CN101316166A - Dynamic password identity authentication method based on accidental character set - Google Patents

Dynamic password identity authentication method based on accidental character set Download PDF

Info

Publication number
CN101316166A
CN101316166A CNA2008100316954A CN200810031695A CN101316166A CN 101316166 A CN101316166 A CN 101316166A CN A2008100316954 A CNA2008100316954 A CN A2008100316954A CN 200810031695 A CN200810031695 A CN 200810031695A CN 101316166 A CN101316166 A CN 101316166A
Authority
CN
China
Prior art keywords
character
dynamic password
user
generator matrix
dot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008100316954A
Other languages
Chinese (zh)
Inventor
张寄望
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA2008100316954A priority Critical patent/CN101316166A/en
Publication of CN101316166A publication Critical patent/CN101316166A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a dynamic password identity authentification method on the basis of a random character group, which includes the steps that: (1) a user password is selected and set up from a cipher character group composed of K characters; (2) a memory matrix of M multiplied by N is set up and each square of the memory matrix has a different character; (3) when an authentification request is transmitted, a computer or server generates a generator matrix corresponding to the memory matrix randomly, the cipher character group is arranged in the square of the generator matrix randomly, all the characters contained in the squares are all different to each other; (4) according to the specific position M<i>N<i> of the first digit character of the user cipher in the generator matrix, the user can find a character from the M<i>N<i> square of the memory matrix corresponding to the generator matrix and use the character as a first digit character of the dynamic password; thus a dynamic password can be formed in the similar way; (5) the authentification is finished: the computer or server judges if the dynamic password input by the user is correct. The invention has the advantages of simple principle, higher safety performance and easy generalization and so on.

