CN101425118A - Dynamic password generating method - Google Patents

Dynamic password generating method Download PDF

Info

Publication number
CN101425118A
CN101425118A CNA2007101677616A CN200710167761A CN101425118A CN 101425118 A CN101425118 A CN 101425118A CN A2007101677616 A CNA2007101677616 A CN A2007101677616A CN 200710167761 A CN200710167761 A CN 200710167761A CN 101425118 A CN101425118 A CN 101425118A
Authority
CN
China
Prior art keywords
password
user
time
change
calculate
Prior art date
Application number
CNA2007101677616A
Other languages
Chinese (zh)
Inventor
徐强
Original Assignee
徐强
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 徐强 filed Critical 徐强
Priority to CNA2007101677616A priority Critical patent/CN101425118A/en
Publication of CN101425118A publication Critical patent/CN101425118A/en

Links

Abstract

The invention relates to a novel technical scheme which enables dynamic change of a password so as to ensure password safety. Password in a database does not store fixed numeric values any more, instead, the password is divided into six sections, and a method for calculating each section of password is stored in the database. As for each section of password, calculation is performed according to respective calculation method to obtain an integer numeric value or a letter ranging from a to z or an arbitrary punctuation mark or other characters; the six sections of password are combined to be a user password which can change as time changes and keeps the length, therefore the password safety is ensured. When a user submits the password, a user account, the password input by the user and the time at which the user submits the password are submitted to a server together so as to ensure the conformity between time point variables adopted by the server to verify the password and by the user. The dynamic password can be used for protecting the passwords in an automatic teller machine, a web bank card, a website login and a network game account and for keeping the passwords secret for an important department and a post system manager.

Description

Dynamic cipher generating method
Affiliated technical field
The present invention relates to a kind of password and can follow the change of time and change, further guarantee the dynamic cipher generating method of ecommerce, bank card online payment safety.
Background technology
At present, because the continuous development of infotech, the lawless person can utilize other people to steal other people account number and password when Automatic Teller Machine is withdrawn deposit or during online payment, thereby comes other people property of illegal encroachment.And the password that the present invention the generates time of can following changes and changes, and password changes automatically when waiting offender to want to convert another's property to one's own use by the account number stolen and password, thereby has guaranteed the safety of property greatly.
Summary of the invention
A kind of password that allows can dynamically change, thereby guarantees the new technical scheme of cryptosecurity.In order further to guarantee the safety of ecommerce, bank card online payment, the objective of the invention is to the change of password according to the time changed, be not afraid of password and illegally stolen by other people.The content of password can change, and the length of password is unfixing yet, can prevent effectively that other people from cracking.
The technical solution adopted for the present invention to solve the technical problems is: password is no longer preserved fixed numeric values in the database of bank, also do not have regular length, but password is divided into 6 joints, preserves the computing method of every joint password in database.Every joint password obtains numerical value by the computational algorithm of correspondence or character is formed, and 6 joint password combination are become a whole password, and this password can change according to the change of time, and length is unfixing yet.
Cryptographic calculations method of the present invention can be divided into 7 kinds of methods: fixed value, according to calculate in year, according to calculate by the moon, according to calculate in week, according to calculate day, according to the time calculate, according to minute calculating.Every joint password can use algorithms of different, also can use identical algorithms.
Fixed value, it is the numerical value or the character of random length that certain joint password can be set, the user can be defined in this algorithm a certain joint or a few joint of 6 joint passwords.
According to calculating in year, the present invention is provided with the algorithm that numerical value was set respectively according to leap year, non-leap year, the method principle demonstration is provided with " leap year is 3; be 5 non-leap year ", " leap year is 5; be 3 non-leap year ", " leap year is 7; be 9 non-leap year " these three kinds of algorithms altogether, and the user can be defined in this algorithm a certain joint or a few joint of 6 joint passwords.
According to calculating by the moon, the present invention is provided with every month and is double figures, and for example January, value corresponding was " 01 ", and the 1st bit value in January is " 0 ", and the 2nd bit value is " 1 "; Dec, value corresponding was " 12 ", and the 1st bit value in Dec is " 1 ", and the 2nd bit value is " 2 ".The method principle demonstration is provided with " get month the 1st ", " get month the 2nd ", " get month the 1st add month the 2nd " these three kinds of algorithms altogether, and the user can be defined in this algorithm a certain joint or a few joint of 6 joint passwords.
Calculate according to week value, the present invention be provided with Monday value corresponding for " 1 ", Tu. value corresponding for " 2 ", Wednesday value corresponding for " 3 ", Thursday value corresponding for " 4 ", Friday value corresponding for " 5 ", Saturday value corresponding for " 6 ", Sun. value corresponding be " 0 ".The method principle demonstration is provided with " the week value on the same day ", " back 1 day week value ", " back 2 days week value ", " preceding 1 day week value ", " preceding 2 days week value " these five kinds of algorithms altogether, and the user can be defined in this algorithm a certain joint or a few joint of 6 joint passwords.
According to calculating day, it is double figures that this method is provided with every day, and for example value corresponding on the 1st is " 01 ", and 1 day the 1st bit value is " 0 ", and the 2nd bit value is " 1 "; Value corresponding on the 31st is " 31 ", and 31 days the 1st bit value is " 3 ", and the 2nd bit value is " 1 ".The method principle demonstration is provided with " get day the 1st ", " get day the 2nd ", " getting day the 1st; the greater of the 2nd ", " get day the 1st multiply by 3 ", " getting preceding 2 days the 2nd " these five kinds of algorithms altogether, and the user can be defined in this algorithm a certain joint or a few joint of 6 joint passwords.
According to hour calculating, setting of the present invention per hour is double figures (24 hours system), and for example at 1 o'clock in afternoon, value corresponding was " 13 ", and the 1st bit value at 1 o'clock in afternoon is " 1 ", and the 2nd bit value is " 3 "; Value corresponding is " 00 " in the time of zero, and the 1st bit value in the time of zero is " 0 ", and the 2nd bit value is " 0 ".The method principle demonstration is provided with " get hour the 1st ", " get hour the 2nd ", " the 1st that gets hour multiply by 3 and add 2 ", " the 1st that gets hour multiply by 2 and add 3 ", " the 1st that gets hour multiply by 4 and add 5 " these five kinds of algorithms altogether, and the user can be defined in this algorithm a certain joint or a few joint of 6 joint passwords.
According to minute calculating, it is double figures that the present invention is provided with per minute, and span is between " 00 "~" 59 ", and for example the zero value corresponding is " 00 ", and the 1st bit value of zero is " 0 ", and the 2nd bit value is " 0 "; 59 fens value corresponding are " 59 ", and 59 minutes the 1st bit value is " 5 ", and the 2nd bit value is " 9 ".The method principle demonstration is provided with altogether that " get the 1st of branch, " get branch the 2nd ", " the 1st that gets branch adds 1 ", " the 1st that gets branch adds 2 ", " the 2nd that gets branch adds 3 " these five kinds of algorithms, the user can be defined in this algorithm a certain joint or a few joint of 6 passwords.This algorithm is that the present invention best embodies the characteristics that password changes at any time.Even the lawless person has stolen password from network, but as long as user-defined algorithm is " get branch the 2nd ", so as long as after 1 minute, password will change, if user-defined algorithm is " the 2nd that gets branch adds 3 ", after 1 minute, not only password can change so, and the length of password also might change (the 2nd of branch adds 3 more than or equal to 10, length will be how 1).
Because the present invention calculates password according to the time as variable, time point when guaranteeing that server is submitted to the user when the authentication password is consistent, and the present invention can submit user account, user to the time point of password, this three of password that the user submits to pass to server together.The time point that server is submitted to the user is as time variable, and the computing method that user account adopted of preserving according to lane database calculate password, and the result of calculation and the password of user's submission are verified.Guaranteed that like this variable is calculated in the employing of user and server and computing method are all consistent.
Feature of the present invention is: password is divided into 6 joints, and every joint password is made up of numerical value or character that the computing method calculating of correspondence obtains, and 6 joint cipher code set are synthesized user cipher.The content of user cipher, the length of password can change according to the change of time, have guaranteed the safety of password.The time point of when submitting password to the user being submitted to is also submitted in the lump, has guaranteed the consistent of the variable that adopted when the input password is with authentication password.
The invention has the beneficial effects as follows that password can change according to the change of time, thereby guaranteed the safety of account number.This dynamic password not only can be used in automatic teller machine system, Web bank's card payment, phone number payment, website log, network game account protection, and the administrator's password that can also apply to some other important department, post software systems is maintained secrecy.
Embodiment
The present invention is as the program of online transaction supervisor inlet checking, can be independent of outside the online transaction program, only when the user logins, account, password to the user are verified, verify incorrectly can't enter the user and want the online transaction supervisor that uses the checking online transaction supervisor of correctly being allowed for access.Original online transaction program be need not to do any change.Below in conjunction with accompanying drawing the inventive method is further specified.
Fig. 1 is dynamic password generation system login interface figure.
Fig. 2 enters " password setting interface " figure.
Fig. 3 is the 1st joint password setting computing method figure.
Fig. 4 is the 2nd joint password setting computing method figure.
Fig. 5 sets preservation figure after the computing method for 6 joint passwords.
Fig. 6 is the password dynamic change figure whether that comes test setting according to time variable.
Fig. 7 is the consistent figure of time point that time point and the registrant of system-computed password submits password to.
Fig. 8 is the system diagram of concluding the business in the correct laggard networking of password authentification.
Fig. 9 is that online transaction is successfully schemed.
Dynamic cipher generating method demonstration explanation
During demonstration the inventive method principle, only need will " pwxq " file to copy under the root that the D of any computer coils (d: pwxq) clicks this executable file of pw.exe, just can move.
In the user name text box of login window, import: admin, in the cryptogram frame, import: 888888, just can enter into password setting and management the interface (as Fig. 1).Click " user cipher setting " (as Fig. 2) under " password setting " menu, just can enter " password setting interface ", random input one group length is no more than the numeral of 20 bytes in the text box of input card number, clicks " being that the 1st joint is provided with password " Option Box then and just can computing method be set (as Fig. 3) for the 1st joint password (every joint is pressed series arrangement from left to right) of this card number.If want this joint password is established fixed value, just directly click and establish the fixed value menu, the input frame of this joint password correspondence just can bleach so, can manually import the numerical value or the character of random length in input frame; If do not want to establish fixed value, can click arbitrary option of other arbitrary menu, connect in the input frame and can directly show this computing method, this example is " leap year is 3; be 5 non-leap year " to the algorithm that the 1st joint is provided with, and then click " being that the 2nd joint is provided with password " Option Box, computing method to the 2nd joint password are provided with, this example is a fixed value " 6s53a " (as Fig. 4) to the 2nd joint setting, repeats above operation, after finishing to the computing method setting of the 6th joint password again, click " deposit " button, the computing method of every joint password will be saved in lane database, and whether prompting prints computing method simultaneously, it is printed keep (as Fig. 5).Withdraw from this interface, get back to " dynamic cipher generating method (principle demonstration) " interface, click " password test " under " password setting " menu, card number and the password just inputed are verified.If can not be by checking, " password for inquiry " that can click in " user cipher test interface " checks the password (as Fig. 6) that computer calculates.If the password of input is consistent with the password that system calculates, just can enter the online transaction program (as Fig. 7, Fig. 8, Fig. 9).

Claims (5)

1, a kind of password that allows can dynamically change, thereby guarantees the new technical scheme of cryptosecurity.Password is no longer preserved fixed numeric values in database, but password is divided into 6 joints, preserves the computing method of every joint password in the database.
2,, concern the computing method that obtain the characters such as alphabetical or arbitrary punctuation mark between numerical value or a~z by certain calculation according to year, the moon, week, day, hour, minute equal time variable.The character that this algorithm is obtained can change according to the change of time, length is also fixing, thus reach password according to the time dynamically change (the principle demonstration version only enumerated be provided with fixed value, according to calculate in year, according to calculate by the moon, according to calculate in week, according to calculate day, according to the time calculate, according to minute calculating these 7 kinds of methods and 26 kinds of algorithms).
3. password changes the system of department's uses such as the website realizes dynamic change, bank by the time.
4. password calculates by time variable, and the length of password can change because of the variation of time variable, and length is unfixing.
5. the password of user account number, user input, time point that the user submits password to are submitted to server together and carry out password authentification.
CNA2007101677616A 2007-10-28 2007-10-28 Dynamic password generating method CN101425118A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007101677616A CN101425118A (en) 2007-10-28 2007-10-28 Dynamic password generating method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007101677616A CN101425118A (en) 2007-10-28 2007-10-28 Dynamic password generating method

Publications (1)

Publication Number Publication Date
CN101425118A true CN101425118A (en) 2009-05-06

Family

ID=40615728

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007101677616A CN101425118A (en) 2007-10-28 2007-10-28 Dynamic password generating method

Country Status (1)

Country Link
CN (1) CN101425118A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624678A (en) * 2011-01-27 2012-08-01 中国联合网络通信集团有限公司 System verification method and system verification server
CN105871546A (en) * 2016-05-24 2016-08-17 张雪莱 Verification method combining static password and dynamic password and terminal equipment
CN105893834A (en) * 2015-12-24 2016-08-24 王健庭 Establishing method and device of non-fixed character password
US9467443B2 (en) 2013-12-09 2016-10-11 Ram Balasubramaniam MOHAN Authentication utilizing a dynamic passcode from a user-defined formula based on a changing parameter value
CN106789942A (en) * 2016-11-30 2017-05-31 国网山东省电力公司东明县供电公司 A kind of method of password authentication and HRMS

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624678A (en) * 2011-01-27 2012-08-01 中国联合网络通信集团有限公司 System verification method and system verification server
US9467443B2 (en) 2013-12-09 2016-10-11 Ram Balasubramaniam MOHAN Authentication utilizing a dynamic passcode from a user-defined formula based on a changing parameter value
CN105893834A (en) * 2015-12-24 2016-08-24 王健庭 Establishing method and device of non-fixed character password
CN105893834B (en) * 2015-12-24 2019-01-15 王健庭 A kind of creation method and device of on-fixed character password
CN105871546A (en) * 2016-05-24 2016-08-17 张雪莱 Verification method combining static password and dynamic password and terminal equipment
CN106789942A (en) * 2016-11-30 2017-05-31 国网山东省电力公司东明县供电公司 A kind of method of password authentication and HRMS

Similar Documents

Publication Publication Date Title
US10931658B2 (en) Encryption and decryption techniques using shuffle function
Lu et al. Zebralancer: Private and anonymous crowdsourcing system atop open blockchain
WO2018137316A1 (en) Secure transaction method based on block chain, electronic device, system, and storage medium
US10382427B2 (en) Single sign on with multiple authentication factors
WO2018076762A1 (en) Block chain-based transaction verification method and system, electronic device, and medium
KR20180115768A (en) Encryption method and system for secure extraction of data from a block chain
Lin et al. A survey of blockchain security issues and challenges.
US10164952B2 (en) Method and system for server based secure auditing for revisioning of electronic document files
CN105103488B (en) By the policy Enforcement of associated data
Lustig et al. Algorithmic authority: The case of Bitcoin
US20190230092A1 (en) Generating and managing decentralized identifiers
EP3073670A1 (en) A system and a method for personal identification and verification
Windley Digital Identity: Unmasking identity management architecture (IMA)
CA2800657C (en) Systems and methods for using a domain-specific security sandbox to facilitate secure transactions
US6334118B1 (en) Software rental system and method for renting software
CN108833081B (en) Block chain-based equipment networking authentication method
US5935246A (en) Electronic copy protection mechanism using challenge and response to prevent unauthorized execution of software
CN110300973A (en) The foundation of alliance's block chain network
US10270600B2 (en) Secure revisioning auditing system for electronic document files
US8117458B2 (en) Methods and systems for graphical image authentication
US7266693B1 (en) Validated mutual authentication
CN101414909B (en) System, method and mobile communication terminal for verifying network application user identification
US7028180B1 (en) System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature
US4890323A (en) Data communication systems and methods
ES2279933T3 (en) Authentication system and procedure based on the recognition of random partial models.

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
WD01 Invention patent application deemed withdrawn after publication

Open date: 20090506

C02 Deemed withdrawal of patent application after publication (patent law 2001)