CN101291225A - Authentication method adopting complex cryptographic technique - Google Patents

Authentication method adopting complex cryptographic technique Download PDF

Info

Publication number
CN101291225A
CN101291225A CNA2008100948812A CN200810094881A CN101291225A CN 101291225 A CN101291225 A CN 101291225A CN A2008100948812 A CNA2008100948812 A CN A2008100948812A CN 200810094881 A CN200810094881 A CN 200810094881A CN 101291225 A CN101291225 A CN 101291225A
Authority
CN
China
Prior art keywords
user
serial number
password
subcodes
subcode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008100948812A
Other languages
Chinese (zh)
Inventor
丁洪涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA2008100948812A priority Critical patent/CN101291225A/en
Publication of CN101291225A publication Critical patent/CN101291225A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a method for utilizing the duplex type cryptographic technique to authenticate. The method comprises the following steps that: a plurality of subcodes are appointed for a user using a password, different subcodes correspond to different sequence numbers, and all the subcodes and the sequence numbers form a duplex type password; when the authentication process is performed, the sequence of all the sequence numbers is disrupted, the disrupted sequence numbers are indicated to the user; according to the indicated sequence numbers, the user inputs the subcodes corresponding to the sequence numbers in sequence to finish the input of the password; according to the passwords inputted by the user, the identity of the user is authenticated. In the process of authenticating the password of the user, the method can realize simple operation of the user and high security.

