.After which shelves minutes code (XY) when determining application password belongs to,
In conjunction with practical minutes, that is, it can determine the numerical value of XY, however, it is determined that minutes code XY is in 60~89 this shelves, table
Show that practical minutes when application password are located in this minutes section (XY-60) * 2~(XY-60) * 2+1, it is false
If practical application minutes are 20 points, then XY is " 70 ".
Password type code has 5 grades, respectively " 0~1 ", " 2~3 ", " 4~5 ", " 6~7 ", " 8~9 ", password type generation
It when code is " 0 ", indicates that cryptographic validity is 5 minutes, and indicates that practical minutes are the preceding digit in minutes section, it is close
It when code type code is " 1 ", indicates that cryptographic validity is 5 minutes, and indicates practical minutes for behind minutes section
Digit.Therefore first passing through can be true after digit after determining preceding digit of the practical minutes in corresponding minutes section still
The password type code of this fixed grade, such as practical minutes are 21 minutes, and cryptographic validity is 5 minutes, then the practical minute
Time is the rear digit in " 20~21 " this minutes section, then password type code is " 1 " at this time;Practical minutes
When being 40 minutes, cryptographic validity is 5 minutes, which is the anteposition in " 40~41 " this minutes section
Number, then password type code is " 0 " at this time.
When password type code is " 2 ", when indicating that cryptographic validity is 10 minutes, and indicating that practical minutes are minute
Between section preceding digit, when password type code is " 3 ", indicates that cryptographic validity is 10 minutes, and indicate practical minutes
For the rear digit in minutes section;When password type code is " 4 ", indicate that cryptographic validity is 15 minutes, and indicate practical
Minutes are the preceding digit in minutes section, when password type code is " 5 ", indicate that cryptographic validity is 15 minutes, and
Indicate that practical minutes are the rear digit in minutes section;When password type code is " 6 ", indicate that cryptographic validity is 20
Minute, and indicate that practical minutes are the preceding digit in minutes section, when password type code is " 7 ", indicate that password has
The effect phase is 20 minutes, and indicates that practical minutes are the rear digit in minutes section;When password type code is " 8 ", table
Show that cryptographic validity is 30 minutes, and indicate that practical minutes are the preceding digit in minutes section, password type code is
It when " 9 ", indicates that cryptographic validity is 30 minutes, and indicates that practical minutes are the rear digit in minutes section.
Dynamic password further includes the 7th password application Ser. No, which is the Shen indicated at 3-5
Please the received password request times of time interval inner platform, a platform password application of every reception, password application Ser. No be incremented by
1, highest is incremented to 9.Server at most receives 9 password applications in 2S seconds.
For example, practical second is " 15 " when the application password real time is 20 points and 15 seconds, it is located at 14-15 within this practical second
Seconds section in, MN*2+1=15, MN=7, thus apply password when practical minutes be located at XY*2~XY*2+
In 1 this minutes section, the numerical value of XY*2=20, XY are " 10 ", and 3-5 numerical value is " 107 ", it is assumed that password is effective
Phase is 5 minutes, then password type code is " 0 ", and 3-6 data are " 1070 ".
When the real time for applying for password is 20 points and 14 seconds, practical second is " 14 ", is located within this practical second the second of 14-15
In clock time section, MN*2=14, MN=7, therefore apply password when practical minutes be located at XY*2~XY*2+1 this
In minutes section, the numerical value of XY*2=20, XY are " 10 ", and 3-5 numerical value is " 107 ", it is assumed that cryptographic validity 5
Minute, then password type code is " 0 ", and 3-6 data are " 1070 ".Therefore, apply for dynamic password produced by password in 2 seconds
3-6 be possible to it is identical, need at this time to participate in calculate GMT be modified, be modified to " 14~15 " this second
The time that time interval starts.
