CN101316166A - Dynamic password identity authentication method based on accidental character set - Google Patents
Dynamic password identity authentication method based on accidental character set Download PDFInfo
- Publication number
- CN101316166A CN101316166A CNA2008100316954A CN200810031695A CN101316166A CN 101316166 A CN101316166 A CN 101316166A CN A2008100316954 A CNA2008100316954 A CN A2008100316954A CN 200810031695 A CN200810031695 A CN 200810031695A CN 101316166 A CN101316166 A CN 101316166A
- Authority
- CN
- China
- Prior art keywords
- character
- dynamic password
- user
- generator matrix
- dot
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention relates to a dynamic password identity authentification method on the basis of a random character group, which includes the steps that: (1) a user password is selected and set up from a cipher character group composed of K characters; (2) a memory matrix of M multiplied by N is set up and each square of the memory matrix has a different character; (3) when an authentification request is transmitted, a computer or server generates a generator matrix corresponding to the memory matrix randomly, the cipher character group is arranged in the square of the generator matrix randomly, all the characters contained in the squares are all different to each other; (4) according to the specific position M<i>N<i> of the first digit character of the user cipher in the generator matrix, the user can find a character from the M<i>N<i> square of the memory matrix corresponding to the generator matrix and use the character as a first digit character of the dynamic password; thus a dynamic password can be formed in the similar way; (5) the authentification is finished: the computer or server judges if the dynamic password input by the user is correct. The invention has the advantages of simple principle, higher safety performance and easy generalization and so on.
Description
Technical field
The present invention is mainly concerned with the field of identity authentication under the computer system, refers in particular to a kind of dynamic password identity authentication method based on the random character group.
Background technology
As everyone knows, authentication is the basis of all information securities.The identity identifying technology that current network or computer system adopt mainly contains five kinds, i.e. static password, cryptoguard card, dynamic password, PKI and digital certificate and living things feature recognition.
Static password is owing to be simple and easy to usefulness, and current use is the most general, but its fail safe extreme difference only can be applied to the occasion not high to safety requirements.
The cryptoguard card is a n*n character matrix, the user with the binding of account number and cryptoguard card after, will receive prompting at random during each login system from system, the user only need insert the numeral of corresponding coordinate on the cryptoguard card and can land.Cryptoguard card use cost is low, operates fairly simple, safe in static password.But inconvenience is carried in its existence, use shortcomings such as trouble, and its fail safe is not high enough, and wooden horse can crack by the input each time of supervisory user.Thereby the useful life of cryptoguard card is short.As a kind of supplementary means, cooperate static password protection account number at present.
The fail safe of PKI and digital certificate technique is higher, it can also provide digital signature function to realize undeniable feature except authentication, it is cumbersome that but this system uses, management is complicated, cost is higher, therefore only be applicable to occasions such as needing digital signature at present, and can't popularize.
The technology type of living things feature recognition is a lot; though they have its characteristics in fail safe; but also there are some problems in actual use; for example discrimination is not high, system cost is higher, remote identification is difficult, individual privacy is difficult to protection etc., so do not adopt in a large number at information network system at present.
The dynamic password technology is owing to one time one change of password, and fail safe is higher.Present more use be to adopt a kind of dynamic password maker that is called token, the user comes login system according to the one-time password that token produces.The dynamic password technology well is applicable to the enterprise identity Verification System, but for the bigger the Internet on-line system of quantity rank, the expense that a large amount of tokens needs is too high, token distribution difficulty; In addition because token does not have versatility for the diverse network on-line system, and token carries inconvenience, and these deficiencies have influenced the generally use of dynamic password technology.
Summary of the invention
The problem to be solved in the present invention just is: at the technical problem that prior art exists, the invention provides that a kind of principle is simple, easy and simple to handle, fail safe is higher, the dynamic password identity authentication method based on the random character group of applied widely, easy popularization.