Description

A kind of method that adopts complex cryptographic technique to authenticate
Technical field
The invention belongs to the Ciphor safety technology field, be specifically related to a kind of method that adopts complex cryptographic technique to authenticate.
Background technology
Current society is along with the fast development of computer technology and the Internet, and (this paper indication password comprises the characteristic information that numeral, fingerprint, retina, voice and other various recognition technology are extracted to password, also comprises the heterozygote of these characteristic informations.) be widely used in our life.To protecting individual privacy and corporate secret and public and private property to have great significance.Particularly at some only interchange and information releasing and the security that flow between specified individual and property or the like within the specific limits, password is being brought into play the effect that is difficult to substitute especially.
At present the widely used scheme that authenticates by password of people institute is by user and service organization password of agreement in advance, and this password only reappoints just in case will change also in case arrange just can not change; Carry out password when authentication comparison if the user of password can input password accurately just can be by the authentication of service organization.This scheme is easy to learn concerning the user, and is easy to operate.Therefore adopted widely.
But the drawback of this authentication mode also is many, mainly shows:
Be decrypted easily when 1, password setting is simple and by being guessed, caused fail safe low;
Pass out of mind easily when 2, the password setting complexity is tediously long.The user who has for prevent password be decrypted password setting is got complicated tediously long, but difficult so again note, the user forgets password or the thing that misremembers also is a lot;
3, owing to the stationarity of password in this cryptography scheme, the user is spied in the process of using easily and is divulged a secret.Chinese patent application CN02112960.6 provides a kind of good peep-proof scheme, but this scheme can not solve other drawback of existing password scheme, but also has increased the complexity of operation;
4, in this cryptography scheme, service organization can only judge the true and false of password, and can not judge password user's identity.If the offender adopts violence or other means to obtain password user's true password, user's property just might incur loss so.Chinese patent application CN01108566.5 proposes a kind of scheme of warning at this drawback, but requires the victim that an emergency cryptosystem is provided when being injured in this scheme.Because this emergency cryptosystem do not use at ordinary times, and the situation when being injured is very nervous, and the victim can remember emergency cryptosystem and can tell like clockwork that the offender neither an easy thing, thus its put steal anti-riot effect neither be fine.And this scheme can not solve other drawback of existing scheme equally.
Nowadays, on the one hand people are more and more frequent to the use of password, and offender's case of utilizing password to carry out crime increases day by day on the other hand.Therefore provide a cipher authentication scheme simple to operate and security performance is higher, be not only the thing of individual or indivedual groups, but entire society's needs of economic development.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of method that adopts complex cryptographic technique to authenticate, simple to operate and fail safe is higher to realize that password to the user carries out in the verification process user.
The method that employing complex cryptographic technique of the present invention authenticates comprises:
A, arrange a plurality of subcodes with the user of password, the serial number that different subcodes is corresponding different, all subcodes and serial number thereof are formed multiple cipher jointly;
B, when authenticating, the order of described serial number is upset, and the serial number that will upset order is prompted to the user;
C, user import the subcode of each serial number correspondence successively according to the serial number of prompting, finish the input of password;
D, authenticate according to the password of user input identity to the user.
Wherein, described subcode adopts the form of one of following or combination in any: the characteristic information that numeral, literal, letter, color, pattern, fingerprint, retina, voice, recognition technology are extracted.
Preferable, the method that the described serial number that will upset order of step B is prompted to the user comprises: the serial number that will upset order in hidden mode is prompted to the user.
Wherein, described hidden mode comprises: the serial number that will upset order sends on this user's the mobile phone with way of short messages;
Perhaps, preestablish the arrangement mode of several serial numbers, the kind of the current arrangement mode correspondence of serial number is prompted to the user.
Optionally, step B further comprises: use interfere information that the serial number that is prompted to the user is disturbed, interfere information is offered the user simultaneously.
Wherein, described serial number and/or interfere information adopt the form of one of following or combination in any: numeral, literal, letter, color, pattern, sound, voice.
Optionally, the described authentication of step D comprises: judge when the user imports interfere information, think that then authentication is dangerous.
Optionally, the step of the described authentication of step D comprises: all subcodes of judging user's input are correct, and when meeting corresponding serial number, think that then authentication passes through; All subcodes of judging user's input are correct, but when not meeting corresponding serial number, think that then authentication is dangerous; The subcode of judging user's input is not exclusively correct, then thinks authentification failure.
Preferable, when described authentication is dangerous, further comprise the step of one of following or combination in any: the locking account, alarm, start corresponding security protection measure.
As seen from the above, the present invention is when requiring the user to import password authentification, can require user's input mode to change, as each subcode according to each different order input passwords, therefore fail safe is higher, after even the peep of cipher of certain input of user is stolen, because when requiring the input password authentification more next time, the sequence requirement of each subcode is with last time different, therefore stealing passwords person also can't import each subcode according to desired order, as seen, the pin mode fail safe with respect to prior art has had raising greatly.
On the other hand, owing to adopted the different mode of each input subcode order to guarantee fail safe, therefore, make the user operate and become simple owing to not needing the user to be provided with and writing down very long password.
Moreover, will import subcode and input sequence and carry out combination, can also effectively tell the user is output function mistake or disabled user, makes that antitheft and anti-riot effect of the present invention also is very significant.