Description

Dynamic password identity authentication method based on the random character group
Technical field
The present invention is mainly concerned with the field of identity authentication under the computer system, refers in particular to a kind of dynamic password identity authentication method based on the random character group.
Background technology
As everyone knows, authentication is the basis of all information securities.The identity identifying technology that current network or computer system adopt mainly contains five kinds, i.e. static password, cryptoguard card, dynamic password, PKI and digital certificate and living things feature recognition.
Static password is owing to be simple and easy to usefulness, and current use is the most general, but its fail safe extreme difference only can be applied to the occasion not high to safety requirements.
The cryptoguard card is a n*n character matrix, the user with the binding of account number and cryptoguard card after, will receive prompting at random during each login system from system, the user only need insert the numeral of corresponding coordinate on the cryptoguard card and can land.Cryptoguard card use cost is low, operates fairly simple, safe in static password.But inconvenience is carried in its existence, use shortcomings such as trouble, and its fail safe is not high enough, and wooden horse can crack by the input each time of supervisory user.Thereby the useful life of cryptoguard card is short.As a kind of supplementary means, cooperate static password protection account number at present.
The fail safe of PKI and digital certificate technique is higher, it can also provide digital signature function to realize undeniable feature except authentication, it is cumbersome that but this system uses, management is complicated, cost is higher, therefore only be applicable to occasions such as needing digital signature at present, and can't popularize.
The technology type of living things feature recognition is a lot; though they have its characteristics in fail safe; but also there are some problems in actual use; for example discrimination is not high, system cost is higher, remote identification is difficult, individual privacy is difficult to protection etc., so do not adopt in a large number at information network system at present.
The dynamic password technology is owing to one time one change of password, and fail safe is higher.Present more use be to adopt a kind of dynamic password maker that is called token, the user comes login system according to the one-time password that token produces.The dynamic password technology well is applicable to the enterprise identity Verification System, but for the bigger the Internet on-line system of quantity rank, the expense that a large amount of tokens needs is too high, token distribution difficulty; In addition because token does not have versatility for the diverse network on-line system, and token carries inconvenience, and these deficiencies have influenced the generally use of dynamic password technology.
Summary of the invention
The problem to be solved in the present invention just is: at the technical problem that prior art exists, the invention provides that a kind of principle is simple, easy and simple to handle, fail safe is higher, the dynamic password identity authentication method based on the random character group of applied widely, easy popularization.
For solving the problems of the technologies described above, the solution that the present invention proposes is: a kind of dynamic password identity authentication method based on the random character group is characterized in that step is:
(1) user cipher is set: the user chooses individual being arranged in order of L and forms user cipher from the code characters group of being made up of K character, wherein 0<L<K;
(2) the dot-blur pattern coding is set: the user is provided with and remembers the dot-blur pattern of a M * N, and wherein M can equate with N, and a character is set in each grid in dot-blur pattern, guarantees that the character in all grids is all inequality;
(3) request authentication: the user is after computer or server send authentication request, computer or server generate at random one with step (2) in the corresponding generator matrix of dot-blur pattern, K character random arrangement of code characters group be in the grid of generator matrix in the step (1), comprises all K character in the grid of generator matrix and do not repeat;
(4) find out dynamic password: the user is according to first the particular location M of character in generator matrix in the user cipher iN j, find out M in the dot-blur pattern corresponding with generator matrix iN jCharacter in the grid is as first character of dynamic password; And the like, the user is according to the particular location of all L user cipher at generator matrix, find out the character of its character in the dot-blur pattern medium square corresponding with generator matrix as dynamic password, according to putting in order of user cipher, corresponding characters is arranged in order the formation dynamic password separately;
(5) authentication finishes: the user will obtain dynamic password input computer or server in the step (4), whether computer or server are checked dynamic password according to step (1) to the principle of (4) correct, finishes authentication.
The code characters group is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z in the described step (1), wherein K=36.
In the described step (2) in dot-blur pattern and the step (3) generator matrix be 3 * 3 or 3 * 4 or 2 * 3 square formation, 36 characters are distributed in the grid in the generator matrix, all characters do not repeat.
Character set H formed in all characters in the dot-blur pattern of described step (2), and character set H is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z.
In the described step (3), computer or server generate at random one with step (2) in the corresponding generator matrix of dot-blur pattern, described generator matrix is presented in face of the user with picture format.
Described step (1) and step (2) are finished on computer or server at one time, and perhaps completing steps (1) on computer or server is got in touch completing steps (2) by mobile phone and service provider then.
Compared with prior art, advantage of the present invention just is:
1, the present invention is based on the dynamic password identity authentication method of random character group, have that principle is simple, easy and simple to handle, fail safe is higher, an advantage such as applied widely, easy popularization; Realization of the present invention does not need special-purpose hardware device, and the exploitation of software realizes simple, only need be on the static password certification mode simple upgrade; Enterprise's maintenance cost is low, and enterprise does not relate to distribution, changes the maintenance of token, because this method is used simply, significantly reduces the cost of accepting customer service.Concerning the user, the use habit that password meets the user fully is set, it is on a kind of plane space numeral to be set that the matrix numbering is set, memory easily, searching character also is a kind of intuitive operation, thereby is easy to be accepted by the ordinary people, the good popularization;
2, the present invention is based on the dynamic password identity authentication method of random character group, anti-interception capabilities is good, and the invador is by detecting keyboard input, searching process internal memory, interception communication data packet, copying modes such as computer screen and all can not steal information such as user's account number and password.The present invention is arranged user cipher and dot-blur pattern coding branch at the account number registration phase, such as by the mobile network password being set with SMS, by portal website matrix coder is set with PC.The invador intercepts password, does not intercept matrix coder, can't login account; Same intercepting matrix coder does not intercept password, can't login account yet.Significantly reduce the probability of cryptocompromise like this.In the number of the account entry stage, the invador intercepts character picture and dynamic password, also can't extrapolate password and matrix coder, certainly do not get rid of the number of times of following the tracks of character picture and dynamic password reach a lot of numbers can decryption and matrix coder, but the invador need pay very big time and efforts, from but the invador lose patience;
3, the present invention is based on the dynamic password identity authentication method of random character group, can prevent effectively that the violence method of exhaustion from stealing account number and password.Because the last dynamic password that generates is dynamic change, changes with the character picture, therefore can prevent effectively that invador's violence is exhaustive.The invador is difficult to picture recognition character accurately, analyzes the tracking dynamic password to the invador and brings difficulty.Character picture of the present invention and picture validation code technology can reach same technique effect, thereby both can unite two into one;
4, the present invention is based on the dynamic password identity authentication method of random character group, anti-conjecture ability strengthens, owing to need guess password and matrix numbering simultaneously, reduces the conjecture probability of successful greatly;
5, the present invention is based on the dynamic password identity authentication method of random character group, can effectively prevent phishing attack, prevent that effectively the invador from doing one and coming user cheating with system same login interface, reach the purpose of intercepting user cipher.The invador can come the character display picture by the rule of oneself, and decryption and matrix coder can significantly reduce the number of times of following the tracks of character picture and dynamic password like this.According to calculating,, also need to defraud of the user and import dynamic password at least tens times even if the invador adopts this mode to come decryption and matrix coder.Obvious a kind of false login interface generally can only user cheating once or several times.Therefore this authentication method also can effectively prevent phishing attack.
Description of drawings
Fig. 1 is a schematic flow sheet of the present invention.
Embodiment
Below with reference to the drawings and specific embodiments the present invention is described in further details.
As shown in Figure 1, the present invention is based on the dynamic password identity authentication method of random character group, the steps include:
(1) user cipher is set: the user chooses individual being arranged in order of L and forms user cipher from the code characters group of being made up of K character, wherein 0<L<K;
(2) the dot-blur pattern coding is set: the user is provided with and remembers the dot-blur pattern of a M * N, and wherein M can equate with N, and a character is set in each grid in dot-blur pattern, guarantees that the character in all grids is all inequality;
(3) request authentication: the user is after computer or server send authentication request, computer or server generate at random one with step (2) in the corresponding generator matrix of dot-blur pattern, K character random arrangement of code characters group be in the grid of generator matrix in the step (1), comprises all K character in the grid of generator matrix and do not repeat; Number of characters in each grid can be the same or different.
(4) find out dynamic password: the user is according to first the particular location M of character in generator matrix in the user cipher iN j, find out M in the dot-blur pattern corresponding with generator matrix iN jCharacter in the grid is as first character of dynamic password, 0<i<n wherein, 0<j<m; And the like, the user is according to the particular location of all L user cipher at generator matrix, find out the character of its character in the dot-blur pattern medium square corresponding with generator matrix as dynamic password, according to putting in order of user cipher, corresponding characters is arranged in order the formation dynamic password separately;
(5) authentication finishes: the user will obtain dynamic password input computer or server in the step (4), whether computer or server are checked dynamic password according to step (1) to the principle of (4) correct, finishes authentication.
In preferred embodiment, in step (3), computer or server generate at random one with step (2) in the corresponding generator matrix of dot-blur pattern, described generator matrix is presented in face of the user with picture format, character font is a handwritten form, can whole shows, and also can be divided into some groups according to the arrangement of matrix, each group character generates a character picture, and character group is corresponding one by one with the character picture.Simultaneously, also step (1) and step (2) are finished on computer or server at one time, perhaps completing steps (1) on computer or server is got in touch completing steps (2) by mobile phone and service provider then.
Embodiment 1: in the present embodiment, code characters is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z in the step (1), wherein K=36.In step (2), generator matrix is 3 * 3 square formation in dot-blur pattern and the step (3), and 36 characters are evenly distributed in the grid in the generator matrix, and all characters do not repeat.Character set H formed in all characters in the dot-blur pattern, and character set H is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z.Its concrete steps are:
(1) user cipher is set: abc123
(2) the dot-blur pattern coding is set, sees the following form 1:
Table 1
5 4 3
6 1 2
7 8 9
(3) request authentication: when the user logined, computer or server generated the generator matrix corresponding with dot-blur pattern that shows with the picture form at random, see Table 2:
Table 2
cf98 dz1g axhq
3bye inw2 mv5o
07tr p4k1 sju6
(4) find out dynamic password: the user calculates dynamic password according to user cipher, first character of password is a, looks for the picture that contains a from above generator matrix, is positioned at first row the 3rd row, because the tertial dot-blur pattern of first row that is provided with is encoded to 3, first of dynamic password is 3 so.Second character of user cipher is b, looks for the picture that contains b from above generator matrix, is positioned at second row, first row, because the matrix coder of second row, first row is 6 in the dot-blur pattern coding, second of dynamic password is 6 so.According to top method, can draw 6 dynamic passwords is 365416.
(5) authentication finishes: after computer or server are received the dynamic password 365416 that the user imports, search the character group that is numbered 3 position in the generator matrix and whether have first character of password a, if do not have, authentification failure, if have, search the character group that is encoded to 6 position in the generator matrix and whether have second character b of password, if having, continue above similarly checking, finish up to 6 password authentications; The result returns the user checking.
Embodiment 2: in the present embodiment, code characters is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z in the step (1), wherein K=36.In step (2), generator matrix is 3 * 4 square formation in dot-blur pattern and the step (3), and 36 characters are evenly distributed in the grid in the generator matrix, and all characters do not repeat.Character set H formed in all characters in the dot-blur pattern, and character set H is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z.Its concrete steps are:
(1) user cipher is set: password is set: def233d4
(2) the dot-blur pattern coding is set, sees the following form 3:
Table 3
l k j i
h g f e
d c b a
(3) request authentication: when the user logined, computer or server generated the generator matrix corresponding with dot-blur pattern that shows with the picture form at random, see Table 4:
Table 4
cb8 vzk 0iw 3fy
aph n2L m5o qr9
7tg X14 ju6 sde
(4) find out dynamic password: the user calculates dynamic password, first character of user cipher is d, looks for the picture that contains d from generator matrix, is positioned at the third line the 4th row, owing to a that is encoded to of the 4th row of the third line in the dot-blur pattern that is provided with, first of dynamic password is a so.Second character of user cipher is e, looks for the picture that contains e from generator matrix, is positioned at the third line the 4th row, is a owing to be positioned at the matrix coder of the third line the 4th row in the dot-blur pattern that is provided with, and second of dynamic password is a so.The 3rd character of user cipher is f, looks for the picture that contains e from generator matrix, is positioned at first row the 4th row, is i owing to be positioned at the matrix coder of first row the 4th row in the dot-blur pattern that is provided with, and the 3rd of dynamic password the is i so.According to top method, can draw 8 dynamic passwords is aaigiiac.
(5) authentication finishes: after computer or server are received the dynamic password aaigiiac that the user imports, search the character group that generator matrix is encoded to the position of a and whether have first character of user cipher d, if do not have, authentification failure, if have, search the character group that generator matrix is encoded to the position of a and whether have second character e of user cipher, if having, continue above similarly checking, finish up to 8 password authentications; The result returns the user checking.