For solving the problems of the technologies described above, the solution that the present invention proposes is: a kind of dynamic password identity authentication method based on the random character group is characterized in that step is:
(1) user cipher is set: the user chooses individual being arranged in order of L and forms user cipher from the code characters group of being made up of K character, wherein 0<L<K;
(2) the dot-blur pattern coding is set: the user is provided with and remembers the dot-blur pattern of a M * N, and wherein M can equate with N, and a character is set in each grid in dot-blur pattern, guarantees that the character in all grids is all inequality;
(3) request authentication: the user is after computer or server send authentication request, computer or server generate at random one with step (2) in the corresponding generator matrix of dot-blur pattern, K character random arrangement of code characters group be in the grid of generator matrix in the step (1), comprises all K character in the grid of generator matrix and do not repeat;
(4) find out dynamic password: the user is according to first the particular location M of character in generator matrix in the user cipher
iN
j, find out M in the dot-blur pattern corresponding with generator matrix
iN
jCharacter in the grid is as first character of dynamic password; And the like, the user is according to the particular location of all L user cipher at generator matrix, find out the character of its character in the dot-blur pattern medium square corresponding with generator matrix as dynamic password, according to putting in order of user cipher, corresponding characters is arranged in order the formation dynamic password separately;
(5) authentication finishes: the user will obtain dynamic password input computer or server in the step (4), whether computer or server are checked dynamic password according to step (1) to the principle of (4) correct, finishes authentication.
The code characters group is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z in the described step (1), wherein K=36.
In the described step (2) in dot-blur pattern and the step (3) generator matrix be 3 * 3 or 3 * 4 or 2 * 3 square formation, 36 characters are distributed in the grid in the generator matrix, all characters do not repeat.
Character set H formed in all characters in the dot-blur pattern of described step (2), and character set H is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z.
In the described step (3), computer or server generate at random one with step (2) in the corresponding generator matrix of dot-blur pattern, described generator matrix is presented in face of the user with picture format.
Described step (1) and step (2) are finished on computer or server at one time, and perhaps completing steps (1) on computer or server is got in touch completing steps (2) by mobile phone and service provider then.
Compared with prior art, advantage of the present invention just is:
1, the present invention is based on the dynamic password identity authentication method of random character group, have that principle is simple, easy and simple to handle, fail safe is higher, an advantage such as applied widely, easy popularization; Realization of the present invention does not need special-purpose hardware device, and the exploitation of software realizes simple, only need be on the static password certification mode simple upgrade; Enterprise's maintenance cost is low, and enterprise does not relate to distribution, changes the maintenance of token, because this method is used simply, significantly reduces the cost of accepting customer service.Concerning the user, the use habit that password meets the user fully is set, it is on a kind of plane space numeral to be set that the matrix numbering is set, memory easily, searching character also is a kind of intuitive operation, thereby is easy to be accepted by the ordinary people, the good popularization;
2, the present invention is based on the dynamic password identity authentication method of random character group, anti-interception capabilities is good, and the invador is by detecting keyboard input, searching process internal memory, interception communication data packet, copying modes such as computer screen and all can not steal information such as user's account number and password.The present invention is arranged user cipher and dot-blur pattern coding branch at the account number registration phase, such as by the mobile network password being set with SMS, by portal website matrix coder is set with PC.The invador intercepts password, does not intercept matrix coder, can't login account; Same intercepting matrix coder does not intercept password, can't login account yet.Significantly reduce the probability of cryptocompromise like this.In the number of the account entry stage, the invador intercepts character picture and dynamic password, also can't extrapolate password and matrix coder, certainly do not get rid of the number of times of following the tracks of character picture and dynamic password reach a lot of numbers can decryption and matrix coder, but the invador need pay very big time and efforts, from but the invador lose patience;
3, the present invention is based on the dynamic password identity authentication method of random character group, can prevent effectively that the violence method of exhaustion from stealing account number and password.Because the last dynamic password that generates is dynamic change, changes with the character picture, therefore can prevent effectively that invador's violence is exhaustive.The invador is difficult to picture recognition character accurately, analyzes the tracking dynamic password to the invador and brings difficulty.Character picture of the present invention and picture validation code technology can reach same technique effect, thereby both can unite two into one;
4, the present invention is based on the dynamic password identity authentication method of random character group, anti-conjecture ability strengthens, owing to need guess password and matrix numbering simultaneously, reduces the conjecture probability of successful greatly;
5, the present invention is based on the dynamic password identity authentication method of random character group, can effectively prevent phishing attack, prevent that effectively the invador from doing one and coming user cheating with system same login interface, reach the purpose of intercepting user cipher.The invador can come the character display picture by the rule of oneself, and decryption and matrix coder can significantly reduce the number of times of following the tracks of character picture and dynamic password like this.According to calculating,, also need to defraud of the user and import dynamic password at least tens times even if the invador adopts this mode to come decryption and matrix coder.Obvious a kind of false login interface generally can only user cheating once or several times.Therefore this authentication method also can effectively prevent phishing attack.