Platform end dynamic password generating mode includes the following steps:
S1, user send application signal to platform and carry out password application, and cryptographic validity type may be selected when transmission;
S2, platform are generated according to the time (namely above-mentioned described application time) of the time of reception according to the above method
3-4 minutes codes and the 5th bps clock time code;
S3, the 6th password type code is generated according to the practical minute of cryptographic validity type and application;
S4, platform record the number of application password in the seconds segment where this application time, generate the 7th it is close
Code application Ser. No;
The GMT for participating in calculating is modified to corresponding seconds by S5, the 3-6 data obtained according to step S2 and S3
The time numerical value that section starts, then the 4 byte times stamp of revised inquiry and the 7th data is corresponding with application equipment
AES128 key be assembled into seed, through dynamic password algorithm generate 1-2 practical door-opening passwords;
S6, again by practical door-opening password and generate the 3rd, 4,5,6, be combined into 6 passwords;
If S7, application password code of number are greater than 1,7 passwords are formed in step 6;
S8, the binary-coded decimal convenient for sending is converted by metric 7 passwords;
S9, applicant is handed down to after the binary-coded decimal in S8 is carried out order conversions by password order conversions algorithm.
The binary-coded decimal received is converted to decimal number by S10, cell phone application, this is the unlocking cipher that user is immediately seen.
The dissection process of door lock end password:
When being unlocked using unlocking cipher, the unlocking cipher received is sent to (the " # " number end of intelligent door lock end by user
Password Input), system first carries out order conversions reduction order with " order conversions algorithm ", and converts and be reduced to decimal number, root
According to the 3rd of dynamic password the, 4,5,6 data, the correction value for generating GMT (it should be noted that when midnight alternation is at morning, is answered correct
Amendment participates in the GMT date calculated, such as: the time of server is 2018.05.10 23:59:58 when password application, by password
After being input to door lock, the time of door lock is 2018.05.11 00:01:10, should be by the GMT time complexity curve of calculating at this time
2018.05.10 23:59:58), then obtained by the 4 byte times stamp of revised inquiry and from server
AES128 key and the 7th password application Ser. No are assembled into seed (if without the 7th, filling the 7th digit " 1 "),
2 passwords are generated through dynamic password algorithm, are compared with 1-2 of the password of input, it is identical, it opens the door, it is different then send out
It alerts out.According to the 6th determining cryptographic validity, i.e., by the practical inquiry of door lock and after being corrected according to password inquiry into
Row compares, and is greater than corresponding time, password failure.If each password is used only once, door lock end will be to just normally opened mistake
The password of door is recorded, even if should be rejected with the secret number for the second time in cryptographic validity.
System can be divided into user terminal peace end, and user terminal commonly cell phone application knows that Binary Conversion is ten in advance
The transformation rule of system number, platform end have signal transmitting module and signal receiving module.
It should be understood that in claims of the present invention, specification, all " including ... " should be understood as open
Meaning, that is, its meaning is equal to " at least containing ... ", but should not be understood as enclosed meaning, i.e., its meaning is not answered
This is interpreted as " only including ... ".
Specific embodiment described herein is only an example for the spirit of the invention.The neck of technology belonging to the present invention
The technical staff in domain can make various modifications or additions to the described embodiments or replace by a similar method
In generation, however, it does not deviate from the spirit of the invention or beyond the scope of the appended claims.
Claims (10)
1. a kind of dynamic password, which is characterized in that it is made of at least four groups of numbers, including one group of practical door-opening password, and one group
Minutes code, one group of seconds code and one group of password type code, the minutes code is by application password
When practical minute, seconds convert to obtain, the practical seconds when seconds code is by application password change
It obtains, the password type code is converted to obtain by cryptographic validity and practical minutes.
2. a kind of dynamic password according to claim 1, which is characterized in that the practical door-opening password has two, point
Clock time code has two, and seconds code has one, and password type code has one.
3. a kind of dynamic password according to claim 2, which is characterized in that the sequence of the dynamic password is followed successively by reality
Door-opening password, minutes code, seconds code and password type code, each code are decimal number.
4. a kind of dynamic password according to claim 3, which is characterized in that the minutes code (XY) has three
Shelves indicate that practical minutes when application password are located at this minute of XY*2~XY*2+1 when XY is between 00-29
In time interval, when XY be in 30~59 between when, indicate application password when practical minutes be located at (XY-30) * 2~
(XY-30) in this minutes section * 2+1, and seconds code has tens " 1 ";When XY is in 60~89
Between when, indicate application password when practical minutes be located at this minutes area (XY-60) * 2~(XY-60) * 2+1
In, and seconds code has tens " 2 ".
