CN105656635A - Dynamic password generation method and device and authentication method and system - Google Patents

Dynamic password generation method and device and authentication method and system Download PDF

Info

Publication number
CN105656635A
CN105656635A CN201610125486.0A CN201610125486A CN105656635A CN 105656635 A CN105656635 A CN 105656635A CN 201610125486 A CN201610125486 A CN 201610125486A CN 105656635 A CN105656635 A CN 105656635A
Authority
CN
China
Prior art keywords
dynamic password
time
positional information
parameter
numbering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610125486.0A
Other languages
Chinese (zh)
Inventor
赫季芬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610125486.0A priority Critical patent/CN105656635A/en
Publication of CN105656635A publication Critical patent/CN105656635A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention belongs to the technical field of safety security, and particularly relates to a dynamic password generation method and device and authentication method and system. The dynamic password generation method includes the steps of obtaining the current position information P and the current standard time T, obtaining a parameter R and a serial number Q of the dynamic password generation device, generating an abstract D for the position information P, the time T, the parameter R and the serial number Q through the abstract algorithm, and obtaining a dynamic password after encrypting the position information P, the time T, the parameter R, the serial number Q and the abstract D through the encryption algorithm. The dynamic password generation method and device and authentication method and system are used for identity authentication of high-security-level police, military and government vehicles and remote service centers.