The mode that adds interference code has in addition improved fail safe more, can avoid illegal user the agreement serial number by disturbing serial number to infer.
Description of drawings
The flow chart of Fig. 1 for adopting interactive complex cryptographic technique to authenticate.
Embodiment
Below with reference to the flow chart that the present invention shown in Fig. 1 adopts interactive complex cryptographic technique to authenticate, the present invention is described in detail.May further comprise the steps:
Step 101: at first the user of password and service organization arrange a plurality of relative simple passwords, and we are referred to as subcode this paper.Each subcode is also all arranged the serial number of a correspondence simultaneously.All subcodes with and corresponding serial number form multiple cipher together jointly.
Subcode and subcode are independent separately each other, and the serial number of different subcode correspondences also is independent separately, different each other.That is to say multiple cipher by being made up of several subcodes by serial number, we can say that also multiple cipher is divided into several sections by the rule of agreement, each part is exactly a subcode.Though subcode is simple relatively as can be seen, the multiple cipher of being made up of a plurality of subcodes but is a more complicated, so its decoding also is difficult.The same subcode with the existing password mode with and serial number in case agreement just no longer changes, so multiple cipher also is changeless, wants to change also only to reappoint.
Step 102: when needs authenticate the user, adopt interactive input mode, by the service system of service organization described serial number is upset at random earlier, be prompted to the user in hidden mode then.
That mentions here need include but not limited to the situation that the user authenticates: the authentication situation the when user operates by the bank cashier machine, authentication situation when perhaps the user carries out financial transaction by the internet, perhaps the user logins the authentication situation of certain network that need authenticate etc.
Here the hidden mode of mentioning refers to it is the mode that can understand with this user only.For example, can be by mode to the mobile phone sending order of this user registration number.For example, can also be the serial number that is set by the user several particular order in advance, during prompting user serial number, the kind that current serial number adopted can be prompted to the user, the mode of promptly pointing out the user to import which kind is carried out.
Step 103: the user is after obtaining prompting, and the subcode of inputing each serial number correspondence successively according to the serial number of prompting is finished the input of password.
Because the arrangement of serial number is changeable at random, although because of multiple ciphers a bit are changeless, its input mode is changeable at random, that is to say that the multiple cipher that service organization requires the user to import at every turn is all not necessarily identical in form.If when the user inputs password, spied on by the person of peeping accidentally like this, under the situation of the allocative decision of person of peeping's each subcode in not knowing multiple cipher and the serial number of each subcode correspondence, want that importing correct multiple cipher according to prompting at that time also is difficult to.Therefore multiple cipher has good peep-proof function.
Step 104: after the service system of service organization receives the password of user's input, can screen and make corresponding measure to user's identity to a certain extent, for example, can comprise following mode according to the situation of the password of importing:
1, Shu Ru all subcodes are entirely true, and meet corresponding serial number.At this moment can confirm that the importer is legal user, system can point out the user to carry out normal follow-up business.
2, Shu Ru all subcodes are entirely true, but do not meet corresponding serial number.At this moment can think that the importer is dangerous user, in a single day system makes this judgement, just can lock the account immediately, can start the safety that the legal user's of password life and property are protected in corresponding security protection measure to greatest extent simultaneously.Certain this situation may be that the offender does also might be the own input error of legal user, therefore also comprises in the security protection measure of system start-up behind account lockout allowing legal user to carry perfect instrument is made password to service organization agreement again.In addition service organization can also and public security department interlock, for the evidence obtaining of public security department and detection even arrest the offender advantageous conditions is provided.This point is very much important, and it is to offender's the fright effect security protection effect much larger than interactive multiple cipher self.Can just think has obtained subcode by kidnapping or other means as the offender, and the user gives the offender incorrect serial number or to their serial number.Input during multiple cipher because serial number is being pointed out at random by service organization, if be low-down, be to blow one's cover and arrested on the contrary to a great extent by public security department according to the principle offender of the permutation and combination success rate of feeling free to try.Therefore be widely used when this programme, when most of people know this scheme, utilize unlawful means to obtain password and carry out crime and will lose meaning.Antitheft and the anti-riot effect that this shows this cryptography scheme also is very significant.
3, Shu Ru subcode is not entirely true, just thinks that at this moment the importer is common illegal user.At this moment system carries out some necessary security protection measures on the one hand to protect legal user's legitimate interests; Point out input error to the importer on the other hand, and allow re-entering of certain number of times.Certainly user and service organization also can arrange other more suitable security protection measure in advance aspect this, the chance of correction are provided can for again when protecting user's interests to greatest extent the user when careless input password mistake.
On the basis of such scheme, the present invention also has following further step:
The serial number of user and service organization's agreement subcode can be used numeral, also can be other non-numeric characteristic information of being convenient to user's memory, such as literal, letter, color, pattern, sound and voice etc.Service organization except the serial number of agreement, can also be disturbed with other characteristic information when providing the prompting of serial number to the user.For example certain user and service organization arrange the interactive multiple cipher that four subcodes are arranged, and the serial number of these four subcodes is respectively red, yellow, blue, green.When service organization points out the color lump of these four colors for this user, can in four color lumps, accompany A, B, four letters of C, D respectively, after the user sees these promptings, because letter is not decided to be serial number approximately, directly provide the subcode of correspondence according to the color of color lump so can ignore, if in like manner Yue Ding serial number is A, B, C, D, also they can be placed in four color lumps and be prompted to the user.Disturbing serial number can also be two kinds or two or more, such as when accompanying alphabetical A, B, C, D in the superincumbent color lump, also accompanies numeral 1,2,3,4.Service organization should note the interference serial number that provides can not and about definite sequence number between the association that can be inferred is arranged, the agreement serial number to prevent illegal user by disturbing serial number to infer.