Claims (8)

1, a kind of dynamic password identity authentication method based on the random character group is characterized in that step is:
(1) user cipher is set: the user chooses individual being arranged in order of L and forms user cipher from the code characters group of being made up of K character, wherein 0<L<K;
(2) the dot-blur pattern coding is set: the user is provided with and remembers the dot-blur pattern of a M * N, and wherein M can equate with N, and a character is set in each grid in dot-blur pattern, guarantees that the character in all grids is all inequality;
(3) request authentication: the user is after computer or server send authentication request, computer or server generate at random one with step (2) in the corresponding generator matrix of dot-blur pattern, K character random arrangement of code characters group be in the grid of generator matrix in the step (1), comprises all K character in the grid of generator matrix and do not repeat;
(4) find out dynamic password: the user is according to first the particular location M of character in generator matrix in the user cipher iN j, find out M in the dot-blur pattern corresponding with generator matrix iN jCharacter in the grid is as first character of dynamic password; And the like, the user is according to the particular location of all L user cipher at generator matrix, find out the character of its character in the dot-blur pattern medium square corresponding with generator matrix as dynamic password, according to putting in order of user cipher, corresponding characters is arranged in order the formation dynamic password separately;
(5) authentication finishes: the user will obtain dynamic password input computer or server in the step (4), whether computer or server are checked dynamic password according to step (1) to the principle of (4) correct, finishes authentication.
2, the dynamic password identity authentication method based on the random character group according to claim 1 is characterized in that: the code characters group is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z in the described step (1), wherein K=36.
3, the dynamic password identity authentication method based on the random character group according to claim 2, it is characterized in that: the middle generator matrix of dot-blur pattern and step (3) is 3 * 3 or 3 * 4 or 2 * 3 square formation in the described step (2), 36 characters are distributed in the grid in the generator matrix, and all characters do not repeat.
4, according to claim 1 or 2 or 3 described dynamic password identity authentication methods based on the random character group, it is characterized in that: character set H formed in all characters in the dot-blur pattern of described step (2), and character set H is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z.
5, according to claim 1 or 2 or 3 described dynamic password identity authentication methods based on the random character group, it is characterized in that: in the described step (3), computer or server generate at random one with step (2) in the corresponding generator matrix of dot-blur pattern, described generator matrix is presented in face of the user with picture format.
6, the dynamic password identity authentication method based on the random character group according to claim 4, it is characterized in that: in the described step (3), computer or server generate at random one with step (2) in the corresponding generator matrix of dot-blur pattern, described generator matrix is presented in face of the user with picture format.
7, according to claim 1 or 2 or 3 described dynamic password identity authentication methods based on the random character group, it is characterized in that: described step (1) and step (2) are finished on computer or server at one time, perhaps completing steps (1) on computer or server is got in touch completing steps (2) by mobile phone and service provider then.
8, the dynamic password identity authentication method based on the random character group according to claim 6, it is characterized in that: described step (1) and step (2) are finished on computer or server at one time, perhaps completing steps (1) on computer or server is got in touch completing steps (2) by mobile phone and service provider then.
CNA2008100316954A 2008-07-07 2008-07-07 Dynamic password identity authentication method based on accidental character set Pending CN101316166A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008100316954A CN101316166A (en) 2008-07-07 2008-07-07 Dynamic password identity authentication method based on accidental character set