Description

A kind of dynamic password formation method, equipment and authentication method and system
Technical field
The invention belongs to field of information security technology, be specifically related to a kind of dynamic password formation method, equipment and authentication method and system.
Background technology
Along with the development of the deep of IT application process and computer technology, networking has become as the development main trend of IT application in enterprises. People are while enjoying numerous benefits that informationization brings, and network security problem has become the challenge of information age mankind's facing, and Network Information Security Problem becomes the task of top priority. Dynamic password, as one of safest identity identifying technology, is applied by increasing industry at present. Owing to it is easy to use, and platform-independent, along with the development of mobile Internet, dynamic-password technique has become the main flow of identity identifying technology, is widely used in the fields such as enterprise, network game, finance.
Owing to dynamic password has disposable (namely each password does not repeat), carry out authentication with dynamic password, be the safe authentication mode of a kind of comparison. Traditional dynamic password method is all based on the dynamic password of time synchronized, and with password generated key (PKI) encryption, are generated dynamic password the standard time. Referenced patent document CN104683356A discloses a kind of dynamic password authentication method based on software token and system, respectively through a built-in satellite time transfer module accurate current time of acquisition in client and server, in client and server, generate dynamic password subsequently respectively, finally complete the certification of dynamic password in the server.
But owing to the standard time is one, known information is disclosed, dynamic password is corresponding encrypted result, and this exists for Brute Force and is likely to, by collecting a large amount of dynamic passwords that user sends, correspondence sends standard time during password, and reverse engineered dynamic password generates key. Once key is cracked, will result in serious safety consequences.
In car working application, vehicle generally require in the process of moving the cycle, timing mutual with center, as reported vehicle-state, receive commander's instruction, judge and whether command centre's link normal etc. Especially for police, military vehicle, vehicle in the process of moving with the periodicity at center alternately owing to data volume is big, it is possible to the data being trapped are many, just with greater need for high safe level certification.
Summary of the invention
The present invention is directed to the weak point that the existing dynamic password based on time synchronized exists, it is proposed that a kind of dynamic password formation method, equipment and authentication method and system.This dynamic password formation method, adopts the positional information of dynamic token, time and a random parameter to combine, generates dynamic password, be authenticated for this dynamic password.
The present invention adopts the following technical scheme that
A kind of dynamic password formation method, it comprises the following steps,
S101, obtains current location information P and current standard time T;
S102, it is thus achieved that a parameter R and dynamic password generate the numbering Q of equipment;
S103, adopts digest algorithm to positional information P, time T, parameter R and numbering Q, generates summary D;
S104, after using AES that positional information P, time T, parameter R, numbering Q and summary D are encrypted, obtains dynamic password.
Further, the parameter R in step S102 is random parameter or user inputs parameter.
Further, the digest algorithm in step S103 is MD5 or SHA-1; AES in step S104 is RSA cryptographic algorithms or SM2.
A kind of dynamic password authentication method, the dynamic password generated for the dynamic password formation method of as above any one is authenticated, and it comprises the following steps,
S201, is decrypted the dynamic password received, and obtains positional information P0, time T0, parameter R0, numbering Q0 and summary D0 after deciphering;
S202, it is judged that whether numbering Q0 exists in list of devices, as existed, then forwards step S203 to, otherwise, and authentification failure;
S203, adopts the digest algorithm that dynamic password formation method is identical, and positional information P0, time T0, parameter R0 and numbering Q0 are adopted digest algorithm, generate summary DD, it is judged that whether DD is equal to D0, if DD is not equal to D0, authentification failure, if DD is equal to D0, forwards step S204 to;
S204, preset time threshold B, calculate time difference Td=| the Tp-T0 | between current time Tp and the time T0 of dynamic password, if Td is B, and authentification failure, if Td is B, time certification success.
Further, also including location-authentication, location-authentication comprises the following steps:
S205, the first two continuous dynamic password all certifications success, and obtain the continuous dynamic password of the first two corresponding positional information P1, positional information P2 and time T1, time T2, the coordinate of positional information P1 is (X1,Y1), the coordinate of positional information P2 is (X2,Y2);
S206, on positional information P1 and positional information P2 extended line, sets center of circle O, and the distance between center of circle O and positional information P2 is radius r, and radius r is setting value, and with O for the center of circle, r is that radius is justified, and this circle is estimation range;
S207, it is judged that the positional information P of dynamic password0(X0,Y0) whether in estimation range, if not in estimation range, authentification failure, if in estimation range, location-authentication success.
Further, in step S205, the computational methods of radius r are, the distance between calculating location information P1 and positional information P2Average speed V=E/ (the T that between two continuous dynamic passwords, dynamic token moves2-T1), it was predicted that dynamic token is displacement d=in time T0 | T0-T2| * V, radius r=d.
Further, the certification of dynamic password is successfully time certification success, or time certification and location-authentication are all successful.
A kind of dynamic password generates equipment, and it includes,
Locating module, for dynamic token current location information P and current standard time T;
Parameter acquisition module, is used for the R and dynamic password generation device numbering Q that gets parms;
First abstract extraction module, for positional information P, time T, parameter R and numbering Q are adopted digest algorithm, generates summary D;
Encrypting module, after being used for using AES that positional information P, time T, parameter R, numbering Q and summary D are encrypted, obtains dynamic password.
Further, parameter acquisition module is input module, is manually entered parameter for user; Locating module is GPS locating module or Big Dipper locating module.
A kind of dynamic password authentication system, it includes,
Central server module, generates, for receiving claim 9-11 any one dynamic password, the dynamic password that equipment generates;
Deciphering module, for being decrypted by the dynamic password received, obtains positional information P0, time T0, parameter R0, numbering Q0 and summary D0 after deciphering;
Second abstract extraction module, for the digest algorithm that the first abstract extraction module is identical, generates and positional information P0, time T0, parameter R0 and numbering Q0 is adopted digest algorithm, generates summary DD;
Time calibration, module, was used for comparing current time Tp and dynamic password time T0;
Position correction module, for checking whether the positional information P0 of dynamic password is positioned at estimation range.
The present invention devises the dynamic password authentication method that dynamic location information mixes with the time, and the positional information for dynamic token is also carried out prediction, and when the next dynamic password of checking arrives, whether dynamic token is in estimation range. But also the numbering of dynamic token is verified, improve the safety of dynamic password authentication when dynamic token moves, make dynamic password be difficult to be forged or crack. The method is particularly suitable for police, military, the government vehicle of high safe level and the authentication of remote service center.
Accompanying drawing explanation
Fig. 1 is dynamic password product process figure;
Fig. 2 is dynamic password authentication flow chart;
Fig. 3 is position prediction zone concepts figure.
Detailed description of the invention
For further illustrating each embodiment, the present invention is provided with accompanying drawing. These accompanying drawings are the part that the invention discloses content, and it is mainly in order to illustrate embodiment, and the associated description of description can be coordinated to explain the operation principles of embodiment. Coordinating with reference to these contents, those of ordinary skill in the art will be understood that other possible embodiments and advantages of the present invention. Assembly in figure is not necessarily to scale, and similar element numbers is conventionally used to indicate similar assembly.
In conjunction with the drawings and specific embodiments, the present invention is further described.
Consulting shown in Fig. 1, the present invention proposes a kind of dynamic password formation method, and it comprises the following steps:
S101, obtains current location information P and current standard time T;
When car-mounted terminal needs to generate dynamic password, from locating module, first obtain present terminal position P and current standard time T.
S102, it is thus achieved that a parameter R and dynamic password generate the numbering Q of equipment;
Parameter R is a random parameter, and these three data are formed continuous array { T, P, a R}. It should be noted that the parameter R of the present invention is a random number, skilled person will appreciate that, parameter R also can input parameter for user, and user is manually entered data as parameter R. Each dynamic password generates equipment a unique numbering Q, dynamic password generate equipment and dynamic password authentication system with the use of, dynamic password authentication system stores the numbering Q of the dynamic password generation equipment being mated use.
S103, adopts digest algorithm to positional information P, time T, parameter R and numbering Q, generates summary D;
To array, { T, P, R, Q} adopt digest algorithm to generate summary D, digest algorithm and hash algorithm, it is possible to be that MD5, SHA-1 etc. appoint the digest algorithm meeting the world or national standard. D is added in array and obtain new array { T, P, R, Q, D}
S104, after using AES that positional information P, time T, parameter R, numbering Q and summary D are encrypted, obtains dynamic password.
With PKI, by array, { T, P, R, Q, D} encrypt, and obtain one and add ciphertext data S, are dynamic password, mail to dynamic password authentication system, and request carries out authentication. The present invention adopts PKI to be encrypted, and AES can be the rivest, shamir, adelman that RSA, SM2 etc. meet the world or national standard.
Consulting shown in Fig. 2, the present invention proposes a kind of dynamic password authentication method, and this dynamic password authentication method is that the dynamic password that above-mentioned dynamic password formation method is generated is authenticated, and it comprises the following steps:
S201, is decrypted the dynamic password received, and obtains positional information P0, time T0, parameter R0, numbering Q0 and summary D0 after deciphering;
After receiving dynamic password S, start certification dynamic password, adopt private key that S is decrypted, data { T0, P0, R0, Q0, the D0} after being deciphered.
S202, it is judged that whether numbering Q0 exists in list of devices, as existed, then forwards step S203 to, otherwise, and authentification failure;
Due to dynamic password generate equipment and dynamic password authentication system with the use of, then first determine whether that this dynamic password generates whether equipment matches with dynamic password authentication system. Namely judging whether the numbering Q0 of dynamic password generation equipment is present in the cooperation list of dynamic password authentication system, a dynamic password authentication system is likely to match with multiple dynamic password authentication equipment. If the numbering Q0 that this dynamic password generates equipment is present in the list of devices of dynamic password authentication system, then forward step S203 to; Do not match if it does not exist, then this dynamic password generates equipment with dynamic password authentication system, authentification failure.
S203, adopts the digest algorithm that dynamic password formation method is identical, and positional information P0, time T0, parameter R0 and numbering Q0 are adopted digest algorithm, generate summary DD, it is judged that whether DD is equal to D0, if DD is not equal to D0, authentification failure, if DD is equal to D0, forwards step S204 to;
Extract { T0, P0, R0, Q0}, adopt the digest algorithm identical with dynamic password formation method, to { T0, P0, R0, Q0} generates summary DD, it is judged that whether DD is equal to D0, if not, the legal PKI that PKI is not and in central server module, private key matches of terminal encryption, authentication failure are then described; If it is, illustrate that terminal public key is legal, forward step S204 to.
S204, preset time threshold B, calculate time difference Td=| the Tp-T0 | between current time Tp and the time T0 of dynamic password, if Td is B, and authentification failure, if Td is B, time certification success.
First presetting a time threshold B, time threshold B is a less value. Obtain current precise time Tp, calculate the difference of temporal information T0 and the time Tp comprised in dynamic password: Td=| Tp-T0 |. Judge that whether Td is less than time threshold B, if it is not, then illustrate that dynamic password lost efficacy or dynamic password is for forging, authentication failure. If it is illustrating that dynamic password generated in real time according to the standard time, temporal information is correct, time certification success.
