CN105391556A - Method and apparatus for generating dynamic password, authentication method and system - Google Patents

Method and apparatus for generating dynamic password, authentication method and system Download PDF

Info

Publication number
CN105391556A
CN105391556A CN201510849535.0A CN201510849535A CN105391556A CN 105391556 A CN105391556 A CN 105391556A CN 201510849535 A CN201510849535 A CN 201510849535A CN 105391556 A CN105391556 A CN 105391556A
Authority
CN
China
Prior art keywords
dynamic password
time
parameter
positional information
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510849535.0A
Other languages
Chinese (zh)
Other versions
CN105391556B (en
Inventor
涂岩恺
吕伟煌
黄运峰
罗明宇
曹洪霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Yaxon Networks Co Ltd
Original Assignee
Xiamen Yaxon Networks Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Yaxon Networks Co Ltd filed Critical Xiamen Yaxon Networks Co Ltd
Priority to CN201510849535.0A priority Critical patent/CN105391556B/en
Publication of CN105391556A publication Critical patent/CN105391556A/en
Application granted granted Critical
Publication of CN105391556B publication Critical patent/CN105391556B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Abstract

The invention belongs to the technical field of information security, and in particular relates to a method and apparatus for generating a dynamic password, an authentication method and system. The method for generating a dynamic password comprises the steps of obtaining current location information P and current standard time T; obtaining a parameter R; using a digest algorithm for the location information P, the time T and the parameter R to generate a digest D; and using an encryption algorithm for encrypting the location information P, the time T, the parameter R and the digest D to obtain a dynamic password. The invention can be used for authentication of police, military and government vehicles at high security levels and a remote service center.