5. a kind of dynamic password according to claim 3, which is characterized in that described seconds code (MN) numerical value exists
Between 00-29, indicate that practical seconds when application password are located in this seconds section MN*2~MN*2+1, the second
The tens of clock time code is hidden.
6. a kind of dynamic password according to claim 3, which is characterized in that the password type code is divided into 0-1,2-
3, five grades of 4-5,6-7,8-9, five grades of password type codes correspond five grades of cryptographic validities, and practical minutes are corresponding point
When the preceding digit in clock time section, password type code is also the preceding digit of corresponding shelves, when practical minutes are corresponding minute
Between section rear digit when, password type code is also the rear digit of corresponding shelves.
7. a kind of dynamic password according to claim 3, which is characterized in that right when the password type code is 0-1
The cryptographic validity answered is 5 minutes, and when the password type code is 2-3, corresponding cryptographic validity is 10 minutes, described
Password type code when being 4-5, corresponding cryptographic validity is 15 minutes, corresponding when the password type code is 6-7
Cryptographic validity be 20 minutes, the password type code be 8-9 when, corresponding cryptographic validity be 30 minutes.
8. a kind of dynamic password according to claim 3, which is characterized in that there are also one group of password Shens for the dynamic password
Please serial number, which indicates the period indicated in minutes code and seconds code to platform Shen
Please password number.
9. a kind of dynamic password according to claim 8, which is characterized in that password application Ser. No is hidden when being equal to 1.
10. a kind of generating mode of dynamic password, which is characterized in that it includes the following steps:
S1, user send application signal to platform and carry out password application;
When S2, platform generate the 5th bps clock time code and 3-4 minutes according to the inquiry for receiving the password application moment
Between code;
S3, the 6th password type code is generated according to the practical minute of cryptographic validity type and application;
S4, platform record the number of application password in the time interval, generate the 7th password application Ser. No;
S5, it is stabbed and the 7th according to 3-6 place value according to the regular GMT value corrected and participate in calculating, then by 4 byte times of inquiry
Data AES128 key corresponding with application equipment is assembled into seed, and it is close to generate 1-2 practical enablings through dynamic password algorithm
Code;
S6, again by practical door-opening password and generate the 3rd, 4,5,6, be combined into 6 passwords;
If S7, password application Ser. No are greater than 1,7 passwords are formed in step S6;
S8, applicant is handed down to after password order conversions algorithm carries out order conversions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810980886.9A CN108989051B (en) | 2018-08-27 | 2018-08-27 | Method for generating dynamic password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810980886.9A CN108989051B (en) | 2018-08-27 | 2018-08-27 | Method for generating dynamic password |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108989051A true CN108989051A (en) | 2018-12-11 |
CN108989051B CN108989051B (en) | 2021-04-23 |
Family
ID=64546681
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810980886.9A Active CN108989051B (en) | 2018-08-27 | 2018-08-27 | Method for generating dynamic password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108989051B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110517389A (en) * | 2019-08-30 | 2019-11-29 | 联永智能科技(上海)有限公司 | Generation, verification method, device, equipment and the storage medium of device password |
CN114257455A (en) * | 2021-12-28 | 2022-03-29 | 北京爱学习博乐教育科技有限公司 | Method and system for connecting enterprise VPN by using dynamic password |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090013390A1 (en) * | 2007-07-06 | 2009-01-08 | Li Gong Ling | Security Device And Method Incorporating Multiple Varying Password Generator |
CN104539421A (en) * | 2014-08-22 | 2015-04-22 | 南京速帕信息科技有限公司 | Realizing method for mobile token based on dynamic algorithm seed |
CN105515769A (en) * | 2016-01-12 | 2016-04-20 | 汉柏科技有限公司 | Dynamic password generation method and dynamic password generation system for network equipment |