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008100316954A CN101316166A (en) 2008-07-07 2008-07-07 Dynamic password identity authentication method based on accidental character set

Publications (1)

Publication Number Publication Date
CN101316166A true CN101316166A (en) 2008-12-03

Family

ID=40107025

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008100316954A Pending CN101316166A (en) 2008-07-07 2008-07-07 Dynamic password identity authentication method based on accidental character set

Country Status (1)

Country Link
CN (1) CN101316166A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964792A (en) * 2010-09-27 2011-02-02 华南理工大学 Multimode mapping based strong authentication method
CN102082779A (en) * 2009-12-01 2011-06-01 杨凯涵 Identity authentication method, device and system
CN102164137A (en) * 2011-04-15 2011-08-24 华南理工大学 Strong authentication method based on dynamic mapping password
CN101442410B (en) * 2008-12-09 2011-09-14 深圳市戴文科技有限公司 Method and apparatus for generating dynamic cipher, and application system containing the apparatus
CN102202067A (en) * 2011-07-15 2011-09-28 席勇良 Dynamic random cipher registration method
CN102710657A (en) * 2012-06-19 2012-10-03 上海安简信息技术有限公司 One-time password generation method and system
CN103500299A (en) * 2013-10-12 2014-01-08 陈璞 Random electronic cipher system and method
CN103580873A (en) * 2013-11-15 2014-02-12 清华大学 Identity authentication method and system and password protection device
CN104468110A (en) * 2013-09-24 2015-03-25 阿里巴巴集团控股有限公司 Password authentication method, equipment and system
WO2015055038A1 (en) * 2013-10-15 2015-04-23 胡海峰 Secure password authentication method
CN106576243A (en) * 2014-06-26 2017-04-19 哈瑞克思信息科技公司 User authentication method and system using variable keypad and biometric identification
WO2017129133A1 (en) * 2016-01-29 2017-08-03 大连秘阵科技有限公司 Dynamic graphical password-based network registration method and system
CN107577933A (en) * 2017-08-22 2018-01-12 广东欧珀移动通信有限公司 Using login method and device, computer equipment, computer-readable recording medium
CN111241500A (en) * 2014-09-16 2020-06-05 阿里巴巴集团控股有限公司 Verification method and device
CN113207305A (en) * 2018-12-11 2021-08-03 Ccs 12公司 Device and method for protecting safety data of bank payment card
CN114448650A (en) * 2022-04-12 2022-05-06 深圳市乐凡信息科技有限公司 Encryption authentication method, device, equipment and storage medium