Description of drawings
Fig. 1 is a schematic flow sheet of the present invention.
Embodiment
Below with reference to the drawings and specific embodiments the present invention is described in further details.
As shown in Figure 1, the present invention is based on the dynamic password identity authentication method of random character group, the steps include:
(1) user cipher is set: the user chooses individual being arranged in order of L and forms user cipher from the code characters group of being made up of K character, wherein 0<L<K;
(2) the dot-blur pattern coding is set: the user is provided with and remembers the dot-blur pattern of a M * N, and wherein M can equate with N, and a character is set in each grid in dot-blur pattern, guarantees that the character in all grids is all inequality;
(3) request authentication: the user is after computer or server send authentication request, computer or server generate at random one with step (2) in the corresponding generator matrix of dot-blur pattern, K character random arrangement of code characters group be in the grid of generator matrix in the step (1), comprises all K character in the grid of generator matrix and do not repeat; Number of characters in each grid can be the same or different.
(4) find out dynamic password: the user is according to first the particular location M of character in generator matrix in the user cipher
iN
j, find out M in the dot-blur pattern corresponding with generator matrix
iN
jCharacter in the grid is as first character of dynamic password, 0<i<n wherein, 0<j<m; And the like, the user is according to the particular location of all L user cipher at generator matrix, find out the character of its character in the dot-blur pattern medium square corresponding with generator matrix as dynamic password, according to putting in order of user cipher, corresponding characters is arranged in order the formation dynamic password separately;
(5) authentication finishes: the user will obtain dynamic password input computer or server in the step (4), whether computer or server are checked dynamic password according to step (1) to the principle of (4) correct, finishes authentication.
In preferred embodiment, in step (3), computer or server generate at random one with step (2) in the corresponding generator matrix of dot-blur pattern, described generator matrix is presented in face of the user with picture format, character font is a handwritten form, can whole shows, and also can be divided into some groups according to the arrangement of matrix, each group character generates a character picture, and character group is corresponding one by one with the character picture.Simultaneously, also step (1) and step (2) are finished on computer or server at one time, perhaps completing steps (1) on computer or server is got in touch completing steps (2) by mobile phone and service provider then.
Embodiment 1: in the present embodiment, code characters is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z in the step (1), wherein K=36.In step (2), generator matrix is 3 * 3 square formation in dot-blur pattern and the step (3), and 36 characters are evenly distributed in the grid in the generator matrix, and all characters do not repeat.Character set H formed in all characters in the dot-blur pattern, and character set H is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z.Its concrete steps are:
(1) user cipher is set: abc123
(2) the dot-blur pattern coding is set, sees the following form 1:
Table 1
5 | 4 | 3 |
6 | 1 | 2 |
7 | 8 | 9 |
(3) request authentication: when the user logined, computer or server generated the generator matrix corresponding with dot-blur pattern that shows with the picture form at random, see Table 2:
Table 2
cf98 | dz1g | axhq |
3bye | inw2 | mv5o |
07tr | p4k1 | sju6 |
(4) find out dynamic password: the user calculates dynamic password according to user cipher, first character of password is a, looks for the picture that contains a from above generator matrix, is positioned at first row the 3rd row, because the tertial dot-blur pattern of first row that is provided with is encoded to 3, first of dynamic password is 3 so.Second character of user cipher is b, looks for the picture that contains b from above generator matrix, is positioned at second row, first row, because the matrix coder of second row, first row is 6 in the dot-blur pattern coding, second of dynamic password is 6 so.According to top method, can draw 6 dynamic passwords is 365416.
(5) authentication finishes: after computer or server are received the dynamic password 365416 that the user imports, search the character group that is numbered 3 position in the generator matrix and whether have first character of password a, if do not have, authentification failure, if have, search the character group that is encoded to 6 position in the generator matrix and whether have second character b of password, if having, continue above similarly checking, finish up to 6 password authentications; The result returns the user checking.