After user and service organization appoint interactive multiple cipher, the user will write the serial number of subcode and these subcode correspondences down.But light remembers that with brain these have some difficulty, the present invention adopts the method for carrier recording to address this problem, make the interactive multiple cipher very good note that becomes, the carrier of record should be convenient to the user and be convenient for carrying, as the card of special use, phone directory, mobile phone etc., so that the user takes when inputing password.Concrete grammar is as follows:
1, only subcode is noted and record serial number not, the user only need remember the serial number of subcode correspondence with brain like this, and it is just passable according to the subcode of record input correspondence to take out record carrier during input.Service organization should remind the user to adopt this recording mode, should avoid writing down the natural order of subcode and the similitude that put in order usually of agreement serial number, is that the pairing subcode of 1 (or A) just in time is recorded in first such as arranging serial number; To arrange serial number is that the pairing subcode of 2 (or B) just in time is recorded in second and so on.Memory for convenience can also be made some secret marks to the subcode of writing down and hint corresponding serial number.
2, subcode and corresponding serial number all being noted, is not the subcode of agreement but a subcode must be arranged, and this paper is called interference code with this subcode.A correct subcode is stashed and taken the serial number of this subcode by interference code, the user just only need remember that subcode that this is hidden and corresponding serial number are just passable like this.Being provided with of interference code can be prior and service organization's agreement, and in a single day the user has imported interference code like this, and the service system of service organization will think that the user starts corresponding security protection measure for the user of danger.If user's memory is relatively good, being provided with of interference code can also be more than two or two.
Last two methods are not all intactly noted interactive multiple cipher, and other people except the legal user of service organization and password also is to be difficult to grasp this password with this record only.When noting down, can also establish a group or more interference serial number in addition, disturb serial number can be inferred related can not be arranged with the agreement serial number.Such as being A, but disturbs the agreement serial number with numeral 1.These disturb serial number mutual agreement to be arranged with service organization, so that the service system of service organization adopts effective measures to prevent that the interference serial number of service system prompting from disturbing serial number just in time consistent with these.Careless loss of these record carriers or stolen also can not causing are divulged a secret like this.Just having time enough to carry perfect instrument simultaneously after the user is finding that record carrier is lost or be stolen removes to change password or applies for that new password protected the legitimate interests of oneself to service organization.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1, a kind of method that adopts complex cryptographic technique to authenticate is characterized in that, comprising:
A, arrange a plurality of subcodes with the user of password, the serial number that different subcodes is corresponding different, all subcodes and serial number thereof are formed multiple cipher jointly;
B, when authenticating, the order of described serial number is upset, and the serial number that will upset order is prompted to the user;
C, user import the subcode of each serial number correspondence successively according to the serial number of prompting, finish the input of password;
D, authenticate according to the password of user input identity to the user.
2, method according to claim 1 is characterized in that, described subcode adopts the form of one of following or combination in any:
The characteristic information that numeral, literal, letter, color, pattern, fingerprint, retina, voice, recognition technology are extracted.
3. method according to claim 1 is characterized in that, the method that the described serial number that will upset order of step B is prompted to the user adopts:
The serial number that to upset order in hidden mode is prompted to the user.
4, method according to claim 3 is characterized in that, described hidden mode comprises:
The serial number that to upset order sends on this user's the mobile phone with way of short messages.
5, method according to claim 3 is characterized in that, described hidden mode comprises:
Preestablish the arrangement mode of several serial numbers, the kind of the current arrangement mode correspondence of serial number is prompted to the user.
6, method according to claim 1 is characterized in that, step B further comprises:
Use interfere information that the serial number that is prompted to the user is disturbed, interfere information is offered the user simultaneously.
According to claim 1 or 6 described methods, it is characterized in that 7, described serial number and/or interfere information adopt the form of one of following or combination in any:
Numeral, literal, letter, color, pattern, sound, voice.
8, method according to claim 6 is characterized in that, the step of the described authentication of step D comprises:
Judge when the user imports interfere information, think that then authentication is dangerous.
9, method according to claim 1 is characterized in that, the step of the described authentication of step D comprises:
All subcodes of judging user's input are correct, and when meeting corresponding serial number, think that then authentication passes through;
All subcodes of judging user's input are correct, but when not meeting corresponding serial number, think that then authentication is dangerous;
The subcode of judging user's input is not exclusively correct, then thinks authentification failure.
10, according to Claim 8 or 9 described methods, it is characterized in that: when described authentication is dangerous, further comprise the step of one of following or combination in any:
Lock the account, alarm, start the security protection measure.
CNA2008100948812A 2007-04-27 2008-04-26 Authentication method adopting complex cryptographic technique Pending CN101291225A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008100948812A CN101291225A (en) 2007-04-27 2008-04-26 Authentication method adopting complex cryptographic technique