Description

A kind of dynamic password formation method and equipment, authentication method and system
Technical field
The invention belongs to field of information security technology, be specifically related to a kind of dynamic password formation method and equipment, authentication method and system.
Background technology
Along with IT application process deeply and the development of computer technology, networking has become the development main trend of IT application in enterprises.People are while enjoying the information-based numerous benefits brought, and network security problem has become the challenge of information age mankind facing, and Network Information Security Problem becomes the task of top priority.Dynamic password as one of safest identity identifying technology, at present apply by increasing industry.Because it is easy to use, and platform-independent, along with the development of mobile Internet, dynamic-password technique has become the main flow of identity identifying technology, is widely used in the fields such as enterprise, network game, finance.
Because dynamic password has disposable (namely each password does not repeat), carrying out authentication with dynamic password, is a kind of safer authentication mode.Traditional dynamic password method is all the dynamic password based on time synchronized, generates dynamic password to the standard time with password generated key (PKI) encryption.Referenced patent document CN104683356A discloses a kind of dynamic password authentication method based on software token and system, accurate current time is obtained respectively by a built-in satellite time transfer module in client and server, in client and server, generate dynamic password respectively subsequently, finally complete the certification of dynamic password in the server.
But because the standard time is one, known information is disclosed, dynamic password is corresponding encrypted result, and this just exists Brute Force possibility, by collecting a large amount of dynamic passwords that user sends, correspondence sends standard time during password, reverse engineered dynamic passwords to generate keys.Once key is cracked, serious safety consequences will be caused.
In car working application, vehicle often need in the process of moving the cycle, timing mutual with center, as reported vehicle-state, receive commander's instruction, judge and command centre's link whether normal etc.Special in police, military vehicle, vehicle in the process of moving with the periodicity at center alternately because data volume is large, may be many by the data intercepted and captured, just more need high safe level certification.
Summary of the invention
The present invention is directed to the weak point that the existing dynamic password based on time synchronized exists, propose a kind of dynamic password formation method and equipment, authentication method and system.This dynamic password formation method, adopts the positional information of dynamic token, time and a random parameter to combine, generates dynamic password, carry out certification for this dynamic password.
The present invention adopts following technical scheme:
A kind of dynamic password formation method, it comprises the following steps,
S101, obtains current location information P and current standard time T;
S102, obtains a parameter R;
S103, location information P, time T and parameter R adopt digest algorithm, generate summary D;
S104, after using cryptographic algorithm location information P, time T, parameter R and summary D to be encrypted, obtains dynamic password.
Further, the parameter R in step S102 is random parameter or user's input parameter.
Further, the digest algorithm in step S103 is MD5 or SHA-1.
Further, the cryptographic algorithm in step S104 is RSA cryptographic algorithms or SM2.
A kind of dynamic password authentication method, the dynamic password generated for above-mentioned dynamic password formation method carries out certification, and it comprises the following steps,
S201, is decrypted the dynamic password received, and obtains positional information P0, time T0, parameter R0 and summary D0 after deciphering;
S202, adopt the digest algorithm that dynamic password formation method is identical, location information P0, time T0 and parameter R0 adopt digest algorithm, and generate summary DD, judge whether DD equals D0, if DD is not equal to D0, authentification failure, if DD equals D0, forwards step S203 to;
S203, preset time threshold B, calculate the time difference Td=|Tp-T0| between current time Tp and the time T0 of dynamic password, if Td≤B, and authentification failure, if Td ﹤ is B, time certification success.
Further, also comprise location-authentication, location-authentication comprises the following steps:
S204, the continuous dynamic password of the first two all authentication successs, and obtain the first two continuous dynamic password corresponding positional information P1, positional information P2 and time T1, the coordinate of time T2, positional information P1 is (X 1, Y 1), the coordinate of positional information P2 is (X 2, Y 2);
S205, on positional information P1 and positional information P2 extended line, setting center of circle O, the distance between center of circle O and positional information P2 is radius r, and radius r is set point, take O as the center of circle, and r is that radius is justified, and this circle is estimation range;
S206, judges the positional information P of dynamic password 0(X 0, Y 0) whether in estimation range, if not in estimation range, authentification failure, if in estimation range, location-authentication success.
Further, in step S205, the computational methods of radius r are, the distance between calculating location information P1 and positional information P2 average speed V=E/ (the T of dynamic token movement between two continuous dynamic passwords 2-T 1), prediction dynamic token displacement d=|T in time T0 0-T 2| * V, radius r = 3 3 d .