As Td B, it is judged that in the first two RQ cycle, whether this car-mounted terminal uploads dynamic password authentication request certification success, if it is not, position prediction condition is not enough, direct basis temporal information passes through certification; If it has, show that now vehicle, already at the state asking certification continuously, continues the positional information in checking dynamic password. Location-authentication comprises the following steps:
S205, the first two continuous dynamic password all certifications success, and obtain the continuous dynamic password of the first two corresponding positional information P1, positional information P2 and time T1, time T2, the coordinate of positional information P1 is (X1,Y1), the coordinate of positional information P2 is (X2,Y2), wherein, X, Y represent the transverse and longitudinal coordinate of positional information.
S206, the distance between calculating location information P1 and positional information P2
E = ( Y 2 - Y 1 ) 2 + ( X 2 - X 1 ) 2 ,
Average speed V=E/ (the T of vehicle between two continuous dynamic passwords2-T1), it was predicted that vehicle operating range d=in time T0 | T0-T2| * V. Consulting shown in Fig. 3, for position prediction zone concepts figure, with P2 for the center of circle, with radius d for radius, drafting circle, the region included by this circle is estimation range. Namely the center of circle of this estimation range is (X2,Y2), it was predicted that the radius in region is r=d.
S207, it is judged that the positional information P of dynamic password0(X0,Y0) whether in estimation range, if not in estimation range, authentification failure, if in estimation range, location-authentication success.
Judge the positional information P in current dynamic password authentication information0(X0,Y0) whether meet:
(X0-Cx)2+(Y0-Cy)2��r2
If be unsatisfactory for, then show that positional information does not meet the prediction to vehicle location, it may be possible to the dynamic password of forgery, authentication failure; If it is satisfied, then show that positional information also complies with the reasonable prediction of track of vehicle, by certification. After certification, car-mounted terminal can carry out follow-up data transmission.
It should be noted that for the certification of dynamic password, it is possible to only with time certification, namely time certification successfully thinks that this dynamic password authentication is successful. Also can adopt time certification and location-authentication, namely further determine whether to meet location-authentication condition after time certification passes through, be unsatisfactory for, cannot be carried out location-authentication; Meet, then the position of dynamic password is carried out further certification, in location-authentication also by rear, just think that this dynamic password authentication is successful.
A kind of dynamic password generates equipment, and it includes,
Locating module, for dynamic token current location information P and current standard time T;
Parameter acquisition module, is used for the R and dynamic password generation device numbering Q that gets parms;
First abstract extraction module, for positional information P, time T, parameter R and numbering Q are adopted digest algorithm, generates summary D;
Encrypting module, after being encrypted for positional information P, time T, parameter R, numbering Q and summary D, obtains dynamic password.
Wherein, parameter acquisition module is input module, is manually entered parameter for user. Locating module is GPS locating module or Big Dipper locating module.
A kind of dynamic password authentication system, it includes,
Central server module, generates, for receiving above-mentioned dynamic password, the dynamic password that equipment generates;
Deciphering module, for being decrypted by the dynamic password received, obtains positional information P0, time T0, parameter R0, numbering Q0 and summary D0 after deciphering;
Second abstract extraction module, for the digest algorithm that the first abstract extraction module is identical, generates and positional information P0, time T0, parameter R0 and numbering Q0 is adopted digest algorithm, generates summary DD;
Time calibration, module, was used for comparing current time Tp and dynamic password time T0.
Position correction module, for checking the positional information P0 of dynamic password to be positioned at estimation range.
Although specifically showing in conjunction with preferred embodiment and describing the present invention; but those skilled in the art should be understood that; in the spirit and scope without departing from appended claims invention defined; the present invention can be made a variety of changes in the form and details, be protection scope of the present invention.

Claims (10)

1. a dynamic password formation method, it is characterised in that: it comprises the following steps,
S101, obtains current location information P and current standard time T;
S102, it is thus achieved that a parameter R and dynamic password generate the numbering Q of equipment;
S103, adopts digest algorithm to positional information P, time T, parameter R and numbering Q, generates summary D;
S104, after using AES that positional information P, time T, parameter R, numbering Q and summary D are encrypted, obtains dynamic password.
2. dynamic password formation method as claimed in claim 1, it is characterised in that: the parameter R in described step S102 is random parameter or user inputs parameter.
3. dynamic password formation method as claimed in claim 1, it is characterised in that: the digest algorithm in described step S103 is MD5 or SHA-1; AES in described step S104 is RSA cryptographic algorithms or SM2.
4. a dynamic password authentication method, the dynamic password generated for the dynamic password formation method described in any one of claim 1-4 is authenticated, it is characterised in that: it comprises the following steps,
S201, is decrypted the dynamic password received, and obtains positional information P0, time T0, parameter R0, numbering Q0 and summary D0 after deciphering;
S202, it is judged that whether numbering Q0 exists in list of devices, as existed, then forwards step S203 to, otherwise, and authentification failure;
S203, adopts the digest algorithm that dynamic password formation method is identical, and positional information P0, time T0, parameter R0 and numbering Q0 are adopted digest algorithm, generate summary DD, it is judged that whether DD is equal to D0, if DD is not equal to D0, authentification failure, if DD is equal to D0, forwards step S204 to;
S204, preset time threshold B, calculate time difference Td=| the Tp-T0 | between current time Tp and the time T0 of dynamic password, if Td is B, and authentification failure, if Td is B, time certification success.
5. dynamic password authentication method as claimed in claim 5, it is characterised in that: also including location-authentication, location-authentication comprises the following steps:
S205, the first two continuous dynamic password all certifications success, and obtain the continuous dynamic password of the first two corresponding positional information P1, positional information P2 and time T1, time T2, the coordinate of positional information P1 is (X1,Y1), the coordinate of positional information P2 is (X2,Y2);
S206, on positional information P1 and positional information P2 extended line, sets center of circle O, and the distance between center of circle O and positional information P2 is radius r, and radius r is setting value, and with O for the center of circle, r is that radius is justified, and this circle is estimation range;
S207, it is judged that the positional information P of dynamic password0(X0,Y0) whether in estimation range, if not in estimation range, authentification failure, if in estimation range, location-authentication success.
6. dynamic password authentication method as claimed in claim 6, it is characterised in that: in described step S205, the computational methods of radius r are, the distance between calculating location information P1 and positional information P2Average speed V=E/ (the T that between two continuous dynamic passwords, dynamic token moves2-T1), it was predicted that dynamic token is displacement d=in time T0 | T0-T2| * V, radius r=d.
7. the dynamic password authentication method as described in any one of claim 5-7, it is characterised in that: the certification of described dynamic password is successfully time certification success, or time certification and location-authentication are all successful.
8. a dynamic password generates equipment, it is characterised in that: it includes,
Locating module, for dynamic token current location information P and current standard time T;
Parameter acquisition module, is used for the R and dynamic password generation device numbering Q that gets parms;
First abstract extraction module, for positional information P, time T, parameter R and numbering Q are adopted digest algorithm, generates summary D;
Encrypting module, after being used for using AES that positional information P, time T, parameter R, numbering Q and summary D are encrypted, obtains dynamic password.
9. dynamic password as claimed in claim 9 generates equipment, it is characterised in that: described parameter acquisition module is input module, is manually entered parameter for user; Locating module is GPS locating module or Big Dipper locating module.
10. a dynamic password authentication system, it is characterised in that: it includes,
Central server module, generates, for receiving dynamic password described in any one of claim 9-11, the dynamic password that equipment generates;
Deciphering module, for being decrypted by the dynamic password received, obtains positional information P0, time T0, parameter R0, numbering Q0 and summary D0 after deciphering;
Second abstract extraction module, for the digest algorithm that the first abstract extraction module is identical, generates and positional information P0, time T0, parameter R0 and numbering Q0 is adopted digest algorithm, generates summary DD;
Time calibration, module, was used for comparing current time Tp and dynamic password time T0;
Position correction module, for checking whether the positional information P0 of dynamic password is positioned at estimation range.
CN201610125486.0A 2016-03-04 2016-03-04 Dynamic password generation method and device and authentication method and system Pending CN105656635A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610125486.0A CN105656635A (en) 2016-03-04 2016-03-04 Dynamic password generation method and device and authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610125486.0A CN105656635A (en) 2016-03-04 2016-03-04 Dynamic password generation method and device and authentication method and system

Publications (1)

Publication Number Publication Date
CN105656635A true CN105656635A (en) 2016-06-08

Family

ID=56492197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610125486.0A Pending CN105656635A (en) 2016-03-04 2016-03-04 Dynamic password generation method and device and authentication method and system

Country Status (1)

Country Link
CN (1) CN105656635A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106204038A (en) * 2016-06-24 2016-12-07 广州正峰电子科技有限公司 The method and device that a kind of password string generates
CN106327194A (en) * 2016-08-24 2017-01-11 北京信安世纪科技有限公司 Password generation method and electronic equipment
CN106375450A (en) * 2016-09-05 2017-02-01 深圳市双赢伟业科技股份有限公司 Vehicle cargo anti-theft method and device
CN106657211A (en) * 2016-09-05 2017-05-10 深圳市双赢伟业科技股份有限公司 Goods anti-theft method and device based on Internet of vehicles
CN107196903A (en) * 2017-03-31 2017-09-22 斑马信息科技有限公司 Auto communication management system and its management method and personal identification method

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202059427U (en) * 2011-03-23 2011-11-30 北京恒光数码科技有限公司 Dynamic cipher token apparatus and system
CN102624678A (en) * 2011-01-27 2012-08-01 中国联合网络通信集团有限公司 System verification method and system verification server
CN103401689A (en) * 2013-08-22 2013-11-20 赵忠华 Positional information based dynamic token and encryption method thereof
CN103441856A (en) * 2013-09-06 2013-12-11 北京握奇智能科技有限公司 Dynamic password authentication method and device
CN103491090A (en) * 2013-09-23 2014-01-01 金蝶软件(中国)有限公司 Safety authentication method, device and system
CN103814380A (en) * 2011-08-02 2014-05-21 高通股份有限公司 Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device
CN104683355A (en) * 2015-03-26 2015-06-03 上海众人网络安全技术有限公司 Anti-repudiation dynamic password generating method and dynamic password verification system
CN104683358A (en) * 2015-03-26 2015-06-03 上海众人网络安全技术有限公司 Anti-repudiation dynamic password generating method and dynamic password verification system
CN104933562A (en) * 2015-06-16 2015-09-23 深圳深若科技有限公司 Express fee password-free payment method and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624678A (en) * 2011-01-27 2012-08-01 中国联合网络通信集团有限公司 System verification method and system verification server
CN202059427U (en) * 2011-03-23 2011-11-30 北京恒光数码科技有限公司 Dynamic cipher token apparatus and system
CN103814380A (en) * 2011-08-02 2014-05-21 高通股份有限公司 Method and apparatus for using a multi-factor password or a dynamic password for enhanced security on a device
CN103401689A (en) * 2013-08-22 2013-11-20 赵忠华 Positional information based dynamic token and encryption method thereof
CN103441856A (en) * 2013-09-06 2013-12-11 北京握奇智能科技有限公司 Dynamic password authentication method and device
CN103491090A (en) * 2013-09-23 2014-01-01 金蝶软件(中国)有限公司 Safety authentication method, device and system
CN104683355A (en) * 2015-03-26 2015-06-03 上海众人网络安全技术有限公司 Anti-repudiation dynamic password generating method and dynamic password verification system
CN104683358A (en) * 2015-03-26 2015-06-03 上海众人网络安全技术有限公司 Anti-repudiation dynamic password generating method and dynamic password verification system
CN104933562A (en) * 2015-06-16 2015-09-23 深圳深若科技有限公司 Express fee password-free payment method and system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106204038A (en) * 2016-06-24 2016-12-07 广州正峰电子科技有限公司 The method and device that a kind of password string generates
CN106327194A (en) * 2016-08-24 2017-01-11 北京信安世纪科技有限公司 Password generation method and electronic equipment
CN106375450A (en) * 2016-09-05 2017-02-01 深圳市双赢伟业科技股份有限公司 Vehicle cargo anti-theft method and device
CN106657211A (en) * 2016-09-05 2017-05-10 深圳市双赢伟业科技股份有限公司 Goods anti-theft method and device based on Internet of vehicles
CN107196903A (en) * 2017-03-31 2017-09-22 斑马信息科技有限公司 Auto communication management system and its management method and personal identification method

Similar Documents

Publication Publication Date Title
CN109687963B (en) Anti-quantum computing alliance chain transaction method and system based on public key pool
Wazid et al. AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment
EP3780543A1 (en) Blockchain cross-chain authentication method and system, and server and readable storage medium
EP3841702B1 (en) Method, user device, management device, storage medium and computer program product for key management
CN110969431B (en) Secure hosting method, device and system for private key of blockchain digital coin
CN105656635A (en) Dynamic password generation method and device and authentication method and system
US20120155636A1 (en) On-Demand Secure Key Generation
CN104052606B (en) Digital signature, signature authentication device and digital signature method
CN103795534A (en) Password-based authentication method and apparatus executing the method
CN109104271B (en) Digital signature method, device and system
CN109040060B (en) Terminal matching method and system and computer equipment
CN108764912B (en) Payment method and device based on short message verification code
CN104219245A (en) System and method for location based service-orientated user privacy protection
CN103179129A (en) Remote attestation method based on cloud computing infrastructure as a service (IaaS) environment
CN103701787A (en) User name password authentication method implemented on basis of public key algorithm
CN105049434A (en) Identity authentication method and encryption communication method under peer-to-peer network environment
CN111404664A (en) Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices
CN110098925B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and random number
CN105391556B (en) Dynamic password authentication method and system
CN111343160A (en) Anti-quantum computation blockchain transaction method and system based on secret sharing and routing device
CN114944921A (en) Login authentication method and device, electronic equipment and storage medium
CN111245611B (en) Anti-quantum computation identity authentication method and system based on secret sharing and wearable equipment
CN107682380B (en) Cross authentication method and device
CN104579692A (en) Information processing method on basis of intelligent card
CN113115309B (en) Data processing method and device for Internet of vehicles, storage medium and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160608