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN200710105610.8 2007-04-27
CN200710105610 2007-04-27
CNA2008100948812A CN101291225A (en) 2007-04-27 2008-04-26 Authentication method adopting complex cryptographic technique

Publications (1)

Publication Number Publication Date
CN101291225A true CN101291225A (en) 2008-10-22

Family

ID=40035324

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008100948812A Pending CN101291225A (en) 2007-04-27 2008-04-26 Authentication method adopting complex cryptographic technique

Country Status (1)

Country Link
CN (1) CN101291225A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604366A (en) * 2009-07-13 2009-12-16 中山爱科数字科技有限公司 A kind of password separate dynamic verification method and system
CN102737195A (en) * 2012-07-04 2012-10-17 周灿旭 Master and slave dynamic passwords
CN103368928A (en) * 2012-04-11 2013-10-23 富泰华工业(深圳)有限公司 System and method for resetting account password
CN103971048A (en) * 2014-04-30 2014-08-06 宇龙计算机通信科技(深圳)有限公司 Method and system for entering password
CN104021322A (en) * 2013-02-28 2014-09-03 北京旋极信息技术股份有限公司 Electronic signature method, electronic signature equipment and electronic signature client
CN104639563A (en) * 2015-03-02 2015-05-20 利诚服装集团股份有限公司 Method and device for safely processing data
CN104834840A (en) * 2014-07-03 2015-08-12 中国人民解放军92728部队 Password protection method based on mapping drifting technology
CN105812135A (en) * 2014-12-30 2016-07-27 中国移动通信集团公司 Dynamic password authentication method and system
CN106453209A (en) * 2015-08-07 2017-02-22 阿里巴巴集团控股有限公司 Identity verifying method and apparatus
WO2017028241A1 (en) * 2015-08-18 2017-02-23 赵政荣 Dual-password authentication unlocking method, and portable safe
CN108229186A (en) * 2017-12-28 2018-06-29 深圳天珑无线科技有限公司 Verification method, verification system and electronic equipment
CN109636982A (en) * 2018-12-19 2019-04-16 广东工业大学 A kind of gate inhibition's open method, system and relevant apparatus
CN109636983A (en) * 2018-12-19 2019-04-16 广东工业大学 A kind of access control method, device and access control system
US10819829B2 (en) * 2018-08-02 2020-10-27 Mastercard International Incorporated Methods and systems for facilitating a client-server communication using cyclic tokens