CN106254068A (en) * | 2016-08-18 | 2016-12-21 | 张晓辉 | The generation of pure software dynamic password and verification method thereof |
CN106869616A (en) * | 2017-03-05 | 2017-06-20 | 宁波亿拍客网络科技有限公司 | A kind of dynamic puzzle-lock, dynamic cipher system and dynamic encryption and decryption system |
CN107146303A (en) * | 2017-04-25 | 2017-09-08 | 深圳市万睿智能科技有限公司 | Device, method and the gate control system opened the door using dynamic password |
-
2018
- 2018-08-27 CN CN201810980886.9A patent/CN108989051B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090013390A1 (en) * | 2007-07-06 | 2009-01-08 | Li Gong Ling | Security Device And Method Incorporating Multiple Varying Password Generator |
CN104539421A (en) * | 2014-08-22 | 2015-04-22 | 南京速帕信息科技有限公司 | Realizing method for mobile token based on dynamic algorithm seed |
CN105515769A (en) * | 2016-01-12 | 2016-04-20 | 汉柏科技有限公司 | Dynamic password generation method and dynamic password generation system for network equipment |
CN106254068A (en) * | 2016-08-18 | 2016-12-21 | 张晓辉 | The generation of pure software dynamic password and verification method thereof |
CN106869616A (en) * | 2017-03-05 | 2017-06-20 | 宁波亿拍客网络科技有限公司 | A kind of dynamic puzzle-lock, dynamic cipher system and dynamic encryption and decryption system |
CN107146303A (en) * | 2017-04-25 | 2017-09-08 | 深圳市万睿智能科技有限公司 | Device, method and the gate control system opened the door using dynamic password |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110517389A (en) * | 2019-08-30 | 2019-11-29 | 联永智能科技(上海)有限公司 | Generation, verification method, device, equipment and the storage medium of device password |
CN110517389B (en) * | 2019-08-30 | 2021-11-09 | 联永智能科技(上海)有限公司 | Method, device, equipment and storage medium for generating and verifying equipment password |
CN114257455A (en) * | 2021-12-28 | 2022-03-29 | 北京爱学习博乐教育科技有限公司 | Method and system for connecting enterprise VPN by using dynamic password |
Also Published As
Publication number | Publication date |
---|---|
CN108989051B (en) | 2021-04-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109523683B (en) | Anonymous electronic voting method based on block chain technology | |
Cachin | On-line secret sharing | |
US5315658A (en) | Fair cryptosystems and methods of use | |
CN110098923A (en) | A kind of method and apparatus of generation and verifying temporary password | |
CN106789047A (en) | A kind of block chain identification system | |
CN107274532A (en) | The temporary password gate control system that encryption parameter dynamically updates | |
CN101753304B (en) | Method for binding biological specificity and key | |
USRE36918E (en) | Fair cryptosystems and methods of use | |
KR102011042B1 (en) | Certificated quantum cryptosystem amd method | |
CN107146303A (en) | Device, method and the gate control system opened the door using dynamic password | |
CN108777616B (en) | Electronic election method, management device and electronic election system for resisting quantum computer attack | |
CN108989051A (en) | A kind of dynamic password and its generating mode | |
CN113378148A (en) | Internet of things equipment identity authentication system and method based on block chain | |
CN102045349B (en) | Time and event based one-time password generation and authentication method | |
CN103718501B (en) | Information processing device and method | |
CN110457928B (en) | Hospital-enterprise cooperation internet hospital data security guarantee method based on block chain | |
CN116260587A (en) | Quantum-resistant signature authentication method based on hash signature and having small size | |
Gao et al. | Quantum election protocol based on quantum public key cryptosystem | |
CN115277040B (en) | Medical health data storage and sharing method and system based on blockchain technology | |
CN110298941A (en) | A kind of disposable temporary password generation method of intelligent door lock | |
CN112217632B (en) | Identity authentication method and device based on intelligent contract and hash chain | |
CN109728908A (en) | A kind of key management method based on quantum safety moving storage medium | |
Kim | A reverse sequence hash chain-based access control for a smart home system | |
CN113691513A (en) | Network security encryption method and system based on artificial intelligence | |
CN111708996A (en) | Enterprise internal management consultation information sharing system based on Internet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |