CN103354499B - A kind of legitimacy real-time verification method of dynamic password - Google Patents

A kind of legitimacy real-time verification method of dynamic password Download PDF

Info

Publication number
CN103354499B
CN103354499B CN201310252725.5A CN201310252725A CN103354499B CN 103354499 B CN103354499 B CN 103354499B CN 201310252725 A CN201310252725 A CN 201310252725A CN 103354499 B CN103354499 B CN 103354499B
Authority
CN
China
Prior art keywords
data
dynamic password
unit
module
tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310252725.5A
Other languages
Chinese (zh)
Other versions
CN103354499A (en
Inventor
樊晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310252725.5A priority Critical patent/CN103354499B/en
Publication of CN103354499A publication Critical patent/CN103354499A/en
Application granted granted Critical
Publication of CN103354499B publication Critical patent/CN103354499B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A kind of legitimacy real-time verification method that the invention discloses dynamic password, is characterized in that: the device that this method is used comprises electronic module tag, user rs authentication terminal module and authentication service module three parts. Electronic module tag is used for generating dynamic password data and shows; The view data that No. ID, the dynamic password data that user rs authentication terminal module collection electronic module tag repeatedly generates and electronic module tag, carry out after analyzing and processing, obtain text-type data, then text-type data are sent to authentication service module by internet internet; Authentication service module receives after text-type data, through calculating and checking, draw the first dynamic password data generating algorithm result whether consistent with the second dynamic password data generating algorithm of authentication service module of electronic module tag, and result is turned back to user rs authentication terminal module, thereby judge the legitimacy of electronic module tag.

Description

A kind of legitimacy real-time verification method of dynamic password
Technical field
The present invention relates to a kind of method of dynamic password authentication, specifically, relate to a kind of user in real time by electronic tag mouldWhether the dynamic password generating algorithm of piece and authentication service module is consistent, differentiates the method for electronic module tag legitimacy.
Background technology
Current common label is generally the various ways such as numeral, English character, the combination of various character, bar code or Quick Response Code,Every kind of label all has its convenience, but every kind of label is immutable label, can be replicated use.
What electronic module tag field mainly adopted is the mode such as RFID, NFC, and this type label all needs to adopt special checkingTerminal just can read, and also needs to depend on professional system and just can carry out legitimate verification. Be unfavorable for spreading to each userUse, more can not allow user carry out easily real-time verification whenever and wherever possible.
The E-token dynamic password card of clock-type, is to synchronize by the clock of clock controller and server user record, necessarilyAfter time, because the skew of clock controller can produce the asynchronous of clock, need to carry out manual calibration, be not easy to long-term unmannedUnder the environment of management, use.
Summary of the invention
For addressing the above problem, the invention provides a kind of legitimacy real-time verification method of dynamic password, it is characterized in that: the partyThe device that method is used comprises: electronic module tag, user rs authentication terminal module and authentication service module;
Described electronic module tag comprises: clock control cell (2), administrative unit (1), dynamic password dispensing unit (3),Display unit (5), memory cell (4).
Described user rs authentication terminal module comprises: application management unit (9), image analyzing unit (7), image acquisition units (6),Application dispensing unit (8), data input cell (16).
Described authentication service module comprises: authentication service unit (10), dynamic password dispensing unit (12), service configuration unit(11), clock control cell (13).
The legitimacy real-time verification method of described dynamic password comprises the steps:
Steps A give each electronic module tag give one unique No. ID, be expressed as IDS1 No. ID, be positioned over electronics markSign the surface location of module; In electronic module tag and authentication service module, define equal clock accumulation period; At electronics markThe initial clock data of the middle definition of memory cell (4) of signing module is DSS1; In the memory cell (4) of electronic module tag, protectDeposit this electronic module tag No. ID;
The application management unit (9) of step party B-subscriber's verification terminal module is controlled image acquisition units (6) and is gathered electronic tag mouldThe view data IDT1 of piece ID IDS1, and use image analyzing unit (7) that view data IDT1 is positioned, cut apartAnd analysis, view data IDT1 is converted into the data IYS1 of text or digital form, and IYS1 is saved in to application configuration listIn unit (8); Then IYS1 is sent to authentication service module by internet internet;
Step C authentication service module receives after the data IYS1 that user rs authentication terminal module sends, by authentication service unit(10) Item Information of data query IYS1 representative in service configuration unit (11), and by internet internetSend to user rs authentication terminal module;
The application management unit (9) of step D user rs authentication terminal module receives after the Item Information that certificate server returns,Confirm by user whether Item Information conforms to electronic module tag representative article; If article do not conform to, think this electronicsLabel model is illegal; If article conform to, user starts electronic module tag by switch element (15);
After step e electronic module tag starts, the administrative unit (1) of electronic module tag is according to clock control cell (2)Clock period of change, in the time of first clock period of change, initial clock data is DSS1; Administrative unit (1) is to store listIn unit (4), the ID IDS1 of electronic module tag and initial clock data DSS1 are as calculated factor, by first dynamic mouthfulMake the dynamic password generating algorithm PSW1 of dispensing unit (3) generate dynamic password data DKS1, and DKS1 is presented to demonstrationIn unit (5); Then administrative unit (1) is cumulative according to the clock accumulation period of predefined by initial clock data DSS1After obtain DSS2, DSS2 is saved in memory cell (4), and covers original DSS1;
Image acquisition units (6) is controlled from electronic module tag in the application management unit (9) of step F user rs authentication terminal moduleDisplay unit (5) in gather the view data DTS1 of dynamic password data DKS1, and use image analyzing unit (7) rightView data DTS1 positions, cuts apart and analyzes, and view data is converted into the dynamic password data of text or digital formYKS1, is then saved in YKS1 in application dispensing unit (8);
The administrative unit (1) of step G electronic module tag, according to the clock period of change of clock control cell (2), reachesWhen two clock periods of change, present clock data become DSS2; The administrative unit (1) of electronic module tag is with memory cell(4) IDS1 in and present clock data DSS2 are as calculated factor, by the mouth of the first dynamic password dispensing unit (3)Make generating algorithm PSW1 generate dynamic password data DKS2, and DKS2 is presented in display unit (5); Then management is singleAfter unit (1) is cumulative according to the clock accumulation period of predefined by present clock data DSS2, obtain DSS3, DSS3 is preservedIn memory cell (4), and cover original DSS2;
Image acquisition units (6) is controlled from electronic module tag in the application management unit (9) of step H user rs authentication terminal moduleDisplay unit (5) in gather the view data DTS2 of dynamic password data DKS2, and use image analyzing unit (7) rightView data DTS2 positions, cuts apart and analyzes, and view data is converted into the data YKS2 of text or digital form, soAfter YKS2 is saved in application dispensing unit (8);
The application management unit (9) of step I user rs authentication terminal module from application dispensing unit (8) by IYS1, YKS1Send to authentication service module with YKS2 by internet internet;
Step J authentication service module receives after the data that user rs authentication terminal module sends, by authentication service unit (10) withIYS1, YKS1 and YKS2 inquire about in the corresponding record of IYS1 whether have YKS1 and YKS2 in service configuration unit (11)Two data, if exist, send this electronic module tag by internet internet to user rs authentication terminal module and do not conform toThe result of method, and finish this proof procedure; If there are not YKS1 and YKS2 two numbers in the corresponding record of IYS1According to, by authentication service unit (10), YKS1 and YKS2 are kept to note corresponding to IYS1 in service configuration unit (11)In record; Then, the corresponding dynamic password generating algorithm of inquiry IYS1 PSW2 in service configuration unit (11);
Step K authentication service unit (10) inquires IYS1 in service configuration unit (11) with IYS1 corresponding movingAfter state password generated algorithm PSW2, then using IYS1, YKS1 and YKS2 as calculated factor, by the second dynamic password configurationDynamic password generating algorithm PSW2 in unit (12), calculates the clock data RSS2 of electronic module tag; Pass through againClock control cell (13) obtains new clock data and becomes RSS3, authentication service after adding up with the clock accumulation period definingUnit (10) is using data IDS1 and new clock data RSS3 as calculated factor, second dynamic by authentication service moduleThe dynamic password generating algorithm PSW2 of password dispensing unit (12) generates new dynamic password data RKS1, and the service of storing into is joinedPut in unit (11);
The administrative unit (1) of step L electronic module tag, according to the clock period of change of clock control cell (2), reachesWhen three clock periods of change, present clock data become DSS3; Administrative unit (1) is with electronic tag in memory cell (4)The ID IDS1 of module and present clock data DSS3 are as calculated factor, by the first dynamic password of electronic module tagThe dynamic password generating algorithm PSW1 of dispensing unit (3) generates dynamic password data DKS3, and DKS3 is presented at and shows listIn unit (5); Then after administrative unit (1) adds up present clock data DSS3 according to the clock accumulation period of predefinedObtain DSS4, DSS4 is saved in memory cell (4), and cover original DSS3;
The application management unit (9) of step M user rs authentication terminal module is again controlled image acquisition units (6) and is gathered electronics markSign the view data DTS3 of the middle dynamic password data DKS3 of display unit (5) of module, and use image analyzing unit (7)Image DTS3 is positioned, cut apart and analyzes, obtain text-type dynamic password data YKS3; Then, YKS3 is passed through mutuallyNetworking internet sends to authentication service module;
Step N authentication service module receives after YKS3, will in YKS3 and step J, calculate institute by authentication service unit (10)The dynamic password data RKS1 obtaining contrasts, if YKS3 and RKS1 are equal, tests to user by internet internetCard terminal module sends the legal result of this electronic module tag; If YKS3 and RKS1 are unequal, by internet internetSend the illegal result of this electronic module tag to user rs authentication terminal module;
Step O user rs authentication terminal module is received after the result of authentication service module feedback, and result is shown, and completes thisTo the legitimate verification process of electronic module tag.
Further, the legitimacy real-time verification method of described a kind of dynamic password, is characterized in that: service configuration unit (11)It is the database with the certified service unit of energy (10) read-write; Described service configuration unit (11) is with electronic module tagThe attribute of ID configuration electronic module tag, and by the Item Information of described electronic module tag representative and described electronic module tagAttribute be kept in database.
Further, the legitimacy real-time verification method of described a kind of dynamic password, is characterized in that: in dynamic password dispensing unitDynamic password generating algorithm can adopt the close algorithm of state, write or any dynamic password generating algorithm voluntarily. And dynamic passwordAlgorithm can be a kind of, can be also multiple combination. The first dynamic password of what the present invention emphasized is electronic module tag is joinedThe second dynamic password dispensing unit (12) of putting unit (3) and authentication service module is to adopt same dynamic password to generate to calculateMethod.
Further, described electronic module tag transmits the method for dynamic password to user rs authentication terminal module, it is characterized in that: electricityThe administrative unit (1) of subtab module is by No. ID of electronic module tag self and clock data or dynamic password generation number of times workFor calculated factor, be delivered to the first dynamic password dispensing unit (3) and obtain dynamic password data; Due to each electronic tag mouldPiece all given one unique No. ID, and clock data or dynamic password to generate number of times be continuous delta data, each electricitySubtab module all generates dynamic password data different and that have one-time validity, and described dynamic password data can be numeralsForm can be also any one password expression-forms such as any character, character combination of numbers, bar code, Quick Response Code.
Further, the dynamic password display methods of described electronic module tag, is characterized in that: pass through electronic module tagDisplay unit (5) show dynamic password data, carry out data by user rs authentication terminal module control image acquisition units (6)Gather, electronic module tag also can adopt NFC, RFID, the communication mode such as infrared, transmits data to user rs authentication terminal module.
Further, described user rs authentication terminal module gathers the mode of electronic module tag dynamic password data, it is characterized in that:The display unit (5) of electronic module tag shows dynamic password data, user rs authentication terminal module control image acquisition units (6)Gather the view data of electronic module tag dynamic password data, and convert the mode of text-type data to; User rs authentication terminal mouldThe communication modes such as that piece can also adopt is infrared, RFID, NFC gather the dynamic password data of electronic module tag, or by manuallyThe dynamic password data that display unit in electronic module tag (5) is shown are used the modes such as touch-screen, button defeated by dataEntering unit (16) manually inputs into user rs authentication terminal module.
Further, the dynamic password data verification method of described electronic module tag, is characterized in that described user rs authentication terminal mouldThe structure of piece and authentication service module, based on reducing the operand of user terminal authentication module and saving in the situation of hardware resource,Image analyzing unit in user rs authentication terminal module (7) can be positioned in authentication service module to user rs authentication terminal moduleOnly be responsible for the dynamic password data acquisition that electronic module tag is shown, and view data is sent to authentication service module, by recognizingCard service module carries out graphical analysis, and translation data form also carries out data verification;
Further, the dynamic password data verification method of described electronic module tag, is characterized in that described user rs authentication terminal mouldThe structure of piece and authentication service module, Network Based when obstructed, can by the authentication service unit in authentication service module (10),Service configuration unit (11) and the second dynamic password dispensing unit (12) are placed in user rs authentication terminal module, user rs authenticationTerminal module, by after the dynamic password data acquisition of electronic module tag, under off-line state, directly completes authentication service.
Further, in described authentication service module, it is characterized in that: the second dynamic password dispensing unit in authentication service module(12) in, can place multiple dynamic password generating algorithms corresponding with electronic module tag.
The present invention has following good effect:
1, consistency and the reproducibility of existing label have been overcome;
2, for user provides one verification method easily;
3, owing to having adopted the combination of MULTIPLE DYNAMIC password algorithm, the security of dynamic password is promoted greatly;
4, adopted the delta data being hidden in electronic module tag, clock data or password generated time logarithmic data is as calculatingThe factor, makes the password of each electronic module tag all different, simultaneously the each password generating of each electronic module tagData only have one-time validity. Greatly increase the security of system.
5, overcome and passed through in clock-driven dynamic password formation method in the past, the error being produced by clock controller, institute causesThe mode manually of needs and authentication service module are carried out the link of clock alignment;
6, carry out the coupling of password generated algorithm according to the ID of electronic module tag, improved the personal management of system, also largeIncrease greatly the security of system;
Brief description of the drawings
Fig. 1 is the first system realization flow figure that the embodiment of the present invention provides;
Fig. 2 is the second system realization flow figure that the embodiment of the present invention provides;
Fig. 3 is the first system construction drawing that the embodiment of the present invention provides;
Fig. 4 is the second system construction drawing that the embodiment of the present invention provides;
Fig. 5 is the third system construction drawing that the embodiment of the present invention provides;
Detailed description of the invention
Because implementation method of the present invention has various structures and method variation, in order to make object of the present invention, technical scheme and excellentPoint is clearer, below in conjunction with drawings and Examples, the present invention is further elaborated. Should be appreciated that hereinDescribed specific embodiment only, in order to explain the present invention, is not intended to limit the present invention.
Embodiment 1: based on structure shown in accompanying drawing 3, the device that this method is used comprises electronic module tag, user rs authentication eventuallyEnd module and authentication service module three parts. The administrative unit (1) of electronic module tag is according to the change of clock control cell (2)The change cycle constantly using self No. ID and present clock data as calculated factor, by the first dynamic password dispensing unit (3)Generate dynamic password data, and be presented in display unit (5); User rs authentication terminal module control image acquisition units (6)Gather No. ID of electronic module tag, carry out after analyzing and processing, obtain text-type ID data, then by text-type ID dataSend to authentication service module by internet internet; Authentication service module receives that user rs authentication terminal module sendsAfter text-type ID data,, inquired about from service configuration unit (11) with text-type ID data by authentication service unit (10)The Item Information of electronic module tag ID representative, then turns back to user by Item Information by internet internet and testsCard terminal module; User judges the article letter of Item Information that user rs authentication terminal module receives and electronic module tag representativeWhether breath conforms to, and does not conform to and represents that electronic module tag is illegal, and the user's verification terminal module controls image that conforms to is adoptedCollection unit (6) gathers the view data of twice continuous dynamic password data in the display unit (5) of electronic module tag,After processing by analysis, draw text-type dynamic password data, then by No. ID of electronic module tag and double dynamicThe text-type data of password data are sent to authentication service module by internet internet; Authentication service module receives useAfter the text-type data that family verification terminal module is sent, authentication service unit (10) first connects in service configuration unit (11) inquiryWhether the dynamic password data of receiving exist in record corresponding to electronic module tag ID, if exist, to user rs authentication eventuallyEnd module sends the illegal result of electronic module tag; If do not exist, authentication service unit (10) is with electronic module tagNo. ID in service configuration unit (11) inquiry electronic module tag dynamic password generating algorithm, then with electronic tagNo. ID of module and twice continuous dynamic password data calculate this electronics mark by the dynamic password generating algorithm inquiringSign the clock data of module, then authentication service unit (10) by the clock data that calculates gained according to good cumulative of predefinedCycle adds up, and No. ID, clock data after cumulative and electronic module tag are as calculated factor, dynamic by secondPassword dispensing unit (12) generates new dynamic password data A; Then user rs authentication terminal module is controlled IMAQ list againUnit (6) gathers the view data of the newly-generated dynamic password data B of electronic module tag, after processing by analysis, obtains literary compositionThis type dynamic password data C, then text-type dynamic password data C is sent to authentication service module by internet internet;Last authentication service module is by the text-type dynamic password data C of user rs authentication terminal module transmission and self calculate the new moving of gainedState password data A contrasts, and show that the middle dynamic password of the first dynamic password dispensing unit (3) of electronic module tag generatesThe result whether algorithm is consistent with the middle dynamic password generating algorithm of the second dynamic password dispensing unit (12) of authentication service module,Thereby judge the legitimacy of electronic module tag.
Shown in 2, the legitimacy real-time verification method of described dynamic password comprises the steps: by reference to the accompanying drawings
Steps A give each electronic module tag give one unique No. ID, be expressed as IDS1 No. ID, be positioned over electronics markSign the surface location of module; In electronic module tag and authentication service module, define equal clock accumulation period; At electronics markThe initial clock data of the middle definition of memory cell (4) of signing module is DSS1; In the memory cell (4) of electronic module tag, protectDeposit this electronic module tag No. ID;
The application management unit (9) of step party B-subscriber's verification terminal module is controlled image acquisition units (6) and is gathered electronic tag mouldThe view data IDT1 of piece ID IDS1, and use image analyzing unit (7) that view data IDT1 is positioned, cut apartAnd analysis, view data IDT1 is converted into the data IYS1 of text or digital form, and IYS1 is saved in to application configuration listIn unit (8); Then IYS1 is sent to authentication service module by internet internet;
Step C authentication service module receives after the data IYS1 that user rs authentication terminal module sends, by authentication service unit(10) Item Information of data query IYS1 representative in service configuration unit (11), and by internet internetSend to user rs authentication terminal module;
The application management unit (9) of step D user rs authentication terminal module receives after the Item Information that certificate server returns,Confirm by user whether Item Information conforms to electronic module tag representative article; If article do not conform to, think this electronicsLabel model is illegal; If article conform to, user starts electronic module tag by switch element (15);
After step e electronic module tag starts, the administrative unit (1) of electronic module tag is according to clock control cell (2)Clock period of change, in the time of first clock period of change, initial clock data is DSS1; Administrative unit (1) is to store listIn unit (4), the ID IDS1 of electronic module tag and initial clock data DSS1 are as calculated factor, by first dynamic mouthfulMake the dynamic password generating algorithm PSW1 of dispensing unit (3) generate dynamic password data DKS1, and DKS1 is presented to demonstrationIn unit (5); Then administrative unit (1) is cumulative according to the clock accumulation period of predefined by initial clock data DSS1After obtain DSS2, DSS2 is saved in memory cell (4), and covers original DSS1;
Image acquisition units (6) is controlled from electronic module tag in the application management unit (9) of step F user rs authentication terminal moduleDisplay unit (5) in gather the view data DTS1 of dynamic password data DKS1, and use image analyzing unit (7) rightView data DTS1 positions, cuts apart and analyzes, and view data is converted into the dynamic password data of text or digital formYKS1, is then saved in YKS1 in application dispensing unit (8);
The administrative unit (1) of step G electronic module tag, according to the clock period of change of clock control cell (2), reachesWhen two clock periods of change, present clock data become DSS2; The administrative unit (1) of electronic module tag is with memory cell(4) IDS1 in and present clock data DSS2 are as calculated factor, by the mouth of the first dynamic password dispensing unit (3)Make generating algorithm PSW1 generate dynamic password data DKS2, and DKS2 is presented in display unit (5); Then management is singleAfter unit (1) is cumulative according to the clock accumulation period of predefined by present clock data DSS2, obtain DSS3, DSS3 is preservedIn memory cell (4), and cover original DSS2;
Image acquisition units (6) is controlled from electronic module tag in the application management unit (9) of step H user rs authentication terminal moduleDisplay unit (5) in gather the view data DTS2 of dynamic password data DKS2, and use image analyzing unit (7) rightView data DTS2 positions, cuts apart and analyzes, and view data is converted into the data YKS2 of text or digital form, soAfter YKS2 is saved in application dispensing unit (8);
The application management unit (9) of step I user rs authentication terminal module from application dispensing unit (8) by IYS1, YKS1Send to authentication service module with YKS2 by internet internet;
Step J authentication service module receives after the data that user rs authentication terminal module sends, by authentication service unit (10) withIYS1, YKS1 and YKS2 inquire about in the corresponding record of IYS1 whether have YKS1 and YKS2 in service configuration unit (11)Two data, if exist, send this electronic module tag by internet internet to user rs authentication terminal module and do not conform toThe result of method, and finish this proof procedure; If there are not YKS1 and YKS2 two numbers in the corresponding record of IYS1According to, by authentication service unit (10), YKS1 and YKS2 are kept to note corresponding to IYS1 in service configuration unit (11)In record; Then, the corresponding dynamic password generating algorithm of inquiry IYS1 PSW2 in service configuration unit (11);
Step K authentication service unit (10) inquires IYS1 in service configuration unit (11) with IYS1 corresponding movingAfter state password generated algorithm PSW2, then using IYS1, YKS1 and YKS2 as calculated factor, by the second dynamic password configurationDynamic password generating algorithm PSW2 in unit (12), calculates the clock data RSS2 of electronic module tag; Pass through againClock control cell (13) obtains new clock data and becomes RSS3, authentication service after adding up with the clock accumulation period definingUnit (10) is using data IDS1 and new clock data RSS3 as calculated factor, second dynamic by authentication service moduleThe dynamic password generating algorithm PSW2 of password dispensing unit (12) generates new dynamic password data RKS1, and the service of storing into is joinedPut in unit (11);
The administrative unit (1) of step L electronic module tag, according to the clock period of change of clock control cell (2), reachesWhen three clock periods of change, present clock data become DSS3; Administrative unit (1) is with electronic tag in memory cell (4)The ID IDS1 of module and present clock data DSS3 are as calculated factor, by the first dynamic password of electronic module tagThe dynamic password generating algorithm PSW1 of dispensing unit (3) generates dynamic password data DKS3, and DKS3 is presented at and shows listIn unit (5); Then after administrative unit (1) adds up present clock data DSS3 according to the clock accumulation period of predefinedObtain DSS4, DSS4 is saved in memory cell (4), and cover original DSS3;
The application management unit (9) of step M user rs authentication terminal module is again controlled image acquisition units (6) and is gathered electronics markSign the view data DTS3 of the middle dynamic password data DKS3 of display unit (5) of module, and use image analyzing unit (7)Image DTS3 is positioned, cut apart and analyzes, obtain text-type dynamic password data YKS3; Then, YKS3 is passed through mutuallyNetworking internet sends to authentication service module;
Step N authentication service module receives after YKS3, will in YKS3 and step J, calculate institute by authentication service unit (10)The dynamic password data RKS1 obtaining contrasts, if YKS3 and RKS1 are equal, tests to user by internet internetCard terminal module sends the legal result of this electronic module tag; If YKS3 and RKS1 are unequal, by internet internetSend the illegal result of this electronic module tag to user rs authentication terminal module;
Step O user rs authentication terminal module is received after the result of authentication service module feedback, and result is shown, and completes thisTo the legitimate verification process of electronic module tag.
Embodiment 2: described in embodiment 1, the legitimacy real-time verification method of dynamic password also can be passed through electronic module tagDynamic password generate number of times and electronic module tag ID as calculated factor, generate dynamic password data. Specific implementation sideMethod: based on structure shown in accompanying drawing 3, the device that this method is used comprises electronic module tag, user rs authentication terminal module and recognizesCard service module three parts. The administrative unit (1) of electronic module tag is continuous according to the period of change of clock control cell (2)Generate number of times as calculated factor with current dynamic password No. ID using self, raw by the first dynamic password dispensing unit (3)Become dynamic password data, and be presented in display unit (5); User rs authentication terminal module control image acquisition units (6) is adoptedNo. ID of set electron label model, carries out after analyzing and processing, obtains text-type ID data, then that text-type ID data are logicalCross internet internet and send to authentication service module; Authentication service module receives the literary composition that user rs authentication terminal module is sentAfter this type ID data, by authentication service unit (10), with text-type ID data, from service configuration unit (11), inquiry is electricThe Item Information of subtab module I D representative, then turns back to user rs authentication by Item Information by internet internetTerminal module; User judges the Item Information of Item Information that user rs authentication terminal module receives and electronic module tag representativeWhether conform to, do not conform to and represent that electronic module tag is illegal, user's verification terminal module controls IMAQ conforms toUnit (6) gathers the view data of twice continuous dynamic password data, warp in the display unit (5) of electronic module tagCross after analyzing and processing, draw text-type dynamic password data, then by No. ID of electronic module tag and double dynamic mouthfulMake the text-type data of data be sent to authentication service module by internet internet; Authentication service module receives userAfter the text-type data that verification terminal module is sent, authentication service unit (10) is first at service configuration unit (11) inquire-receiveTo dynamic password data in record corresponding to electronic module tag ID, whether exist, if exist, to user rs authentication terminalModule sends the illegal result of electronic module tag; If do not exist, authentication service unit (10) is with electronic module tagThe dynamic password generating algorithm of No. ID inquiry electronic module tag in service configuration unit (11), then with electronic module tagNo. ID and twice continuous dynamic password data calculate this electronic tag mould by the dynamic password generating algorithm inquiringThe dynamic password of piece generates number of times, and then authentication service unit (10) generates number of times according in advance by the dynamic password that calculates gainedThe accumulation period defining adds up, and dynamic password after cumulative generates No. ID, number of times and electronic module tag as countingCalculate the factor, generate new dynamic password data A by the second dynamic password dispensing unit (12); Then user rs authentication terminal mouldPiece is controlled the view data of the newly-generated dynamic password data B of image acquisition units (6) collection electronic module tag, warp againCross after analyzing and processing, obtain text-type dynamic password data C, then text-type dynamic password data C is passed through to internet internetSend to authentication service module; The text-type dynamic password data C that last authentication service module is transmitted user rs authentication terminal moduleThe new dynamic password data A that calculates gained with self contrasts, and draws the first dynamic password dispensing unit of electronic module tag(3) in, in the second dynamic password dispensing unit (12) of dynamic password generating algorithm and authentication service module, dynamic password generatesThe result whether algorithm is consistent, thus judge the legitimacy of electronic module tag.
Shown in 1, the verifying dynamic password method that the present embodiment provides can realize by following steps by reference to the accompanying drawings:
Steps A give each electronic module tag give one unique No. ID, be expressed as IDS1 No. ID, be positioned over electronics markSign the surface location of module; Define the period of change of clock control cell (2) in the administrative unit (1) of electronic module tag;In the administrative unit (1) of electronic module tag and the authentication service unit (10) of authentication service module, definition dynamic password is rawBecome number of times accumulation period, this sentences dynamic password, and to generate number of times accumulation period be 1 to describe; In the storage of electronic module tagIn unit (4), definition dynamic password generates the initial value of number of times, and the dynamic password of electronic module tag generates number of times initial value tableBe shown DCS1; In the memory cell (4) of electronic module tag, preserve No. ID of this electronic module tag;
The application management unit (9) of step party B-subscriber's verification terminal module is controlled image acquisition units (6) and is gathered electronic tag mouldThe view data IDT1 of piece ID IDS1, and use image analyzing unit (7) that view data IDT1 is positioned, cut apartAnd analysis, view data IDT1 is converted into the data IYS1 of text or digital form, and IYS1 is saved in to application configuration listIn unit (8); Then IYS1 is sent to authentication service module by internet internet;
Step C authentication service module receives after the data IYS1 that user rs authentication terminal module sends, by authentication service unit(10) Item Information of inquiry IYS1 representative in service configuration unit (11), and send by internet internetGive user rs authentication terminal module;
The application management unit (9) of step D user rs authentication terminal module receives after the Item Information that certificate server returns,Confirm by user whether Item Information conforms to electronic module tag representative article; If article do not conform to, think this electronicsLabel model is illegal; If article conform to, user starts electronic module tag by switch element (15);
After step e electronic module tag starts, the administrative unit (1) of electronic module tag is according to clock control cell (2)Clock period of change, in the time of first clock period of change, it is DCS1 that initial dynamic password data generate number of times; Administrative unit (1)Using the ID IDS1 of the electronic module tag in memory cell (4) and dynamic password data generate number of times DCS1 as calculate because ofSon, generates dynamic password data DKS1 by the dynamic password generating algorithm PSW1 of the first dynamic password dispensing unit (3), soAfter dynamic password data are generated after number of times DCS1 adds 1 and obtain DCS2, DCS2 is saved in memory cell (4), and coversCover original DCS1, then dynamic password data DKS1 is shown in display unit (5);
Image acquisition units (6) is controlled from electronic module tag in the application management unit (9) of step F user rs authentication terminal moduleDisplay unit (5) in gather the view data DTS1 of dynamic password data DKS1, and use image analyzing unit (7) rightView data DTS1 positions, cuts apart and analyzes, and view data is converted into the dynamic password data of text or digital formYKS1, is then saved in YKS1 in application dispensing unit (8);
The administrative unit (1) of step G electronic module tag, according to the clock period of change of clock control cell (2), reachesWhen two clock periods of change, it is DCS2 that current dynamic password data generate number of times; Administrative unit (1) is with IDS1 and DCS2As calculated factor, generate dynamic password data by the password generated algorithm PSW1 of the first dynamic password dispensing unit (3)DKS2, then generates dynamic password data after number of times DCS2 adds 1 and obtains DCS3, and DCS3 is saved in to memory cell (4)In, and cover original DCS2, then dynamic password data DKS2 is shown in display unit (5);
Image acquisition units (6) is controlled from electronic module tag in the application management unit (9) of step H user rs authentication terminal moduleDisplay unit (5) in gather the view data DTS2 of dynamic password data DKS2, and use image analyzing unit (7) rightView data DTS2 positions, cuts apart and analyzes, and view data is converted into the dynamic password data of text or digital formYKS2, is then saved in YKS2 in application dispensing unit (8);
The application management unit (9) of step I user rs authentication terminal module from application dispensing unit (8) by IYS1, YKS1Send to authentication service module with YKS2 by internet internet;
Step J authentication service module receives after the data that user rs authentication terminal module sends, by authentication service unit (10) withIYS1, YKS1 and YKS2 inquire about in the corresponding record of IYS1 whether have YKS1 and YKS2 in service configuration unit (11)Two data, if exist, send this electronic module tag by internet internet to user rs authentication terminal module and do not conform toThe result of method, and finish this proof procedure; If there are not YKS1 and YKS2 two numbers in the corresponding record of IYS1According to, by authentication service unit (10), YKS1 and YKS2 are kept to note corresponding to IYS1 in service configuration unit (11)In record, then, the corresponding dynamic password generating algorithm of inquiry IYS1 PSW2 in service configuration unit (11);
Step K authentication service unit (10) inquires IYS1 in service configuration unit (11) with IYS1 corresponding dynamicallyAfter password generated algorithm PSW2, then using IYS1, YKS1 and YKS2 as calculated factor, single by the second dynamic password configurationDynamic password generating algorithm PSW2 in unit (12), the dynamic password that calculates electronic module tag generates number of times RCS2;Then dynamic password data are generated after number of times RCS2 adds 1 and obtain RCS3, then using IYS1 and RCS3 as calculated factor, logicalThe dynamic password generating algorithm PSW2 crossing in the second dynamic password dispensing unit (12) in authentication service module generates dynamically newPassword data RKS1, and store in service configuration unit (11);
The administrative unit (1) of step L electronic module tag, according to the clock period of change of clock control cell (2), reachesWhen three clock periods of change, it is DCS3 that current dynamic password data generate number of times; Administrative unit (1) is with data IDS1 and depositingDynamic password data in storage unit (4) generate number of times DCS3 as calculated factor, by the first dynamic password dispensing unit (3)Dynamic password generating algorithm PSW1 generate dynamic password data DKS3, then dynamic password data are generated to number of times DCS3 and add 1After obtain DCS4, then data DCS4 is saved in memory cell (4), and covers original DCS3, finally will be dynamically mouthfulMake data DKS3 show in display unit (5);
The application management unit (9) of step M user rs authentication terminal module is again controlled image acquisition units (6) and is gathered electronics markSign the view data DTS3 of the middle dynamic password data DKS3 of display unit (5) of module, and use image analyzing unit (7)Image DTS3 is positioned, cut apart and analyzes, obtain text-type dynamic password data YKS3; Then, YKS3 is passed through mutuallyNetworking internet sends to authentication service module;
Step N authentication service module receives after YKS3, will in YKS3 and step J, calculate institute by authentication service unit (10)The dynamic password data RKS1 obtaining contrasts, if YKS3 and RKS1 are equal, tests to user by internet internetCard terminal module sends the legal result of this electronic module tag; If YKS3 and RKS1 are unequal, by internet internetSend the illegal result of this electronic module tag to user rs authentication terminal module;
Step O user rs authentication terminal module is received after the result of authentication service module feedback, and result is shown, and completes thisTo the legitimate verification process of electronic module tag.
Embodiment 3: based on structure described in accompanying drawing 3, during in unstable networks or without network environment, can be by authentication service moduleAuthentication service unit (10), service configuration unit (11), dynamic password dispensing unit (12) and clock control cell (13)Be placed in user rs authentication terminal module, user rs authentication terminal module is by after electronic module tag data acquisition, by user rs authentication eventuallyEnd module directly completes authentication service under off-line state.
Structure described in 4 by reference to the accompanying drawings, the device that this method changing is used comprises electronic module tag, user rs authentication terminalModule two parts. Electronic module tag is used for generating dynamic password data and shows; User rs authentication terminal module gathers electronic tagThe view data of the dynamic password data of module, carries out, after analyzing and processing, obtaining text-type password data, then through repeatedly followingAfter ring checking, draw the first dynamic password generating algorithm of electronic module tag and the second dynamic password of user rs authentication terminal moduleThe result whether generating algorithm is consistent, thus judge the legitimacy of electronic module tag.
Embodiment 4: based on structure described in accompanying drawing 3, at network stabilization, need to reduce the local computing of user rs authentication terminal moduleWhen amount, the image analyzing unit in user rs authentication terminal module (7) can be positioned in authentication service module, user rs authentication eventuallyEnd module is only responsible for the data acquisition that electronic module tag is shown, and sends out by internet internet with image formatted dataDeliver to authentication service module, authentication service module is carried out graphical analysis, and authentication service is provided.
Structure described in 5 by reference to the accompanying drawings, the device that this method changing is used comprises electronic module tag, user rs authentication terminalModule and authentication service module three parts. Electronic module tag is used for generating dynamic password data and shows; User rs authentication terminal mouldThe view data that No. ID, the password data that piece collection electronic module tag repeatedly generates and electronic module tag, and by view dataSend to authentication service module by internet internet, authentication service module receive user rs authentication terminal module sendAfter view data, carry out, after analyzing and processing, obtaining text-type password data, then verify; Authentication service module is through too muchAfter inferior circulation checking, draw the first dynamic password generating algorithm of electronic module tag and the second dynamic password of authentication service moduleThe result whether generating algorithm is consistent, and result is turned back to user rs authentication terminal module by internet internet, therebyJudge the legitimacy of electronic module tag.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, all in spirit of the present invention and formerAny amendment of doing, be equal to replacement, merging and improvement etc., within being all included in protection scope of the present invention.

Claims (9)

1. a legitimacy real-time verification method for dynamic password, is characterized in that: the device that the method is used comprises: electricitySubtab module, user rs authentication terminal module and authentication service module;
Described electronic module tag comprises: clock control cell (2), administrative unit (1), the first dynamic password dispensing unit (3),Display unit (5), memory cell (4);
Described user rs authentication terminal module comprises: application management unit (9), image analyzing unit (7), image acquisition units (6),Application dispensing unit (8), data input cell (16);
Described authentication service module comprises: authentication service unit (10), the second dynamic password dispensing unit (12), service configuration listUnit (11), clock control cell (13);
The legitimacy real-time verification method of described dynamic password comprises the steps:
Steps A give each electronic module tag give one unique No. ID, be expressed as IDS1, be positioned over electricity for No. IDThe surface location of subtab module; In electronic module tag and authentication service module, define equal clock accumulation period; At electricityIn the memory cell (4) of subtab module, the initial clock data of definition is DSS1; In the memory cell (4) of electronic module tagNo. ID of middle this electronic module tag of preservation;
The application management unit (9) of step party B-subscriber's verification terminal module is controlled image acquisition units (6) and is gathered electronic tag mouldThe view data IDT1 of piece ID IDS1, and use image analyzing unit (7) that view data IDT1 is positioned, dividedCut and analyze, view data IDT1 is converted into the data IYS1 of text or digital form, and IYS1 is saved in to applicationIn dispensing unit (8); Then IYS1 is sent to authentication service module by internet internet;
Step C authentication service module receives after the data IYS1 that user rs authentication terminal module sends, by authentication service unit(10) Item Information of data query IYS1 representative in service configuration unit (11), and send by internet internetGive user rs authentication terminal module;
The application management unit (9) of step D user rs authentication terminal module receives after the Item Information that certificate server returns,Confirm by user whether Item Information conforms to electronic module tag representative article; If article do not conform to, think this electronicsLabel model is illegal; If article conform to, user starts electronic module tag by switch element (15);
Step e electronic module tag start after, the administrative unit (1) of electronic module tag according to clock control cell (2) timeClock period of change, in the time of first clock period of change, initial clock data is DSS1; Administrative unit (1) is with memory cell(4) in, the ID IDS1 of electronic module tag and initial clock data DSS1 are as calculated factor, by first dynamic mouthfulMake the dynamic password generating algorithm PSW1 of dispensing unit (3) generate dynamic password data DKS1, and DKS1 is presented at aobviousShow in unit (5); Then administrative unit (1) is cumulative according to the clock accumulation period of predefined by initial clock data DSS1After obtain DSS2, DSS2 is saved in memory cell (4), and covers original DSS1;
Image acquisition units (6) is controlled from electronic module tag in the application management unit (9) of step F user rs authentication terminal moduleIn display unit (5), gather the view data DTS1 of dynamic password data DKS1, and use image analyzing unit (7) to figurePosition, cut apart and analyze as data DTS1, view data being converted into the dynamic password data of text or digital formYKS1, is then saved in YKS1 in application dispensing unit (8);
The administrative unit (1) of step G electronic module tag, according to the clock period of change of clock control cell (2), reaches secondWhen individual clock period of change, present clock data become DSS2; The administrative unit (1) of electronic module tag is with memory cell (4)In IDS1 and present clock data DSS2 as calculated factor, dynamic mouthful by the first dynamic password dispensing unit (3)Make generating algorithm PSW1 generate dynamic password data DKS2, and DKS2 is presented in display unit (5); Then managementAfter unit (1) is cumulative according to the clock accumulation period of predefined by present clock data DSS2, obtain DSS3, DSS3 is protectedDeposit in memory cell (4), and cover original DSS2;
Image acquisition units (6) is controlled from electronic module tag in the application management unit (9) of step H user rs authentication terminal moduleDisplay unit (5) in gather the view data DTS2 of dynamic password data DKS2, and use image analyzing unit (7) rightView data DTS2 positions, cuts apart and analyzes, and view data is converted into the data YKS2 of text or digital form,Then YKS2 is saved in application dispensing unit (8);
The application management unit (9) of step I user rs authentication terminal module from application dispensing unit (8) by IYS1, YKS1 andYKS2 sends to authentication service module by internet internet;
Step J authentication service module receives after the data that user rs authentication terminal module sends, by authentication service unit (10) withIYS1, YKS1 and YKS2 inquire about in the corresponding record of IYS1 whether have YKS1 in service configuration unit (11)With two data of YKS2, if exist, send this electronic tag mould by internet internet to user rs authentication terminal moduleThe illegal result of piece, and finish this proof procedure; If there is not YKS1 and YKS2 in the corresponding record of IYS1Two data, are kept at IYS1 couple in service configuration unit (11) by authentication service unit (10) by YKS1 and YKS2In the record of answering; Then, the corresponding dynamic password generating algorithm of inquiry IYS1 PSW2 in service configuration unit (11);
Step K authentication service unit (10) inquires IYS1 in service configuration unit (11) with IYS1 corresponding dynamicallyAfter password generated algorithm PSW2, then using IYS1, YKS1 and YKS2 as calculated factor, join by the second dynamic passwordPut the dynamic password generating algorithm PSW2 in unit (12), calculate the clock data RSS2 of electronic module tag; Logical againOversampling clock control module (13) obtains new clock data and becomes RSS3, certification clothes after adding up with the clock accumulation period definingBusiness unit (10) using data IDS1 and new clock data RSS3 as calculated factor, by second in authentication service moduleThe dynamic password generating algorithm PSW2 of dynamic password dispensing unit (12) generates new dynamic password data RKS1, and stores intoIn service configuration unit (11);
The administrative unit (1) of step L electronic module tag, according to the clock period of change of clock control cell (2), reaches the 3rdWhen individual clock period of change, present clock data become DSS3; Administrative unit (1) is with electronic tag mould in memory cell (4)The ID IDS1 of piece and present clock data DSS3 are as calculated factor, by the first dynamic password of electronic module tagThe dynamic password generating algorithm PSW1 of dispensing unit (3) generates dynamic password data DKS3, and DKS3 is presented to demonstrationIn unit (5); Then after administrative unit (1) adds up present clock data DSS3 according to the clock accumulation period of predefinedObtain DSS4, DSS4 is saved in memory cell (4), and cover original DSS3;
The application management unit (9) of step M user rs authentication terminal module is again controlled image acquisition units (6) and is gathered electronics markSign the view data DTS3 of the middle dynamic password data DKS3 of display unit (5) of module, and use image analyzing unit (7) rightImage DTS3 positions, cuts apart and analyzes, and obtains text-type dynamic password data YKS3; Then, that YKS3 is logicalCross internet internet and send to authentication service module;
Step N authentication service module receives after YKS3, by authentication service unit (10), YKS3 and step K is fallen into a trapCalculate the dynamic password data RKS1 of gained and contrast, if YKS3 and RKS1 equate, by internet internet toUser rs authentication terminal module sends the legal result of this electronic module tag; If YKS3 and RKS1 are unequal, by mutualNetworking internet sends the illegal result of this electronic module tag to user rs authentication terminal module;
Step O user rs authentication terminal module is received after the result of authentication service module feedback, and result is shown, and completes thisThe inferior legitimate verification process to electronic module tag.
2. a kind of legitimacy real-time verification method of dynamic password according to claim 1, is characterized in that: service configurationUnit (11) is the database with the certified service unit of energy (10) read-write; Described service configuration unit (11) is with electronics markSign the attribute of module I D configuration electronic module tag, and by the Item Information of described electronic module tag representative and described electronicsThe attribute of label model is kept in database.
3. a kind of legitimacy real-time verification method of dynamic password according to claim 1, is characterized in that: first is dynamicDynamic password generating algorithm in password dispensing unit (3) and the second dynamic password dispensing unit (12) is one or moreThe combination of dynamic password generating algorithm arbitrarily, the first dynamic password dispensing unit (3) and authentication service module of electronic module tagThe second dynamic password dispensing unit (12) be to adopt same dynamic password generating algorithm.
4. the legitimacy real-time verification method of dynamic password according to claim 1, is characterized in that: electronic module tagAdministrative unit (1) using No. ID of electronic module tag self and clock data or dynamic password generate number of times as calculate because ofSon, is delivered to the first dynamic password dispensing unit (3) and obtains dynamic password data; Because each electronic module tag has all been givenOne unique No. ID, and clock data or dynamic password to generate number of times be continuous delta data, each electronic module tagAll generate dynamic password data different and that there is one-time validity, described dynamic password data be digital form, any character,Any one password expression-form in character combination of numbers, bar code, Quick Response Code.
5. the legitimacy real-time verification method of dynamic password as claimed in claim 1, is characterized in that: by electronic tag mouldThe display unit (5) of piece shows dynamic password data, carries out data acquisition by user rs authentication terminal module control image acquisition units (6)Collection, electronic module tag adopts NFC, RFID or over the horizon communication system, transmits data to user rs authentication terminal module.
6. the legitimacy real-time verification method of dynamic password as claimed in claim 1, is characterized in that: electronic module tagDisplay unit (5) shows dynamic password data, and user rs authentication terminal module control image acquisition units (6) gathers electronic tag mouldThe view data of piece dynamic password data, and convert the mode of text-type data to; User rs authentication terminal module can also adopt redOutward, RFID or NFC communication mode gather the dynamic password data of electronic module tag, or by manually by electronic module tagIt is manually defeated that the dynamic password data that middle display unit (5) shows are used touch-screen or key mode to pass through data input cell (16)Enter into user rs authentication terminal module.
7. the legitimacy real-time verification method of dynamic password according to claim 1, is characterized in that described user rs authentication eventuallyThe structure of end module and authentication service module, based on reducing the operand of user terminal authentication module and the situation of saving hardware resourceUnder, the image analyzing unit in user rs authentication terminal module (7) can be positioned in authentication service module to user rs authentication terminal mouldPiece is only responsible for the dynamic password data acquisition that electronic module tag is shown, and view data is sent to authentication service module, byAuthentication service module is carried out graphical analysis, and translation data form also carries out data verification.
8. the legitimacy real-time verification method of dynamic password according to claim 1, is characterized in that described user rs authentication eventuallyThe structure of end module and authentication service module, Network Based when obstructed, can be by the authentication service unit in authentication service module(10), service configuration unit (11) and the second dynamic password dispensing unit (12) be placed in user rs authentication terminal module, user testsCard terminal module, by after the dynamic password data acquisition of electronic module tag, under off-line state, directly completes authentication service.
9. the legitimacy real-time verification method of dynamic password according to claim 1, is characterized in that: at authentication service mouldIn piece, in the second dynamic password dispensing unit (12), can place multiple dynamic passwords corresponding with electronic module tag and generate calculationMethod.
CN201310252725.5A 2013-06-21 2013-06-21 A kind of legitimacy real-time verification method of dynamic password Active CN103354499B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310252725.5A CN103354499B (en) 2013-06-21 2013-06-21 A kind of legitimacy real-time verification method of dynamic password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310252725.5A CN103354499B (en) 2013-06-21 2013-06-21 A kind of legitimacy real-time verification method of dynamic password

Publications (2)

Publication Number Publication Date
CN103354499A CN103354499A (en) 2013-10-16
CN103354499B true CN103354499B (en) 2016-05-11

Family

ID=49310815

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310252725.5A Active CN103354499B (en) 2013-06-21 2013-06-21 A kind of legitimacy real-time verification method of dynamic password

Country Status (1)

Country Link
CN (1) CN103354499B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410492B (en) * 2014-10-31 2016-01-13 杭州沃朴物联科技有限公司 A kind of event mode dynamic password antifalsification label method for real-time verification of validity and system
CN104283690B (en) * 2014-10-31 2016-01-13 杭州沃朴物联科技有限公司 Clock synchronous type dynamic password antifalsification label real-time verification of validity system and method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004051585A2 (en) * 2002-11-27 2004-06-17 Rsa Security Inc Identity authentication system and method
CN102377783A (en) * 2011-11-07 2012-03-14 飞天诚信科技股份有限公司 Dynamic password generation and authentication method and dynamic password generation and authentication system
CN102843236A (en) * 2012-09-12 2012-12-26 飞天诚信科技股份有限公司 Generation and authentication method and system for dynamic password

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004051585A2 (en) * 2002-11-27 2004-06-17 Rsa Security Inc Identity authentication system and method
CN102377783A (en) * 2011-11-07 2012-03-14 飞天诚信科技股份有限公司 Dynamic password generation and authentication method and dynamic password generation and authentication system
CN102843236A (en) * 2012-09-12 2012-12-26 飞天诚信科技股份有限公司 Generation and authentication method and system for dynamic password

Also Published As

Publication number Publication date
CN103354499A (en) 2013-10-16

Similar Documents

Publication Publication Date Title
CN104283690B (en) Clock synchronous type dynamic password antifalsification label real-time verification of validity system and method
KR102329530B1 (en) Methods of accessing and providing access to a remote resource from a data processing device
CN103312516B (en) A kind of method for real-time verification of validity of dynamic password
CN103413227B (en) Product anti-counterfeiting tracing system and the false proof implementation method reviewing examination thereof
CN112116008B (en) Processing method of target detection model based on intelligent decision and related equipment thereof
CN104410492B (en) A kind of event mode dynamic password antifalsification label method for real-time verification of validity and system
CN106134154A (en) The technology that the authentication token operation utilizing machine to generate services
CN109255622A (en) A kind of back-tracing anti-fake data-storage system
US9578502B2 (en) Device authentication using inter-person message metadata
TW201642183A (en) An open method and system
CN107491680A (en) Computing device is signed in based on face recognition
CN106850228A (en) A kind of foundation of portable intelligent password management system and operating method
CN104599048B (en) A kind of blood-collecting station Plasma donors identification and the online method for examining card management and control
CN107004077A (en) Method and system for providing safe and independently operable biological characteristic authentication
TWI714868B (en) Counting method based on digital currency and blockchain counting system
Olaniyi et al. Design of secure electronic voting system using multifactor authentication and cryptographic hash functions
CN103580873B (en) Identity identifying method, system and cipher protection apparatus
CN103354499B (en) A kind of legitimacy real-time verification method of dynamic password
CN109428725A (en) Information processing equipment, control method and storage medium
Azhmyakov et al. An approximations based approach to optimal control of switched dynamic systems
CN110599206B (en) Article quality authentication method and device, storage medium and electronic equipment
CN109214200A (en) A kind of education resource management method, system and block catenary system and storage medium
KR101496049B1 (en) User authentication system using image code
KR20100005916A (en) System and method for identifying own user authentication information jointly by user input information and recording medium
KR102199391B1 (en) Content service monitoring system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
DD01 Delivery of document by public notice
DD01 Delivery of document by public notice

Addressee: Fan Xiaodong

Document name: Notification to Pay the Fees