Further, the authentication success of dynamic password is time certification success, or time certification and location-authentication all successful.
A kind of dynamic password generates equipment, and it comprises,
Locating module, for dynamic token current location information P and current standard time T;
Parameter acquisition module, for the R that gets parms;
First abstract extraction module, adopts digest algorithm for location information P, time T and parameter R, generates summary D;
Encrypting module, after being encrypted, obtains dynamic password for positional information P, time T, parameter R and summary D.
Further, parameter acquisition module is input module, for the manual input parameter of user.
Further, locating module is GPS locating module or Big Dipper locating module.
A kind of dynamic password authentication system, it comprises,
Central server module, generates the dynamic password of equipment generation for receiving above-mentioned dynamic password;
Deciphering module, for being decrypted by the dynamic password received, obtains positional information P0, time T0, parameter R0 and summary D0 after deciphering;
Second abstract extraction module, for the digest algorithm that the first abstract extraction module is identical, generates location information P0, time T0 and parameter R0 and adopts digest algorithm, generate summary DD;
Time calibration module, for current time Tp and dynamic password time T0 is compared.
Further, system also comprises position correction module, whether is positioned at estimation range for checking the positional information P0 of dynamic password.
The present invention devises the dynamic password authentication method that dynamic location information mixed with the time, and when adopting the mode of prediction dynamic token positional information to verify that next authenticate password arrives, whether dynamic token is in rational position scope.Thus in dynamic password, the dynamic change in location information of height is carried out in fusion, improves the fail safe of dynamic password authentication, make it to be difficult to be forged or crack when dynamic token moves.The method is particularly suitable for police, military, the government vehicle of high safe level and the authentication of remote service center.
Accompanying drawing explanation
Fig. 1 is dynamic password product process figure;
Fig. 2 is dynamic password authentication flow chart;
Fig. 3 is position prediction zone concepts figure.
Embodiment
For further illustrating each embodiment, the invention provides drawings attached.These accompanying drawings are a part for disclosure of the present invention, and it is mainly in order to illustrate embodiment, and the associated description of specification can be coordinated to explain the operation principles of embodiment.Coordinate with reference to these contents, those of ordinary skill in the art will be understood that other possible execution modes and advantage of the present invention.Assembly in figure not drawn on scale, and similar element numbers is commonly used to assembly like representation class.
Now the present invention is further described with embodiment by reference to the accompanying drawings.
Consult shown in Fig. 1, the present invention proposes a kind of dynamic password formation method, it comprises the following steps:
S101, obtains current location information P and current standard time T;
When car-mounted terminal needs to generate dynamic password, from locating module, first obtain present terminal position P and current standard time T.
S102, obtains a parameter R;
Parameter R is a random parameter, and these three data are formed continuous array { T, P, a R}.It should be noted that, parameter R of the present invention is a random number, and those skilled in the art are known, and parameter R also can be user's input parameter, and user manually inputs data as parameter R.
S103, location information P, time T and parameter R adopt digest algorithm, generate summary D;
To array, { T, P, R} adopt digest algorithm to generate summary D, digest algorithm and hash algorithm, can be that MD5, SHA-1 etc. appoint the digest algorithm meeting the world or national standard.D is added in array and obtain new array { T, P, R, D}
S104, after using cryptographic algorithm location information P, time T, parameter R and summary D to be encrypted, obtains dynamic password.
With PKI, by array, { T, P, R, D} encrypt, and obtain an enciphered data S, are dynamic password, mail to dynamic password authentication system, and authentication is carried out in request.The present invention adopts PKI to be encrypted, and cryptographic algorithm can be the rivest, shamir, adelman that RSA, SM2 etc. meet the world or national standard.
Consult shown in Fig. 2, the present invention proposes a kind of dynamic password authentication method, this dynamic password authentication method carries out certification to the dynamic password that above-mentioned dynamic password formation method generates, and it comprises the following steps:
S201, is decrypted the dynamic password received, and obtains positional information P0, time T0, parameter R0 and summary D0 after deciphering;
After receiving dynamic password S, start certification dynamic password, adopt private key to be decrypted S, obtain data { T0, P0, R0, D0} after deciphering.
S202, adopt the digest algorithm that dynamic password formation method is identical, location information P0, time T0 and parameter R0 adopt digest algorithm, and generate summary DD, judge whether DD equals D0, if DD is not equal to D0, authentification failure, if DD equals D0, forwards step S203 to;
Extract that { T0, P0, R0}, adopt the digest algorithm identical with dynamic password formation method, to { T0, P0, R0} generate summary DD, judge whether DD equals D0, if not, then illustrate that the PKI of terminal encryption is not the legal PKI with private key pairing in central server module, authentication failure; If so, then illustrate that terminal public key is legal, forwards step S203 to.
S203, preset time threshold B, calculate the time difference Td=|Tp-T0| between current time Tp and the time T0 of dynamic password, if Td≤B, and authentification failure, if Td ﹤ is B, time certification success.
First presetting a time threshold B, time threshold B is a less value.Obtain current precise time Tp, calculate the difference of temporal information T0 and the time Tp comprised in dynamic password: Td=|Tp-T0|.Judge whether Td is less than time threshold B, if not, then illustrate that dynamic password lost efficacy or dynamic password is forgery, authentication failure.If it is illustrate that dynamic password generated in real time according to the standard time, temporal information is correct, time certification success.
As Td ﹤ B, judge, in the first two RQ cycle, whether this car-mounted terminal uploads dynamic password authentication request and authentication success, if do not had, then position prediction condition is not enough, and direct basis temporal information passes through certification; If had, show that now vehicle has been in the state of continuous request authentication, continue the positional information in checking dynamic password.Location-authentication comprises the following steps:
S204, the continuous dynamic password of the first two all authentication successs, and obtain the first two continuous dynamic password corresponding positional information P1, positional information P2 and time T1, the coordinate of time T2, positional information P1 is (X 1, Y 1), the coordinate of positional information P2 is (X 2, Y 2), wherein, X, Y represent the transverse and longitudinal coordinate of positional information.
S205, the distance between calculating location information P1 and positional information P2
E = ( Y 2 - Y 1 ) 2 + ( X 2 - X 1 ) 2 ,
Average speed V=E/ (the T of vehicle between two continuous dynamic passwords 2-T 1), the operating range d=|T of prediction vehicle in time T0 0-T 2| * V.Consulting shown in Fig. 3, is position prediction zone concepts figure, and with the direction of positional information P1 and positional information P2 line for reference direction, positive and negative 30 degree of reference direction, to set up with d be the equilateral triangle region of the length of side.With this Delta Region for inscribed triangle, set up the estimation range of its external circle as vehicle location, namely as circular dashed line in Fig. 3.The center of circle (Cx, Cy) of this estimation range is:
C x = X 2 + 3 d 3 X 2 - X 1 | X 2 - X 1 | c o s ( a r c t a n ( | a | ) ) C y = Y 2 + 3 d 3 Y 2 - Y 1 | Y 2 - Y 1 | s i n ( a r c t a n ( | a | ) )
The radius of estimation range is: wherein, for the slope of positional information P1 and positional information P2 line.
S206, judges the positional information P of dynamic password 0(X 0, Y 0) whether in estimation range, if not in estimation range, authentification failure, if in estimation range, location-authentication success.
Judge the positional information P in current dynamic password authentication information 0(X 0, Y 0) whether meet:
(X 0-C x) 2+(Y 0-C y) 2≤r 2
If do not met, then showing that positional information does not meet the prediction to vehicle location, is likely the dynamic password forged, authentication failure; If met, then show that positional information also meets the reasonable prediction of track of vehicle, by certification.After certification, car-mounted terminal can carry out follow-up transfer of data.
It should be noted that, for the certification of dynamic password, only can adopt time certification, namely time certification successfully thinks that this dynamic password authentication is successful.Also can adopt time certification and location-authentication, namely meet location-authentication condition at time certification by rear judging whether further, not meet and then cannot carry out location-authentication; Meet, then further certification is carried out to the position of dynamic password, after location-authentication is also passed through, just think that this dynamic password authentication is successful.
A kind of dynamic password generates equipment, and it comprises,
Locating module, for dynamic token current location information P and current standard time T;
Parameter acquisition module, for the R that gets parms;
First abstract extraction module, adopts digest algorithm for location information P, time T and parameter R, generates summary D;
Encrypting module, after being encrypted, obtains dynamic password for positional information P, time T, parameter R and summary D.
Wherein, parameter acquisition module is input module, for the manual input parameter of user.Locating module is GPS locating module or Big Dipper locating module.
A kind of dynamic password authentication system, it comprises,
Central server module, generates the dynamic password of equipment generation for receiving above-mentioned dynamic password;
Deciphering module, for being decrypted by the dynamic password received, obtains positional information P0, time T0, parameter R0 and summary D0 after deciphering;
Second abstract extraction module, for the digest algorithm that the first abstract extraction module is identical, generates location information P0, time T0 and parameter R0 and adopts digest algorithm, generate summary DD;
Time calibration module, for current time Tp and dynamic password time T0 is compared.
Also comprising position correction module, being positioned at estimation range for checking the positional information P0 of dynamic password.
Although specifically show in conjunction with preferred embodiment and describe the present invention; but those skilled in the art should be understood that; not departing from the spirit and scope of the present invention that appended claims limits; can make a variety of changes the present invention in the form and details, be protection scope of the present invention.

Claims (13)

1. a dynamic password formation method, is characterized in that: it comprises the following steps,
S101, obtains current location information P and current standard time T;
S102, obtains a parameter R;
S103, location information P, time T and parameter R adopt digest algorithm, generate summary D;
S104, after using cryptographic algorithm location information P, time T, parameter R and summary D to be encrypted,
Obtain dynamic password.
2. dynamic password formation method as claimed in claim 1, is characterized in that: the parameter R in described step S102 is random parameter or user's input parameter.
3. dynamic password formation method as claimed in claim 1, is characterized in that: the digest algorithm in described step S103 is MD5 or SHA-1.
4. dynamic password formation method as claimed in claim 1, is characterized in that: the cryptographic algorithm in described step S104 is RSA cryptographic algorithms or SM2.
5. a dynamic password authentication method, the dynamic password generated for the dynamic password formation method described in any one of claim 1-4 carries out certification, it is characterized in that: it comprises the following steps,
S201, is decrypted the dynamic password received, and obtains positional information P0, time T0, parameter R0 and summary D0 after deciphering;
S202, adopt the digest algorithm that dynamic password formation method is identical, location information P0, time T0 and parameter R0 adopt digest algorithm, and generate summary DD, judge whether DD equals D0, if DD is not equal to D0, authentification failure, if DD equals D0, forwards step S203 to;
S203, preset time threshold B, calculate the time difference Td=|Tp-T0| between current time Tp and the time T0 of dynamic password, if Td≤B, and authentification failure, if Td ﹤ is B, time certification success.
6. dynamic password authentication method as claimed in claim 5, it is characterized in that: also comprise location-authentication, location-authentication comprises the following steps:
S204, the continuous dynamic password of the first two all authentication successs, and obtain the first two continuous dynamic password corresponding positional information P1, positional information P2 and time T1, the coordinate of time T2, positional information P1 is (X 1, Y 1), the coordinate of positional information P2 is (X 2, Y 2);
S205, on positional information P1 and positional information P2 extended line, setting center of circle O, the distance between center of circle O and positional information P2 is radius r, and radius r is set point, take O as the center of circle, and r is that radius is justified, and this circle is estimation range;
S206, judges the positional information P of dynamic password 0(X 0, Y 0) whether in estimation range, if not in estimation range, authentification failure, if in estimation range, location-authentication success.
7. dynamic password authentication method as claimed in claim 6, is characterized in that: in described step S205, the computational methods of radius r are, the distance between calculating location information P1 and positional information P2 average speed V=E/ (the T of dynamic token movement between two continuous dynamic passwords 2-T 1), prediction dynamic token displacement d=|T in time T0 0-T 2| * V, radius r = 3 3 d .
8. the dynamic password authentication method as described in any one of claim 5-7, is characterized in that: the authentication success of described dynamic password is time certification success, or time certification and location-authentication all successful.
9. dynamic password generates an equipment, it is characterized in that: it comprises,
Locating module, for dynamic token current location information P and current standard time T;
Parameter acquisition module, for the R that gets parms;
First abstract extraction module, adopts digest algorithm for location information P, time T and parameter R, generates summary D;
Encrypting module, after being encrypted, obtains dynamic password for positional information P, time T, parameter R and summary D.
10. dynamic password as claimed in claim 9 generates equipment, it is characterized in that: described parameter acquisition module is input module, for the manual input parameter of user.
11. dynamic passwords as claimed in claim 9 generate equipment, it is characterized in that: described locating module is GPS locating module or Big Dipper locating module.
12. 1 kinds of dynamic password authentication systems, is characterized in that: it comprises,
Central server module, generates the dynamic password of equipment generation for receiving dynamic password described in any one of claim 9-11;
Deciphering module, for being decrypted by the dynamic password received, obtains positional information P0, time T0, parameter R0 and summary D0 after deciphering;
Second abstract extraction module, for the digest algorithm that the first abstract extraction module is identical, generates location information P0, time T0 and parameter R0 and adopts digest algorithm, generate summary DD;
Time calibration module, for current time Tp and dynamic password time T0 is compared.
13. dynamic password authentication systems as claimed in claim 12, is characterized in that: described system also comprises position correction module whether be positioned at estimation range for checking the positional information P0 of dynamic password.
CN201510849535.0A 2015-11-27 2015-11-27 Dynamic password authentication method and system Active CN105391556B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510849535.0A CN105391556B (en) 2015-11-27 2015-11-27 Dynamic password authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510849535.0A CN105391556B (en) 2015-11-27 2015-11-27 Dynamic password authentication method and system