Embodiment 2: in the present embodiment, code characters is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z in the step (1), wherein K=36.In step (2), generator matrix is 3 * 4 square formation in dot-blur pattern and the step (3), and 36 characters are evenly distributed in the grid in the generator matrix, and all characters do not repeat.Character set H formed in all characters in the dot-blur pattern, and character set H is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z.Its concrete steps are:
(1) user cipher is set: password is set: def233d4
(2) the dot-blur pattern coding is set, sees the following form 3:
Table 3
l | k | j | i |
h | g | f | e |
d | c | b | a |
(3) request authentication: when the user logined, computer or server generated the generator matrix corresponding with dot-blur pattern that shows with the picture form at random, see Table 4:
Table 4
cb8 | vzk | 0iw | 3fy |
aph | n2L | m5o | qr9 |
7tg | X14 | ju6 | sde |
(4) find out dynamic password: the user calculates dynamic password, first character of user cipher is d, looks for the picture that contains d from generator matrix, is positioned at the third line the 4th row, owing to a that is encoded to of the 4th row of the third line in the dot-blur pattern that is provided with, first of dynamic password is a so.Second character of user cipher is e, looks for the picture that contains e from generator matrix, is positioned at the third line the 4th row, is a owing to be positioned at the matrix coder of the third line the 4th row in the dot-blur pattern that is provided with, and second of dynamic password is a so.The 3rd character of user cipher is f, looks for the picture that contains e from generator matrix, is positioned at first row the 4th row, is i owing to be positioned at the matrix coder of first row the 4th row in the dot-blur pattern that is provided with, and the 3rd of dynamic password the is i so.According to top method, can draw 8 dynamic passwords is aaigiiac.
(5) authentication finishes: after computer or server are received the dynamic password aaigiiac that the user imports, search the character group that generator matrix is encoded to the position of a and whether have first character of user cipher d, if do not have, authentification failure, if have, search the character group that generator matrix is encoded to the position of a and whether have second character e of user cipher, if having, continue above similarly checking, finish up to 8 password authentications; The result returns the user checking.
Claims (8)
1, a kind of dynamic password identity authentication method based on the random character group is characterized in that step is:
(1) user cipher is set: the user chooses individual being arranged in order of L and forms user cipher from the code characters group of being made up of K character, wherein 0<L<K;
(2) the dot-blur pattern coding is set: the user is provided with and remembers the dot-blur pattern of a M * N, and wherein M can equate with N, and a character is set in each grid in dot-blur pattern, guarantees that the character in all grids is all inequality;
(3) request authentication: the user is after computer or server send authentication request, computer or server generate at random one with step (2) in the corresponding generator matrix of dot-blur pattern, K character random arrangement of code characters group be in the grid of generator matrix in the step (1), comprises all K character in the grid of generator matrix and do not repeat;
(4) find out dynamic password: the user is according to first the particular location M of character in generator matrix in the user cipher
iN
j, find out M in the dot-blur pattern corresponding with generator matrix
iN
jCharacter in the grid is as first character of dynamic password; And the like, the user is according to the particular location of all L user cipher at generator matrix, find out the character of its character in the dot-blur pattern medium square corresponding with generator matrix as dynamic password, according to putting in order of user cipher, corresponding characters is arranged in order the formation dynamic password separately;
(5) authentication finishes: the user will obtain dynamic password input computer or server in the step (4), whether computer or server are checked dynamic password according to step (1) to the principle of (4) correct, finishes authentication.
2, the dynamic password identity authentication method based on the random character group according to claim 1 is characterized in that: the code characters group is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z in the described step (1), wherein K=36.
3, the dynamic password identity authentication method based on the random character group according to claim 2, it is characterized in that: the middle generator matrix of dot-blur pattern and step (3) is 3 * 3 or 3 * 4 or 2 * 3 square formation in the described step (2), 36 characters are distributed in the grid in the generator matrix, and all characters do not repeat.
4, according to claim 1 or 2 or 3 described dynamic password identity authentication methods based on the random character group, it is characterized in that: character set H formed in all characters in the dot-blur pattern of described step (2), and character set H is made up of 10 Arabic numerals 0~9 and 26 English alphabet a~z.
5, according to claim 1 or 2 or 3 described dynamic password identity authentication methods based on the random character group, it is characterized in that: in the described step (3), computer or server generate at random one with step (2) in the corresponding generator matrix of dot-blur pattern, described generator matrix is presented in face of the user with picture format.
6, the dynamic password identity authentication method based on the random character group according to claim 4, it is characterized in that: in the described step (3), computer or server generate at random one with step (2) in the corresponding generator matrix of dot-blur pattern, described generator matrix is presented in face of the user with picture format.
7, according to claim 1 or 2 or 3 described dynamic password identity authentication methods based on the random character group, it is characterized in that: described step (1) and step (2) are finished on computer or server at one time, perhaps completing steps (1) on computer or server is got in touch completing steps (2) by mobile phone and service provider then.