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101442410B (en) * 2008-12-09 2011-09-14 深圳市戴文科技有限公司 Method and apparatus for generating dynamic cipher, and application system containing the apparatus
CN102082779A (en) * 2009-12-01 2011-06-01 杨凯涵 Identity authentication method, device and system
CN101964792A (en) * 2010-09-27 2011-02-02 华南理工大学 Multimode mapping based strong authentication method
CN101964792B (en) * 2010-09-27 2013-06-12 华南理工大学 Multimode mapping based strong authentication method
CN102164137A (en) * 2011-04-15 2011-08-24 华南理工大学 Strong authentication method based on dynamic mapping password
CN102202067A (en) * 2011-07-15 2011-09-28 席勇良 Dynamic random cipher registration method
CN102202067B (en) * 2011-07-15 2016-06-08 席勇良 Dynamic random cipher registration method
CN102710657B (en) * 2012-06-19 2016-04-27 上海安简信息技术有限公司 A kind of one-time password generates method and system
CN102710657A (en) * 2012-06-19 2012-10-03 上海安简信息技术有限公司 One-time password generation method and system
CN104468110B (en) * 2013-09-24 2018-09-28 阿里巴巴集团控股有限公司 Command identifying method, equipment and system
CN104468110A (en) * 2013-09-24 2015-03-25 阿里巴巴集团控股有限公司 Password authentication method, equipment and system
CN103500299B (en) * 2013-10-12 2016-03-23 陈璞 A kind of random electronic cipher system and method
CN103500299A (en) * 2013-10-12 2014-01-08 陈璞 Random electronic cipher system and method
WO2015055038A1 (en) * 2013-10-15 2015-04-23 胡海峰 Secure password authentication method
CN103580873B (en) * 2013-11-15 2017-06-06 清华大学 Identity identifying method, system and cipher protection apparatus
CN103580873A (en) * 2013-11-15 2014-02-12 清华大学 Identity authentication method and system and password protection device
CN106576243A (en) * 2014-06-26 2017-04-19 哈瑞克思信息科技公司 User authentication method and system using variable keypad and biometric identification
CN111241500A (en) * 2014-09-16 2020-06-05 阿里巴巴集团控股有限公司 Verification method and device
WO2017129133A1 (en) * 2016-01-29 2017-08-03 大连秘阵科技有限公司 Dynamic graphical password-based network registration method and system
US10659452B2 (en) 2016-01-29 2020-05-19 Dalian Magic Image Technology Co., Ltd. Dynamic graphical password-based network registration method and system
CN107577933B (en) * 2017-08-22 2020-01-10 Oppo广东移动通信有限公司 Application login method and device, computer equipment and computer readable storage medium
CN107577933A (en) * 2017-08-22 2018-01-12 广东欧珀移动通信有限公司 Using login method and device, computer equipment, computer-readable recording medium
CN113207305A (en) * 2018-12-11 2021-08-03 Ccs 12公司 Device and method for protecting safety data of bank payment card
CN114448650A (en) * 2022-04-12 2022-05-06 深圳市乐凡信息科技有限公司 Encryption authentication method, device, equipment and storage medium
CN114448650B (en) * 2022-04-12 2022-07-01 深圳市乐凡信息科技有限公司 Encryption authentication method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN101316166A (en) Dynamic password identity authentication method based on accidental character set
KR102493744B1 (en) Security Verification Method Based on Biometric Characteristics, Client Terminal, and Server
CN103581105B (en) Login validation method and login authentication system
CN101051908B (en) Dynamic cipher certifying system and method
CN102006299B (en) Trustworthy internet-oriented entity ID (Identity)-based ID authentication method and system
CN106170793B (en) System, method and apparatus for secure log
US20160127134A1 (en) User authentication system and method
JP2007525767A (en) User authentication
Archana et al. Survey on usable and secure two-factor authentication
CN108370316A (en) The integral authentication system being authenticated using disposable random number
CN1523809A (en) Password variable identification verification technique
CN103024706A (en) Short message based device and short message based method for bidirectional multiple-factor dynamic identity authentication
US8984599B2 (en) Real time password generation apparatus and method
CN101695066A (en) Security authentication method and information security authentication equipment
CN102377573A (en) Double-factor authentication method capable of securely updating password
CN102185696B (en) Mobile phone user authentication method without trusted third party on basis of handwriting characteristics
CN102546168A (en) Communication device for identity authentication
CN105069361A (en) Safety access method and system for privacy space
KR101039909B1 (en) User authentication system and method for immunizing from hacking
US10972286B2 (en) Token-based authentication with signed message
KR20200120400A (en) Authrntication method using random graphic code
Mogal et al. How Two Factor Authentication Helps in Cybersecurity
KR101205391B1 (en) Method for inputting confirmation number using secret puzzle
CN203243360U (en) Identity registration system
CN103079199A (en) Mutual authentication method and system of wireless sensor network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20081203