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604366B (en) * 2009-07-13 2013-03-06 中山爱科数字科技股份有限公司 Password separate dynamic verification method and system
CN101604366A (en) * 2009-07-13 2009-12-16 中山爱科数字科技有限公司 A kind of password separate dynamic verification method and system
CN103368928A (en) * 2012-04-11 2013-10-23 富泰华工业(深圳)有限公司 System and method for resetting account password
CN102737195A (en) * 2012-07-04 2012-10-17 周灿旭 Master and slave dynamic passwords
CN104021322A (en) * 2013-02-28 2014-09-03 北京旋极信息技术股份有限公司 Electronic signature method, electronic signature equipment and electronic signature client
CN103971048B (en) * 2014-04-30 2017-12-15 宇龙计算机通信科技(深圳)有限公司 A kind of method and its password input system for inputting password
CN103971048A (en) * 2014-04-30 2014-08-06 宇龙计算机通信科技(深圳)有限公司 Method and system for entering password
CN104834840B (en) * 2014-07-03 2018-05-08 中国人民解放军92728部队 Cipher code protection method based on mapping drift technology
CN104834840A (en) * 2014-07-03 2015-08-12 中国人民解放军92728部队 Password protection method based on mapping drifting technology
CN105812135A (en) * 2014-12-30 2016-07-27 中国移动通信集团公司 Dynamic password authentication method and system
CN104639563A (en) * 2015-03-02 2015-05-20 利诚服装集团股份有限公司 Method and device for safely processing data
CN106453209A (en) * 2015-08-07 2017-02-22 阿里巴巴集团控股有限公司 Identity verifying method and apparatus
CN106453209B (en) * 2015-08-07 2020-01-21 阿里巴巴集团控股有限公司 Identity verification method and device
WO2017028241A1 (en) * 2015-08-18 2017-02-23 赵政荣 Dual-password authentication unlocking method, and portable safe
CN108229186A (en) * 2017-12-28 2018-06-29 深圳天珑无线科技有限公司 Verification method, verification system and electronic equipment
US10819829B2 (en) * 2018-08-02 2020-10-27 Mastercard International Incorporated Methods and systems for facilitating a client-server communication using cyclic tokens
CN109636982A (en) * 2018-12-19 2019-04-16 广东工业大学 A kind of gate inhibition's open method, system and relevant apparatus
CN109636983A (en) * 2018-12-19 2019-04-16 广东工业大学 A kind of access control method, device and access control system

Similar Documents

Publication Publication Date Title
CN101291225A (en) Authentication method adopting complex cryptographic technique
US8452979B2 (en) Portable telecommunications apparatus
US8561174B2 (en) Authorization method with hints to the authorization code
CN104537300B (en) Security password setting and verification mode
US8555337B2 (en) Method and arrangement for user friendly device authentication
JP2009517751A (en) Method and apparatus for verifying the identity or qualification of a person using a one-time transaction code
CN104408363B (en) Security code system
CN104798083A (en) Method and system for verifying an access request
EP3053079A1 (en) System and a method for validating an identification token
CN1523809A (en) Password variable identification verification technique
CN104680670A (en) Re-encryption/encryption technique solution for key control points during bank card operation on ATM (automatic teller machine)
KR101228090B1 (en) System and method for inputing password
CN110310406A (en) Unlocking method of intelligent door lock and intelligent door lock
KR20080087917A (en) System for certify one-time password, system for issue a seed, and method for generating one-time password
JP2010165323A (en) Biometric authentication method and system
KR101330113B1 (en) Authentication apparatus and method based on position value
CN1848726A (en) Dynamic identifying method
CN105007267A (en) Privacy protection method and device
KR100625081B1 (en) The Method of safe certification service
KR101624394B1 (en) Device for authenticating password and operating method thereof
JP2013250944A (en) Input information authentification device, server device, and program for input information authentication system and device
JP2003157412A (en) Client device, pin lock release device and pin lock release method
JP5574005B2 (en) Biometric authentication method and system
KR100515688B1 (en) Method for controlling digital door-lock
CN109246154B (en) Wrist type cipher device and cipher communication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20081022