8, the dynamic password identity authentication method based on the random character group according to claim 6, it is characterized in that: described step (1) and step (2) are finished on computer or server at one time, perhaps completing steps (1) on computer or server is got in touch completing steps (2) by mobile phone and service provider then.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008100316954A CN101316166A (en) | 2008-07-07 | 2008-07-07 | Dynamic password identity authentication method based on accidental character set |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008100316954A CN101316166A (en) | 2008-07-07 | 2008-07-07 | Dynamic password identity authentication method based on accidental character set |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101316166A true CN101316166A (en) | 2008-12-03 |
Family
ID=40107025
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2008100316954A Pending CN101316166A (en) | 2008-07-07 | 2008-07-07 | Dynamic password identity authentication method based on accidental character set |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101316166A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101964792A (en) * | 2010-09-27 | 2011-02-02 | 华南理工大学 | Multimode mapping based strong authentication method |
CN102082779A (en) * | 2009-12-01 | 2011-06-01 | 杨凯涵 | Identity authentication method, device and system |
CN102164137A (en) * | 2011-04-15 | 2011-08-24 | 华南理工大学 | Strong authentication method based on dynamic mapping password |
CN101442410B (en) * | 2008-12-09 | 2011-09-14 | 深圳市戴文科技有限公司 | Method and apparatus for generating dynamic cipher, and application system containing the apparatus |
CN102202067A (en) * | 2011-07-15 | 2011-09-28 | 席勇良 | Dynamic random cipher registration method |
CN102710657A (en) * | 2012-06-19 | 2012-10-03 | 上海安简信息技术有限公司 | One-time password generation method and system |
CN103500299A (en) * | 2013-10-12 | 2014-01-08 | 陈璞 | Random electronic cipher system and method |
CN103580873A (en) * | 2013-11-15 | 2014-02-12 | 清华大学 | Identity authentication method and system and password protection device |
CN104468110A (en) * | 2013-09-24 | 2015-03-25 | 阿里巴巴集团控股有限公司 | Password authentication method, equipment and system |
WO2015055038A1 (en) * | 2013-10-15 | 2015-04-23 | 胡海峰 | Secure password authentication method |
CN106576243A (en) * | 2014-06-26 | 2017-04-19 | 哈瑞克思信息科技公司 | User authentication method and system using variable keypad and biometric identification |
WO2017129133A1 (en) * | 2016-01-29 | 2017-08-03 | 大连秘阵科技有限公司 | Dynamic graphical password-based network registration method and system |
CN107577933A (en) * | 2017-08-22 | 2018-01-12 | 广东欧珀移动通信有限公司 | Using login method and device, computer equipment, computer-readable recording medium |
CN111241500A (en) * | 2014-09-16 | 2020-06-05 | 阿里巴巴集团控股有限公司 | Verification method and device |
CN113207305A (en) * | 2018-12-11 | 2021-08-03 | Ccs 12公司 | Device and method for protecting safety data of bank payment card |
CN114448650A (en) * | 2022-04-12 | 2022-05-06 | 深圳市乐凡信息科技有限公司 | Encryption authentication method, device, equipment and storage medium |
-
2008
- 2008-07-07 CN CNA2008100316954A patent/CN101316166A/en active Pending
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101442410B (en) * | 2008-12-09 | 2011-09-14 | 深圳市戴文科技有限公司 | Method and apparatus for generating dynamic cipher, and application system containing the apparatus |
CN102082779A (en) * | 2009-12-01 | 2011-06-01 | 杨凯涵 | Identity authentication method, device and system |
CN101964792A (en) * | 2010-09-27 | 2011-02-02 | 华南理工大学 | Multimode mapping based strong authentication method |
CN101964792B (en) * | 2010-09-27 | 2013-06-12 | 华南理工大学 | Multimode mapping based strong authentication method |
CN102164137A (en) * | 2011-04-15 | 2011-08-24 | 华南理工大学 | Strong authentication method based on dynamic mapping password |
CN102202067A (en) * | 2011-07-15 | 2011-09-28 | 席勇良 | Dynamic random cipher registration method |
CN102202067B (en) * | 2011-07-15 | 2016-06-08 | 席勇良 | Dynamic random cipher registration method |
CN102710657B (en) * | 2012-06-19 | 2016-04-27 | 上海安简信息技术有限公司 | A kind of one-time password generates method and system |
CN102710657A (en) * | 2012-06-19 | 2012-10-03 | 上海安简信息技术有限公司 | One-time password generation method and system |
CN104468110B (en) * | 2013-09-24 | 2018-09-28 | 阿里巴巴集团控股有限公司 | Command identifying method, equipment and system |
CN104468110A (en) * | 2013-09-24 | 2015-03-25 | 阿里巴巴集团控股有限公司 | Password authentication method, equipment and system |
CN103500299B (en) * | 2013-10-12 | 2016-03-23 | 陈璞 | A kind of random electronic cipher system and method |
CN103500299A (en) * | 2013-10-12 | 2014-01-08 | 陈璞 | Random electronic cipher system and method |
WO2015055038A1 (en) * | 2013-10-15 | 2015-04-23 | 胡海峰 | Secure password authentication method |
CN103580873B (en) * | 2013-11-15 | 2017-06-06 | 清华大学 | Identity identifying method, system and cipher protection apparatus |
CN103580873A (en) * | 2013-11-15 | 2014-02-12 | 清华大学 | Identity authentication method and system and password protection device |
CN106576243A (en) * | 2014-06-26 | 2017-04-19 | 哈瑞克思信息科技公司 | User authentication method and system using variable keypad and biometric identification |
CN111241500A (en) * | 2014-09-16 | 2020-06-05 | 阿里巴巴集团控股有限公司 | Verification method and device |
WO2017129133A1 (en) * | 2016-01-29 | 2017-08-03 | 大连秘阵科技有限公司 | Dynamic graphical password-based network registration method and system |
US10659452B2 (en) | 2016-01-29 | 2020-05-19 | Dalian Magic Image Technology Co., Ltd. | Dynamic graphical password-based network registration method and system |
CN107577933B (en) * | 2017-08-22 | 2020-01-10 | Oppo广东移动通信有限公司 | Application login method and device, computer equipment and computer readable storage medium |
CN107577933A (en) * | 2017-08-22 | 2018-01-12 | 广东欧珀移动通信有限公司 | Using login method and device, computer equipment, computer-readable recording medium |
CN113207305A (en) * | 2018-12-11 | 2021-08-03 | Ccs 12公司 | Device and method for protecting safety data of bank payment card |
CN114448650A (en) * | 2022-04-12 | 2022-05-06 | 深圳市乐凡信息科技有限公司 | Encryption authentication method, device, equipment and storage medium |
CN114448650B (en) * | 2022-04-12 | 2022-07-01 | 深圳市乐凡信息科技有限公司 | Encryption authentication method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101316166A (en) | Dynamic password identity authentication method based on accidental character set | |
KR102493744B1 (en) | Security Verification Method Based on Biometric Characteristics, Client Terminal, and Server | |
CN103581105B (en) | Login validation method and login authentication system | |
CN101051908B (en) | Dynamic cipher certifying system and method | |
CN102006299B (en) | Trustworthy internet-oriented entity ID (Identity)-based ID authentication method and system | |
CN106170793B (en) | System, method and apparatus for secure log | |
US20160127134A1 (en) | User authentication system and method | |
JP2007525767A (en) | User authentication | |
Archana et al. | Survey on usable and secure two-factor authentication | |
CN108370316A (en) | The integral authentication system being authenticated using disposable random number | |
CN1523809A (en) | Password variable identification verification technique | |
CN103024706A (en) | Short message based device and short message based method for bidirectional multiple-factor dynamic identity authentication | |
US8984599B2 (en) | Real time password generation apparatus and method | |
CN101695066A (en) | Security authentication method and information security authentication equipment | |
CN102377573A (en) | Double-factor authentication method capable of securely updating password | |
CN102185696B (en) | Mobile phone user authentication method without trusted third party on basis of handwriting characteristics | |
CN102546168A (en) | Communication device for identity authentication | |
CN105069361A (en) | Safety access method and system for privacy space | |
KR101039909B1 (en) | User authentication system and method for immunizing from hacking | |
US10972286B2 (en) | Token-based authentication with signed message | |
KR20200120400A (en) | Authrntication method using random graphic code | |
Mogal et al. | How Two Factor Authentication Helps in Cybersecurity | |
KR101205391B1 (en) | Method for inputting confirmation number using secret puzzle | |
CN203243360U (en) | Identity registration system | |
CN103079199A (en) | Mutual authentication method and system of wireless sensor network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20081203 |