Publications (2)

Publication Number Publication Date
CN105391556A true CN105391556A (en) 2016-03-09
CN105391556B CN105391556B (en) 2022-02-15

Family

ID=55423411

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510849535.0A Active CN105391556B (en) 2015-11-27 2015-11-27 Dynamic password authentication method and system

Country Status (1)

Country Link
CN (1) CN105391556B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656495A (en) * 2016-10-18 2017-05-10 北京海泰方圆科技股份有限公司 User password storage method and device
CN106790138A (en) * 2016-12-28 2017-05-31 山东浪潮云服务信息科技有限公司 A kind of method of government affairs cloud application User logs in double factor checking
CN107332809A (en) * 2016-04-29 2017-11-07 中国电信股份有限公司 Verification method and checking system and relevant device
CN110098923A (en) * 2019-04-08 2019-08-06 浙江大华技术股份有限公司 A kind of method and apparatus of generation and verifying temporary password

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070250920A1 (en) * 2006-04-24 2007-10-25 Jeffrey Dean Lindsay Security Systems for Protecting an Asset
CN102684881A (en) * 2012-05-03 2012-09-19 飞天诚信科技股份有限公司 Authentication method and authentication device of dynamic password
CN103116718A (en) * 2013-03-06 2013-05-22 无锡德飞科技有限公司 Password setting and verification method based on spatial position code log-in computer system
CN103401689A (en) * 2013-08-22 2013-11-20 赵忠华 Positional information based dynamic token and encryption method thereof
WO2013178982A1 (en) * 2012-05-28 2013-12-05 Swivel Secure Limited Method and system for secure user identification
CN103491090A (en) * 2013-09-23 2014-01-01 金蝶软件(中国)有限公司 Safety authentication method, device and system
US20140037074A1 (en) * 2012-07-31 2014-02-06 International Business Machines Corporation Detecting man-in-the-middle attacks in electronic transactions using prompts
CN104933562A (en) * 2015-06-16 2015-09-23 深圳深若科技有限公司 Express fee password-free payment method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070250920A1 (en) * 2006-04-24 2007-10-25 Jeffrey Dean Lindsay Security Systems for Protecting an Asset
CN102684881A (en) * 2012-05-03 2012-09-19 飞天诚信科技股份有限公司 Authentication method and authentication device of dynamic password
WO2013178982A1 (en) * 2012-05-28 2013-12-05 Swivel Secure Limited Method and system for secure user identification
US20140037074A1 (en) * 2012-07-31 2014-02-06 International Business Machines Corporation Detecting man-in-the-middle attacks in electronic transactions using prompts
CN103116718A (en) * 2013-03-06 2013-05-22 无锡德飞科技有限公司 Password setting and verification method based on spatial position code log-in computer system
CN103401689A (en) * 2013-08-22 2013-11-20 赵忠华 Positional information based dynamic token and encryption method thereof
CN103491090A (en) * 2013-09-23 2014-01-01 金蝶软件(中国)有限公司 Safety authentication method, device and system
CN104933562A (en) * 2015-06-16 2015-09-23 深圳深若科技有限公司 Express fee password-free payment method and system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
BYUNGRAE CHA等: "Random password generation of OTP system using changed location and angle of fingerprint features", 《2008 8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY》 *
刘潇等: "一种改进的动态口令生成算法及重同步方案", 《计算机研究与发展》 *
林意等: "基于B样条曲线的一次性口令认证系统研究", 《微计算机信息》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107332809A (en) * 2016-04-29 2017-11-07 中国电信股份有限公司 Verification method and checking system and relevant device
CN107332809B (en) * 2016-04-29 2020-11-24 中国电信股份有限公司 Verification method, verification system and related equipment
CN106656495A (en) * 2016-10-18 2017-05-10 北京海泰方圆科技股份有限公司 User password storage method and device
CN106656495B (en) * 2016-10-18 2018-06-12 北京海泰方圆科技股份有限公司 A kind of method and device of user password storage
CN106790138A (en) * 2016-12-28 2017-05-31 山东浪潮云服务信息科技有限公司 A kind of method of government affairs cloud application User logs in double factor checking
CN110098923A (en) * 2019-04-08 2019-08-06 浙江大华技术股份有限公司 A kind of method and apparatus of generation and verifying temporary password
CN110098923B (en) * 2019-04-08 2021-08-27 浙江大华技术股份有限公司 Method and equipment for generating and verifying temporary password

Also Published As

Publication number Publication date
CN105391556B (en) 2022-02-15

Similar Documents

Publication Publication Date Title
EP3780543A1 (en) Blockchain cross-chain authentication method and system, and server and readable storage medium
CN109687963B (en) Anti-quantum computing alliance chain transaction method and system based on public key pool
CN106330910B (en) Strong secret protection double authentication method in car networking based on node identities and prestige
Wang et al. 2FLIP: A two-factor lightweight privacy-preserving authentication scheme for VANET
US10708062B2 (en) In-vehicle information communication system and authentication method
US8526606B2 (en) On-demand secure key generation in a vehicle-to-vehicle communication network
US11349675B2 (en) Tamper-resistant and scalable mutual authentication for machine-to-machine devices
EP3841702B1 (en) Method, user device, management device, storage medium and computer program product for key management
GB2623015A (en) Internet-of-vehicles communication security authentication method, system and device based on national cryptographic algorithm
CN108737323B (en) Digital signature method, device and system
CN105656635A (en) Dynamic password generation method and device and authentication method and system
CN108764912B (en) Payment method and device based on short message verification code
CN109905877B (en) Message verification method of communication network system, communication method and communication network system
CN109104271B (en) Digital signature method, device and system
CN105391556A (en) Method and apparatus for generating dynamic password, authentication method and system
CN103179129A (en) Remote attestation method based on cloud computing infrastructure as a service (IaaS) environment
CN105049434A (en) Identity authentication method and encryption communication method under peer-to-peer network environment
CN106127079A (en) A kind of data sharing method and device
Shim Reconstruction of a secure authentication scheme for vehicular ad hoc networks using a binary authentication tree
CN103701787A (en) User name password authentication method implemented on basis of public key algorithm
CN105450623A (en) Access authentication method of electric automobile
CN103560887A (en) Intelligent terminal remote attestation method and system
Liang et al. Physically secure and conditional-privacy authenticated key agreement for VANETs
CN111245611B (en) Anti-quantum computation identity authentication method and system based on secret sharing and wearable equipment
CN115314228B (en) Unmanned aerial vehicle identity authentication method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant