CN101604366A - A kind of password separate dynamic verification method and system - Google Patents

A kind of password separate dynamic verification method and system Download PDF

Info

Publication number
CN101604366A
CN101604366A CNA2009100410965A CN200910041096A CN101604366A CN 101604366 A CN101604366 A CN 101604366A CN A2009100410965 A CNA2009100410965 A CN A2009100410965A CN 200910041096 A CN200910041096 A CN 200910041096A CN 101604366 A CN101604366 A CN 101604366A
Authority
CN
China
Prior art keywords
password
subcipher
user
random cipher
operation interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2009100410965A
Other languages
Chinese (zh)
Other versions
CN101604366B (en
Inventor
余元龙
罗笑南
卢林发
叶灿才
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHONGSHAN AIKE DIGITAL TECHNOLOGY Co Ltd
Original Assignee
ZHONGSHAN AIKE DIGITAL TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHONGSHAN AIKE DIGITAL TECHNOLOGY Co Ltd filed Critical ZHONGSHAN AIKE DIGITAL TECHNOLOGY Co Ltd
Priority to CN2009100410965A priority Critical patent/CN101604366B/en
Publication of CN101604366A publication Critical patent/CN101604366A/en
Application granted granted Critical
Publication of CN101604366B publication Critical patent/CN101604366B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The present invention relates to a kind of cipher verification technique, particularly a kind of password separate dynamic verification method and system is characterized in that the method comprising the steps of: A. user will have password and be divided into two groups of subciphers, i.e. first subcipher and second subcipher; B. the user imports first subcipher or second subcipher and the system of being sent in operation interface and accepts checking; C. system carries out checking partial according to subcipher to password, as passes through, and then produces a random cipher group and be sent to operation interface to show; D. the user makes up random cipher group and remaining another subcipher according to the prompting of operation interface, and password and the system of being sent to after operation interface input combination accept checking; E. system will extract another subcipher to be verified and verify from the combination pin of receiving; By then being proved to be successful.The present invention can just protect password in the starting stage that the user inputs password, did not change original user Password Length and content simultaneously, had characteristics such as easy to use, security height.

Description

A kind of password separate dynamic verification method and system
Technical field:
The present invention relates to the password authentification verification technique, particularly a kind of method and system that existing password is carried out segmentation, dynamic authentication.
Background technology
At present, the user lands on various systems, pays, operation such as modification often needs to carry out earlier password authentification.Password itself may be exactly a string number, but but often links together with various forms of wealth, data, information, resource etc., so in case password is stolen, the user will cause loss more or less.
Along with the development of computer technology and mechanics of communication, people have worked out the method for various assurance cryptosecurities.For example utilize various cipher modes and algorithm to realize that the security in the password transport process guarantees; Utilization reduces the risk that is cracked and releases by increasing Password Length or type; Assist by various encryption apparatus and to produce disposal password; Guarantee user's authenticity by multiple authentication; Exchanging policy by various passwords improves security of password etc.
Along with development of computer, various trojan horses also arise at the historic moment.A kind of wooden horse is wherein arranged, and it can realize the operation of keyboard etc. is monitored by program, so no matter what kind of encryption people or system carry out at last to password, also just of no avail, because if original password is stolen, even adopted very complicated algorithm that password is carried out very strange encryption to password, perhaps significantly improve the figure place of password etc., others equally can by steal original password obtain various authorities.In addition, in the daily life, when people operate in some ATM (automatic teller machine), some are felt people agaainst the law and go out its corresponding password by telemonitoring and the operating gesture by people and position judgment, so will guarantee the safety of password conscientiously, a kind of good cryptosecurity scheme should just play a role from the moment of input password.In the reality,, also lost the function that guarantees cryptosecurity so much guarantee the method for cryptosecurity owing to ignored the cryptoguard of the user being carried out the password input phase.
Summary of the invention
The present invention discloses a kind of password separate dynamic verification method and system, by this method or system, can solve effectively that keyboard operation is monitored, input operation is monitored etc. and cause the stolen problem of password.Enforcement of the present invention; can not change the length and the content of the existing password of user on the one hand; do not increase the difficulty of people's memory cipher, be fit on the other hand cooperate yet, the safety of processes such as the input of real performance protection password, transmission, checking with the encryption method of various complexity.
The present invention is achieved by the following scheme:
A kind of password separate dynamic verification method is characterized in that, this method comprises:
A. the user will have password and be divided into two groups of subciphers, i.e. first subcipher and second subcipher;
B. the user imports first subcipher or second subcipher and the system of being sent in operation interface and accepts checking;
C. system carries out checking partial according to subcipher to password, as passes through, and then produces a random cipher group and be sent to operation interface to show;
D. the user makes up random cipher group and remaining another subcipher according to the prompting of operation interface, and password and the system of being sent to after operation interface input combination accept checking;
E. system will extract another subcipher to be verified and verify from the combination pin of receiving; By then being proved to be successful.
As a supplement, this method can also comprise: if step e place checking not by point out input error, system produces a random cipher group again and is sent to operation interface and shows, and forwards step D to;
The checking of step C place is not by then pointing out input error and return interface, and the user re-enters subcipher;
One Security Audit Strategy, the input error number of times when step C or E place reaches setting value, and system stops/lock out action this user's subsequent authentication automatically.
As optimization, the password dividing method at the steps A place of the above comprises in order and cutting apart, uniformly-spaced cut apart to extract with intermediate mass and cut apart;
The described password combination method in step D place comprises that subcipher integral body assigns arbitrary position, subcipher in the random cipher group to disperse in order to assign in the random cipher group.
In order to guarantee the checking quality to subcipher, first subcipher of the above and second subcipher are to have two or above password.
Further, the figure place of the described random cipher group of step C is a random number, and promptly the random cipher group is not for fixing.
A kind ofly adopt landing or payment system of password separate dynamic verification, it comprises and landing/payment interface, a password authentification platform that be characterised in that: the method for password authentication that this system lands/adopts when paying is the password separate dynamic verification method of the above.
The present invention in contrast to existing method of password authentication, and its outstanding beneficial effect comprises:
1. the length and the content that have kept the original password of user, additionally increase has made things convenient for the user to remember difficulty, and is simultaneously easy to use;
2. by wooden horse monitoring or the artificial stolen problem of password that causes such as monitor automatically, just protect when effectively having solved the user from the password operational phase because of the input password;
3. the random cipher group that produces by introduction system, and the length of this cipher code set also is at random, realizes the dynamic password protection;
4. also there is multiple scheme in the combination that original password has multiple splitting scheme, subcipher and random cipher group, has the security audit function that a pair of input error number of times calculates, go even subcipher is all stolen, steal taker and also can't in limited number of times, reduce original password.
Embodiment
Embodiment one
A kind of password separate dynamic verification method, password that provide according to service side for a kind of user or registration voluntarily is inputed this password and is accepted the method that system/service side verifies in operation interface.
With reference to shown in Figure 1, be one in this method of password authentication checking flow process.By this flow process, can reproduce the present invention program's core content clearly;
At first as Fig. 1 101 shown in, the password that the user will have earlier is divided into two groups of subciphers, i.e. first subcipher and second subcipher; The method of cutting apart can comprise in order and cutting apart, uniformly-spaced cut apart to extract with intermediate mass and method such as cut apart.
For example, establishing the existing password of user is six password (X 1X 2X 3X 4X 5X 6), X wherein 1, X 2, X 3, X 4, X 5, X 6Can be numeral, letter, punctuation mark even Chinese character etc.First subcipher can have following splitting scheme according to different dividing methods with second subcipher:
1. cut apart in order, be about to password and be divided into two piecemeals in order, each password position of two piecemeals keeps original neighbouring relations.Promptly first subcipher and second subcipher correspond to respectively:
First subcipher Second subcipher
X 1?X 2 ?X 3?X 4?X 5?X 6
X 3?X 4?X 5?X 6 ?X 1?X 2
X 1?X 2?X 3 ?X 4?X 5?X 6
X 4?X 5?X 6 ?X 1?X 2?X 3
X 1?X 2?X 3?X 4 ?X 5?X 6
X 5?X 6 ?X 1?X 2?X 3?X 4
2. uniformly-spaced cut apart, promptly from original code, extract password unit separated by a certain interval and be reassembled into subcipher.Promptly first subcipher and second subcipher correspond to respectively:
First subcipher Second subcipher
??X 1?X 3?X 5 ??X 2?X 4?X 6
??X 2?X 4?X 6 ??X 1?X 3?X 5
3. intermediate mass extracts and cuts apart, and promptly extracts some adjacent passwords as a subcipher from original code, and remaining is another password.Promptly first subcipher and second subcipher correspond to respectively:
First subcipher Second subcipher
??X 2?X 3 ??X 1?X 4?X 5?X 6
??X 1?X 4?X 5?X 6 ??X 2?X 3
??X 3?X 4 ??X 1?X 2?X 5?X 6
??X 1?X 2?X 5?X 6 ??X 3?X 4
??X 4?X 5 ??X 1?X 2?X 3?X 6
??X 1?X 2?X 3?X 6 ??X 4?X 5
??X 2?X 3?X 4 ??X 1?X 5?X 6
??X 1?X 5?X 6 ??X 2?X 3?X 4
??X 3?X 4?X 5 ??X 1?X 2?X 6
??X 1?X 2?X 6 ??X 3?X 4?X 5
By contrast, can know that the array configuration that intermediate mass extracts dividing method is more complicated, the risk that password is stolen at last is also just more lower.
If in order to make the cipher anti theft function reach optimum, that verification system can all be verified support to above-mentioned arbitrary dividing method, even two subciphers are stolen like this, that probability that successfully it is combined into original code also drops to minimum.
But, if consider, can only carry out the password cutting operation by first method for the convenience of user's use, promptly cut apart in order; In operation time like this,, operation interface is in addition promptings such as " please input the front three of password ... " again, and the user then can understand dividing method wherein rapidly, and carries out next step operation.
At present, the general employing of the system of bank is the method for password authentication of six bit digital.For being known, the user how password is cut apart, if method of the present invention is applied to the cash dispenser of bank, then the cash dispenser operation interface can be made corresponding prompt as " please importing the front two numeral of original code in order ... ", " please importing the front three numeral of original code in order ... ", " please importing any three bit digital of original code in order ... " etc.
At present, in order to reduce the risk that password is stolen, a lot of online login systems have all adopted for example eight, ten in the password more than six etc., and password can be made up of numeral, letter, punctuation mark even Chinese character etc.So when these passwords were cut apart, its scheme was also just more, the array configuration of first subcipher and second subcipher is also just complicated more, and the risk that password is stolen is just low more.
In order to guarantee the checking quality to system's subcipher, promptly first subcipher and second subcipher should be and have two or above password.If promptly existing password is six password (X 1X 2X 3X 4X 5X 6) and X 1, X 2, X 3, X 4, X 5, X 6Be numeral.So, cut apart by split plot design in order, scheme can comprise that " 2+4 ", " 3+3 " (are X 1X 2And X 3X 4X 5X 6, X 1X 2X 3And X 4X 5X 6); If eight passwords can comprise that then " 2+6 ", " 3+5 ", " 4+4 " (are X 1X 2And X 3X 4X 5X 6X 7X 8, X 1X 2X 3And X 4X 5X 6X 7X 8, X 1X 2X 3X 4And X 5X 6X 7X 8).For six and eight passwords, can select " 3+3 ", " 3+5 " to be preferred version respectively.The probability that subcipher as the input of 102 places of Fig. 1 is 1, then hit it is 1/10th; If 2, then the probability of being hit it is one of percentage; If 3, then the probability of being hit it is a per mille.So for the checking quality at 103 places that guarantee Fig. 1, the subcipher of 102 places input is more than 2 or 2, promptly first subcipher and second subcipher are to have two or above password.
As Fig. 1 102 shown in, cut apart or the prompting of operation interface under cut apart after, in the password input frame position of operation interface import first subcipher or second subcipher from being about to by password for the user.The principle of wherein importing first subcipher or second subcipher is identical, and for convenience, what suppose the input of this place is first subcipher, and employing is first kind of dividing method.After then the user imported first subcipher, password was transferred into system and accepts checking.Password is transmitted also to have coding, encryption, adds processes such as source address and destination address in the process, these processes are because non-emphasis of the present invention, so and this area can be easy to per capita understand and realize not doing detailed description.The system that subcipher is verified can be verification platform (for example, if the cash dispenser of bank then refers to its system software backstage) of this locality or long-range verification system (for example service device of certain on the network and supporting service system) in addition.
As Fig. 1 103 and 104 shown in, system verifies first subcipher of user input (i.e. 102 places import password).If eligible would verify by and forward 108 to, otherwise forward 105 to; Described checking, final first subcipher that obtains of the system that is meant compares with the original code that is pre-stored in system, if the contrast back judges that first subcipher is the local password that splits of original code, that checking is passed through.That is, if original code is (X 1X 2X 3X 4X 5X 6), according to first kind of dividing method, when first subcipher of input is ABK, and (A=X 1, B=X 2, K=X 3) or (A=X 4, B=X 5, K=X 6) time checking passes through, otherwise do not pass through; And for example, if cut apart according to second kind of dividing method, first subcipher when input is ABK so, when being (A=X 1, B=X 3, K=X 5) or (A=X 2, B=X 4, K=X 6) time, checking is passed through, otherwise does not pass through.
For the various password dividing methods of compatibility (promptly no matter how cutting apart), then its by the condition of checking for being defined as: as long as the password potential energy of respectively forming of first subcipher of input finds with its corresponding composition password position and the relative sequencing of respectively forming the password position at original code respectively and is consistent then by verifying with original password.When realizing, can read by turn subcipher respectively, and contrast realization by turn with the password of former preservation by two loop statements (be two-stage circulation) with program.
As Fig. 1 105 shown in, if first subcipher checking is not passed through, then input error is pointed out in operation interface by system, and the number of times of the number of times of record input error or this input error adds 1 and turn to 106 places;
As Fig. 1 106 shown in, judge whether the input error number of times behind 105 places reaches setting value (can be provided with according to actual needs, generally can be made as 3), if then stop/locking the follow-up password verification operation of this user, be cracked to prevent password; The input error number of times does not reach setting value, then returns 102 places, and the user re-enters first subcipher;
As Fig. 1 108 shown in, system passes through first subcipher checking, then produces a random cipher array automatically, the random cipher array is sent to operation interface and shows after system's storage.Different systems, the random cipher array can comprise different components, for example numeral, letter, symbol, punctuate even Chinese character etc.The figure place of random cipher array is a random number, and promptly the length of random cipher array is uncertain.The degree at random of random cipher array and figure place thereof is high more in theory, and the security of password is also just good more, but actual use can be established a upper limit to the length of random cipher group.
As Fig. 1 109 shown in, the user makes up random cipher array and remaining another subcipher (i.e. second subcipher) according to the prompting of operation interface.The mode of random cipher array and second subcipher combination comprises that subcipher integral body assigns arbitrary position, subcipher in the random cipher group to disperse in order to assign in the random cipher group etc.For example, suppose that original code is (X 1X 2X 3X 4X 5X 6), the user imports the first subcipher (X 1X 2X 3) by system verification, the random cipher group that supposing the system returns automatically is six random number (Y 1Y 2Y 3Y 4Y 5Y 6), the random cipher array and the second subcipher (X so 4X 5X 6) combination form can for:
Method one. subcipher integral body is assigned the arbitrary position in the random cipher group;
Y 1?X 4?X 5?X 6?Y 2?Y 3?Y 4?Y 5?Y 6
Y 1?Y 2?X 4?X 5?X 6?Y 3?Y 4?Y 5?Y 6
Y 1?Y 2?Y 3?X 4?X 5?X 6?Y 4?Y 5?Y 6
Y 1?Y 2?Y 3?Y 4?X 4?X 5?X 6?Y 5?Y 6
Y 1?Y 2?Y 3?Y 4?Y 5?X 4?X 5?X 6?Y 6
Method two. subcipher disperses to assign in order in the random cipher group;
Y 1?X 4?Y 2?X 5?Y 3?X 6?Y 4?Y 5?Y 6
Y 1?Y 2?X 4?Y 3?X 5?Y 4?X 6?Y 5?Y 6
Y 1?Y 2?Y 3?X 4?Y 4?X 5?Y 5?X 6?Y 6
Y 1?Y 2?Y 3?Y 4?X 4?Y 5?X 5?Y 6?X 6
Y 1?Y 2?Y 3?Y 4?X 4?Y 5?X 5?Y 6?X 6
Y 1?X 4?Y 2?Y 3?X 5?Y 4?X 6?Y 5?Y 6
Y 1?X 4?Y 2?Y 3?X 5?Y 4?Y 5?X 6?Y 6
......
Method three. other array mode;
In the actual use of system, how the general difficult understanding of user carries out the combination of the random cipher array and second subcipher, so operation interface can be done some promptings, for example: the demonstration of random cipher component two parts (is assumed to be A portion and B portion, wherein the figure place of A portion is a random number, the length that is A portion is unfixing), then can point out the user to input " A+ remains password+B " in order; And for example, can show that the position that needs to fill second subcipher stays the room with the random cipher array is whole, the random cipher array of then pointing out the user to input in order to see is also inserted remaining password in vacant position and is got final product; The user is made up according to the prompting of system, both user-friendly, also make things convenient for the extraction of system to second subcipher.
As Fig. 1 110 shown in, the user is the password after operation interface input combination in order.
As Fig. 1 111 shown in, the password after the combination is received by system, and extracts remaining another subcipher, i.e. second subcipher from the password after this combination.The method of extracting, according to the difference of array mode, flow process is also inequality.For example, if operation interface is to point out the user to import combination pin in the mode of " A+ remains password+B ", that method of extracting second subcipher is fairly simple, the random cipher group that promptly only needs the combination pin that will receive and storage relatively, in the combination pin with A portion and B part from obtaining second subcipher; If other array mode, then can promptly read combination pin by turn with general extracting method, and whether identical on judgement and the random cipher group, extract the composition identical with the random cipher group, remaining composition reconfigures and can obtain by former relative sequencing.
As Fig. 1 112 shown in, system verifies second subcipher that extracts.Verification method if can judge the part of second subcipher for existing password, then is proved to be successful (i.e. 113 places) for second subcipher and existing password are compared.The principle of checking is identical with 103 and 104 places with method.
As Fig. 1 114 and 115 shown in, if the checking at 112 places not by the input error number of times is write down and calculates the input error number of times, and judge whether the input error number of times reaches setting value and (can be provided with according to actual needs, generally be made as 3 times), if reach setting value then stop/locking the follow-up password verification operation of this user (promptly 116), be cracked to prevent password; Otherwise forward 108 to, system produces a random cipher group again and is shown in operation interface, repeats the operation of 109,110,111 grades then.
Embodiment two
A kind ofly adopt landing or payment system of password separate dynamic verification, this system supports that by hardware supported and software the two large divisions forms.Wherein, system should have and lands/payment interface and a guidance panel, and its effect is to make things convenient for the user to carry out the password input operation; One password authentification platform, its effect are that user's password is verified.
System can be the payment system of bank such as ATM ATM (automatic teller machine) etc., also can be Web bank's payment system, online login system etc.
A kind ofly adopt landing or payment system of password separate dynamic verification, it is characterised in that: the method for password authentication that this system lands/adopts when paying is embodiment one a described method of password authentication.
Below with Web bank's payment system be example to how realizing that password authentification is described further:
Suppose the user on the net bank payment system registered a user name and payment cipher, this password is eight passwords, is designated as (X 1X 2X 3X 4X 5X 6X 7X 8), then its password authentification can adopt following scheme to realize according to the invention core of embodiment one:
1. the user is according to the front three of interface prompt (as shown in Figure 2) input payment cipher, i.e. X 1X 2X 3
2. system contrasts the front three password of user input and judges whether consistent with the front three of original password.If unanimity then produce a random cipher array and be shown in operation interface is supposed that the random cipher array is " 87487654654 ", and is divided two parts to show; The interface prompt user inputs random cipher array and remaining five passwords, (as shown in Figure 3); Otherwise judge whether the input error number of times reaches set point number, do not reach and then point out input error, and show operation interface as Fig. 4, the user re-enters the front three of payment cipher, if reach set point number then show interface shown in Figure 5, and stop this user's follow-up checking;
3. the user inputs random cipher group and remaining five passwords in order according to interface prompt as shown in Figure 3;
4. system compares the random cipher group of the combination pin of user input and storage and extracts remaining five seat passwords, and this five seats password and original password compared judges whether it is the part that original password splits.If then be proved to be successful, closing the transaction or carry out other follow-up operation; Otherwise prompting input password mistake, and judge whether the input error number of times reaches set point number, reach set point number and then show interface shown in Figure 5, and stop this user's follow-up checking, if do not reach then show operation interface as Fig. 6, promptly system produces another random cipher group automatically (as " 6896685248 ", and divide two parts to show, i.e. " 689668 " and " 5248 "), and be sent to interface display, the prompting user re-enters password; The user re-enters password by prompting;
Operation interface of the above and implementation are a simple mode; the extracting mode of the actual partitioning scheme that can increase content according to the explanation of embodiment one, change original password, change random cipher group and the array mode of residue password, the suggestion content that changes the interface and style, change subcipher and checking flow process then should be considered as in protection scope of the present invention at the core content that does not break away from the inventive method realization.
In addition, native system can also have one and notify this user cipher authentication error number of times to reach setting value prior to the contact method (as phone number, mail, telephone number etc.) of this system registry and by modes such as note, mail, voice in advance by reading the user, and notify the registered user to carry out operations such as release and modification password, can further guarantee the risk that password is stolen like this.

Claims (10)

1. password separate dynamic verification method is characterized in that the method comprising the steps of:
A. the user will have password and be divided into two groups of subciphers, i.e. first subcipher and second subcipher;
B. the user imports first subcipher or second subcipher and the system of being sent in operation interface and accepts checking;
C. system carries out checking partial according to subcipher to password, as passes through, and then produces a random cipher group and be sent to operation interface to show;
D. the user makes up random cipher group and remaining another subcipher according to the prompting of operation interface, and password and the system of being sent to after operation interface input combination accept checking;
E. system will extract another subcipher to be verified and verify from the combination pin of receiving; By then being proved to be successful.
2. method of password authentication as claimed in claim 1 is characterized in that: by then pointing out input error, system does not produce a random cipher group and is sent to operation interface and shows the checking of step e place again, and forwards step D to.
3. method of password authentication as claimed in claim 1 is characterized in that: step C place verifies that the user re-enters subcipher not by then pointing out input error and return interface.
4. method of password authentication as claimed in claim 1 is characterized in that: this method also comprises a Security Audit Strategy, and the input error number of times when step C or E place reaches setting value, and system stops/lock out action this user's subsequent authentication automatically.
5. as the arbitrary described method of password authentication of claim 1 to 4, it is characterized in that: the password dividing method at steps A place comprises in order and cutting apart, uniformly-spaced cut apart to extract with intermediate mass and cut apart.
6. as the arbitrary described method of password authentication of claim 1 to 4, it is characterized in that: the described password combination method in step D place comprises that subcipher integral body assigns arbitrary position, subcipher in the random cipher group to disperse in order to assign in the random cipher group.
7. method of password authentication as claimed in claim 5 is characterized in that: the described password combination method in step D place comprises that subcipher integral body assigns arbitrary position, subcipher in the random cipher group to disperse in order to assign in the random cipher group.
8. method of password authentication as claimed in claim 7 is characterized in that: first subcipher and second subcipher are to have two or above password.
9. method of password authentication as claimed in claim 8 is characterized in that: the figure place of the described random cipher group of step C is a random number.
10. one kind is adopted landing or payment system of password separate dynamic verification, it comprises and landing/payment interface, a password authentification platform that be characterised in that: the method for password authentication that this system lands/adopts when paying is the arbitrary described method of password authentication of claim 1 to 9.
CN2009100410965A 2009-07-13 2009-07-13 Password separate dynamic verification method and system Expired - Fee Related CN101604366B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100410965A CN101604366B (en) 2009-07-13 2009-07-13 Password separate dynamic verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100410965A CN101604366B (en) 2009-07-13 2009-07-13 Password separate dynamic verification method and system

Publications (2)

Publication Number Publication Date
CN101604366A true CN101604366A (en) 2009-12-16
CN101604366B CN101604366B (en) 2013-03-06

Family

ID=41470093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100410965A Expired - Fee Related CN101604366B (en) 2009-07-13 2009-07-13 Password separate dynamic verification method and system

Country Status (1)

Country Link
CN (1) CN101604366B (en)

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101882193A (en) * 2010-07-14 2010-11-10 中兴通讯股份有限公司 Method and equipment for unlocking handheld device
CN102271035A (en) * 2011-09-02 2011-12-07 华为技术有限公司 Password transmission method and device
CN102737195A (en) * 2012-07-04 2012-10-17 周灿旭 Master and slave dynamic passwords
CN102881079A (en) * 2012-08-28 2013-01-16 汪风珍 Trampled multi-password early-warning type different card controllable bank card
CN102884534A (en) * 2010-05-11 2013-01-16 汤姆森特许公司 Methods, devices and computer program supports for password generation and verification
CN102957688A (en) * 2012-08-16 2013-03-06 中国商用飞机有限责任公司 Password input and verification method and device
CN103136462A (en) * 2011-12-05 2013-06-05 联想(北京)有限公司 Method and system of password authentication
WO2013107296A1 (en) * 2012-01-18 2013-07-25 华为终端有限公司 Encryption and decryption methods and devices and electronic device
CN103365581A (en) * 2012-03-31 2013-10-23 百度在线网络技术(北京)有限公司 User equipment touch unlocking method and device based on unlocking password
CN103457730A (en) * 2012-06-05 2013-12-18 中国银联股份有限公司 Device and method for safety information interaction and IC card for safety information interaction
CN103490874A (en) * 2012-06-14 2014-01-01 中国银联股份有限公司 Safety information interaction system, method, device and server
CN103679935A (en) * 2013-05-01 2014-03-26 汪风珍 Keyword formed by synthesis through terminal
CN103714626A (en) * 2013-05-01 2014-04-09 汪风珍 Multi-password pre-warning type bank card capable of being controlled by different card
CN103971048A (en) * 2014-04-30 2014-08-06 宇龙计算机通信科技(深圳)有限公司 Method and system for entering password
CN104021322A (en) * 2013-02-28 2014-09-03 北京旋极信息技术股份有限公司 Electronic signature method, electronic signature equipment and electronic signature client
TWI454121B (en) * 2011-05-30 2014-09-21 Chunghwa Telecom Co Ltd Method for generating dynamic code over secure network connection
CN104063639A (en) * 2013-03-22 2014-09-24 卡西欧计算机株式会社 Authentication Processing Device For Performing Authentication Processing
CN104143068A (en) * 2014-07-16 2014-11-12 宇龙计算机通信科技(深圳)有限公司 Password authentication method and system
CN104504316A (en) * 2014-12-04 2015-04-08 英业达科技有限公司 Login system and method thereof for integrating verification codes and passwords
CN104834840A (en) * 2014-07-03 2015-08-12 中国人民解放军92728部队 Password protection method based on mapping drifting technology
CN105373921A (en) * 2015-10-13 2016-03-02 中国银联股份有限公司 Method and system for inputting identity information relative to transaction data
CN105488365A (en) * 2014-09-16 2016-04-13 阿里巴巴集团控股有限公司 Verification method and device
CN105656844A (en) * 2014-11-12 2016-06-08 江苏威盾网络科技有限公司 Method for preventing network hacker from stealing password
CN102884534B (en) * 2010-05-11 2016-12-14 汤姆森特许公司 Password generate and checking method and device
WO2017028241A1 (en) * 2015-08-18 2017-02-23 赵政荣 Dual-password authentication unlocking method, and portable safe
CN107506653A (en) * 2017-07-17 2017-12-22 深圳前海微众银行股份有限公司 Cipher management method, device and computer-readable recording medium
CN107871075A (en) * 2016-09-28 2018-04-03 京瓷办公信息系统株式会社 Cipher authentication device
CN108229186A (en) * 2017-12-28 2018-06-29 深圳天珑无线科技有限公司 Verification method, verification system and electronic equipment
CN116580487A (en) * 2023-07-14 2023-08-11 深圳市旭子科技有限公司 Password information security management method and object interlocking management system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1848726A (en) * 2005-04-15 2006-10-18 王岳 Dynamic identifying method
CN101291225A (en) * 2007-04-27 2008-10-22 丁洪涛 Authentication method adopting complex cryptographic technique
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1848726A (en) * 2005-04-15 2006-10-18 王岳 Dynamic identifying method
CN101291225A (en) * 2007-04-27 2008-10-22 丁洪涛 Authentication method adopting complex cryptographic technique
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method

Cited By (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102884534B (en) * 2010-05-11 2016-12-14 汤姆森特许公司 Password generate and checking method and device
CN102884534A (en) * 2010-05-11 2013-01-16 汤姆森特许公司 Methods, devices and computer program supports for password generation and verification
US9384343B2 (en) 2010-05-11 2016-07-05 Thomson Licensing Methods, devices and computer program supports for password generation and verification
WO2012006879A1 (en) * 2010-07-14 2012-01-19 中兴通讯股份有限公司 Method and apparatus for unlocking handheld device
CN101882193A (en) * 2010-07-14 2010-11-10 中兴通讯股份有限公司 Method and equipment for unlocking handheld device
TWI454121B (en) * 2011-05-30 2014-09-21 Chunghwa Telecom Co Ltd Method for generating dynamic code over secure network connection
CN102271035A (en) * 2011-09-02 2011-12-07 华为技术有限公司 Password transmission method and device
CN102271035B (en) * 2011-09-02 2014-12-24 华为技术有限公司 Password transmission method and device
CN103136462A (en) * 2011-12-05 2013-06-05 联想(北京)有限公司 Method and system of password authentication
CN103136462B (en) * 2011-12-05 2016-03-30 联想(北京)有限公司 A kind of method and system of password authentification
WO2013107296A1 (en) * 2012-01-18 2013-07-25 华为终端有限公司 Encryption and decryption methods and devices and electronic device
CN103365581A (en) * 2012-03-31 2013-10-23 百度在线网络技术(北京)有限公司 User equipment touch unlocking method and device based on unlocking password
CN103457730A (en) * 2012-06-05 2013-12-18 中国银联股份有限公司 Device and method for safety information interaction and IC card for safety information interaction
CN103457730B (en) * 2012-06-05 2016-12-14 中国银联股份有限公司 Safety information interaction device and method and for the mutual IC-card of safety information
CN103490874A (en) * 2012-06-14 2014-01-01 中国银联股份有限公司 Safety information interaction system, method, device and server
CN102737195A (en) * 2012-07-04 2012-10-17 周灿旭 Master and slave dynamic passwords
CN102957688A (en) * 2012-08-16 2013-03-06 中国商用飞机有限责任公司 Password input and verification method and device
CN102957688B (en) * 2012-08-16 2016-05-04 中国商用飞机有限责任公司 password input and verification method and device
CN102881079B (en) * 2012-08-28 2015-04-22 汪风珍 Trampled multi-password early-warning type different card controllable bank card
CN102881079A (en) * 2012-08-28 2013-01-16 汪风珍 Trampled multi-password early-warning type different card controllable bank card
CN104021322A (en) * 2013-02-28 2014-09-03 北京旋极信息技术股份有限公司 Electronic signature method, electronic signature equipment and electronic signature client
CN104063639A (en) * 2013-03-22 2014-09-24 卡西欧计算机株式会社 Authentication Processing Device For Performing Authentication Processing
US9881148B2 (en) 2013-03-22 2018-01-30 Casio Computer Co., Ltd. Authentication processing device for performing authentication processing
CN104063639B (en) * 2013-03-22 2019-01-01 卡西欧计算机株式会社 Carry out the verification processing device of verification processing
CN103714626B (en) * 2013-05-01 2017-09-08 汪风珍 Many password early warning types can different card control bank card
CN103679935A (en) * 2013-05-01 2014-03-26 汪风珍 Keyword formed by synthesis through terminal
CN103714626A (en) * 2013-05-01 2014-04-09 汪风珍 Multi-password pre-warning type bank card capable of being controlled by different card
CN103971048A (en) * 2014-04-30 2014-08-06 宇龙计算机通信科技(深圳)有限公司 Method and system for entering password
CN104834840A (en) * 2014-07-03 2015-08-12 中国人民解放军92728部队 Password protection method based on mapping drifting technology
CN104834840B (en) * 2014-07-03 2018-05-08 中国人民解放军92728部队 Cipher code protection method based on mapping drift technology
CN104143068B (en) * 2014-07-16 2017-10-17 宇龙计算机通信科技(深圳)有限公司 Method of password authentication and system
CN104143068A (en) * 2014-07-16 2014-11-12 宇龙计算机通信科技(深圳)有限公司 Password authentication method and system
CN105488365A (en) * 2014-09-16 2016-04-13 阿里巴巴集团控股有限公司 Verification method and device
CN105656844A (en) * 2014-11-12 2016-06-08 江苏威盾网络科技有限公司 Method for preventing network hacker from stealing password
CN104504316A (en) * 2014-12-04 2015-04-08 英业达科技有限公司 Login system and method thereof for integrating verification codes and passwords
WO2017028241A1 (en) * 2015-08-18 2017-02-23 赵政荣 Dual-password authentication unlocking method, and portable safe
WO2017063545A1 (en) * 2015-10-13 2017-04-20 中国银联股份有限公司 Identity information input method and system relevant to transaction data
CN105373921A (en) * 2015-10-13 2016-03-02 中国银联股份有限公司 Method and system for inputting identity information relative to transaction data
CN107871075A (en) * 2016-09-28 2018-04-03 京瓷办公信息系统株式会社 Cipher authentication device
CN107871075B (en) * 2016-09-28 2021-04-09 京瓷办公信息系统株式会社 Password authentication device
CN107506653A (en) * 2017-07-17 2017-12-22 深圳前海微众银行股份有限公司 Cipher management method, device and computer-readable recording medium
CN108229186A (en) * 2017-12-28 2018-06-29 深圳天珑无线科技有限公司 Verification method, verification system and electronic equipment
CN116580487A (en) * 2023-07-14 2023-08-11 深圳市旭子科技有限公司 Password information security management method and object interlocking management system
CN116580487B (en) * 2023-07-14 2023-09-26 深圳市旭子科技有限公司 Password information security management method and object interlocking management system

Also Published As

Publication number Publication date
CN101604366B (en) 2013-03-06

Similar Documents

Publication Publication Date Title
CN101604366B (en) Password separate dynamic verification method and system
CN103258270B (en) Bank paying method and device thereof
CN104464117B (en) Based on dynamic two-dimension code ATM (automatic teller machine) withdrawal method and system
CN101252439B (en) System and method for increasing information safety equipment security
CN101562525B (en) Method, device and system for signature
CN102158488B (en) Dynamic countersign generation method and device and authentication method and system
CN101236675A (en) Method for checking bank terminal equipment legitimacy by user mobile phones SMS
CN101807319A (en) Authentication method and system based on ATM
CN101241572A (en) Electronic signing tool operation method and electronic signing tool
CN109086600A (en) Password generates and Verification System
CN106973043B (en) Password verification system and password verification method
CN102025506A (en) User authentication method and device
CN106713370A (en) Identity authentication method, server and mobile terminal
CN106204952A (en) Self-service move back X 2 method and self-service move back card system
CN110175439A (en) User management method, device, equipment and computer readable storage medium
CN104901926A (en) Voiceprint feature based remote authentication payment system and method
CN101178822A (en) Method supporting user verifying legitimacy of bank brushing card terminal equipment
CN105138887B (en) A kind of input method of log-on message, device and terminal device
CN104657860A (en) Mobile banking security authentication method
CN105096454A (en) Unauthorized bank card swiping prevention system and method for preventing unauthorized bank card swiping on POS machine
CN100535937C (en) Method and system for user authentication in a digital communication system
CN101282221A (en) Dynamic password apparatus for multiple applications and implementing method
CN101398951A (en) Electronic card verification method and electronic card service platform
CN102938116A (en) Full-link protection and management method for ensuring safety of transaction
CN105069361A (en) Safety access method and system for privacy space

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 528400 No. three Xin Road 92, triangle town, Guangdong, Zhongshan

Applicant after: Zhongshan Iker Digital Technology Co., Ltd.

Address before: 528400 No. three Xin Road 92, triangle town, Guangdong, Zhongshan

Applicant before: Zhongshan Aike Digital Technology Co., Ltd.

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: ZHONGSHAN AIKE DIGITAL TECHNOLOGY CO., LTD. TO: ZHONGSHAN IKER DIGITAL TECHNOLOGY CO., LTD.

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20130306

Termination date: 20180713

CF01 Termination of patent right due to non-payment of annual fee