CN109586923A - Single time password offline authentication method and device - Google Patents

Single time password offline authentication method and device Download PDF

Info

Publication number
CN109586923A
CN109586923A CN201811564925.3A CN201811564925A CN109586923A CN 109586923 A CN109586923 A CN 109586923A CN 201811564925 A CN201811564925 A CN 201811564925A CN 109586923 A CN109586923 A CN 109586923A
Authority
CN
China
Prior art keywords
password
certification
fingerprint
counter values
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811564925.3A
Other languages
Chinese (zh)
Inventor
罗诚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Purvar Big Data Technology Co Ltd
Original Assignee
Wuhan Purvar Big Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Purvar Big Data Technology Co Ltd filed Critical Wuhan Purvar Big Data Technology Co Ltd
Priority to CN201811564925.3A priority Critical patent/CN109586923A/en
Publication of CN109586923A publication Critical patent/CN109586923A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present invention provides a kind of single time password offline authentication method and device, belongs to encryption technology field.This method comprises: obtaining the password fingerprint and password of certification user's input;Finger print identifying is carried out to password fingerprint, if password fingerprint authenticates password, by certification if password passes through certification, it is determined that pass through final authentication.Method provided in an embodiment of the present invention carries out finger print identifying to password fingerprint by obtaining the password fingerprint and password of certification user's input, if password fingerprint authenticates password, by certification if password passes through certification, it is determined that pass through final authentication.Since a variety of high strength encrypting algorithms can be integrated, to not only solve the offline authentication problem of single time password, while the safety of key is improved.

Description

Single time password offline authentication method and device
Technical field
The present embodiments relate to encryption technology field more particularly to a kind of single time password offline authentication method and devices.
Background technique
The off-line verification of single time password generallys use HOTP (An HMAC-Based One-Time Password Algorithm, RFC4226) algorithm, the algorithm be based on a key, can effectively pass through a random natural number counter Generate one and effective password only verified to the natural number, in multiple independent systems that do not network, using HOTP algorithm and Identical key, password can natural number corresponding with its together, pass through proof of algorithm.Primary effectively verifying is completed in password Afterwards, by increasing the value of counter, to make the password fail, achieve the purpose that be able to validate only primary.Using the close of this algorithm Code authentication system is commonly used in the electronic key Verification System of not networked devices, for example the access control system that do not network, user pass through Electronic key delivery apparatus or system obtain the effective password of single according to the Counter Value shown in Verification System is needed, It can be by needing the certification of Verification System using this password, and fail after its effectively verifying once.
Due to using the Verification System of HOTP algorithm merely, because same key needs are existed simultaneously at least two or more In a system, it is possible to key leakage occur, once key is leaked or steals, will lead to Verification System failure, lose guarantor Shield.If restored, need to replace electronic key delivery system simultaneously, and need the key in Verification System.And recognized System, equipment or the facility of system protection are demonstrate,proved, due to being all off-line state, the possible short time can not discover Key Exposure, exist Security risk.
Summary of the invention
To solve the above-mentioned problems, the embodiment of the present invention provides one kind and overcomes the above problem or at least be partially solved State the single time password offline authentication method and device of problem.
According to a first aspect of the embodiments of the present invention, a kind of single time password offline authentication method is provided, comprising:
Obtain the password fingerprint and password of certification user's input;
Finger print identifying is carried out to password fingerprint, if password fingerprint authenticates password, by certification if password passes through Certification, it is determined that pass through final authentication.
Method provided in an embodiment of the present invention refers to password by obtaining the password fingerprint and password of certification user's input Line carries out finger print identifying, if password fingerprint authenticates password, by certification if password passes through certification, it is determined that pass through Final authentication.Since a variety of high strength encrypting algorithms can be integrated, to not only solve the offline authentication problem of single time password, together When improve the safety of key.
According to a second aspect of the embodiments of the present invention, a kind of single time password offline authentication device is provided, comprising:
First obtains module, for obtaining the password fingerprint and password of certification user's input;
Authentication module, for carrying out finger print identifying to password fingerprint, if password fingerprint recognizes password by certification Card, if password passes through certification, it is determined that pass through final authentication.
According to a third aspect of the embodiments of the present invention, a kind of electronic equipment is provided, comprising:
At least one processor;And
At least one processor being connect with processor communication, in which:
Memory is stored with the program instruction that can be executed by processor, and the instruction of processor caller is able to carry out first party Single time password offline authentication method provided by any possible implementation in the various possible implementations in face.
According to the fourth aspect of the invention, a kind of non-transient computer readable storage medium, non-transient computer are provided Readable storage medium storing program for executing stores computer instruction, and computer instruction makes the various possible implementations of computer execution first aspect In single time password offline authentication method provided by any possible implementation.
It should be understood that above general description and following detailed description be it is exemplary and explanatory, can not Limit the embodiment of the present invention.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of flow diagram of single time password offline authentication method provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of single time password offline authentication device provided in an embodiment of the present invention;
Fig. 3 is the block diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
The off-line verification of single time password generallys use HOTP (An HMAC-Based One-Time Password Algorithm, RFC4226) algorithm, the algorithm be based on a key, can effectively pass through a random natural number counter Generate one and effective password only verified to the natural number, in multiple independent systems that do not network, using HOTP algorithm and Identical key, password can natural number corresponding with its together, pass through proof of algorithm.Primary effectively verifying is completed in password Afterwards, by increasing the value of counter, to make the password fail, achieve the purpose that be able to validate only primary.Using the close of this algorithm Code authentication system is commonly used in the electronic key Verification System of not networked devices, for example the access control system that do not network, user pass through Electronic key delivery apparatus or system obtain the effective password of single according to the Counter Value shown in Verification System is needed, It can be by needing the certification of Verification System using this password, and fail after its effectively verifying once.
Due to using the Verification System of HOTP algorithm merely, because same key needs are existed simultaneously at least two or more In a system, it is possible to key leakage occur, once key is leaked or steals, will lead to Verification System failure, lose guarantor Shield.If restored, need to replace electronic key delivery system simultaneously, and need the key in Verification System.And recognized System, equipment or the facility of system protection are demonstrate,proved, due to being all off-line state, the possible short time can not discover Key Exposure, exist Security risk.
Based on above description, the embodiment of the invention provides a kind of single time password offline authentication methods.Referring to Fig. 1, the party Method includes:
101, the password fingerprint and password of certification user's input are obtained.
102, finger print identifying is carried out to password fingerprint, if password fingerprint authenticates password, by certification if password Pass through certification, it is determined that pass through final authentication.
Wherein, password fingerprint and password can be pre-generated by Verification System, be supplied to as authority needed for certification Authenticate user.If at least having one in password fingerprint and password not over certification, it is determined that not over final authentication.
Method provided in an embodiment of the present invention refers to password by obtaining the password fingerprint and password of certification user's input Line carries out finger print identifying, if password fingerprint authenticates password, by certification if password passes through certification, it is determined that pass through Final authentication.Since a variety of high strength encrypting algorithms can be integrated, to not only solve the offline authentication problem of single time password, together When improve the safety of key.
Content based on the above embodiment, as a kind of alternative embodiment, in the password fingerprint for obtaining certification user's input And before password, further includes: obtain the counter values of certification user's input;Based on HOTP algorithm to counter values at Reason, obtains password;It signs based on default signature algorithm and using core key pair password, obtains password fingerprint, and will be close Code and password fingerprint are supplied to certification user.
Wherein, core key is corresponding with unique public.Unique public can be provided by password delivery system.Password granting System may include core key, unique public, HOTP key and numerical value loader.Wherein, core key can be one 64 The password of position being made of letter and number.Unique public, which refers to, to be calculated by core key by secp256k1 elliptic curve cryptography 66 passwords being made of letter and number that method generates, the public key which generates have uniqueness, the same core key The public key of generation be it is identical, different core key will not generate identical public key.HOTP key refers to being led to by unique public 56 passwords of base32 algorithm generation are crossed, this password is made of capitalization and number 2-7 and equal sign, as HOTP algorithm Generate the key of password.And numerical value loader, it is the counter values for receiving certification user's input.
Content based on the above embodiment, as a kind of alternative embodiment, in the counter number for obtaining certification user's input Before value, further includes: generate counter values at random, and be supplied to certification user, the counting of counter values and history trendline Device numerical value does not repeat.
Content based on the above embodiment, as a kind of alternative embodiment, presetting signature algorithm is elliptic curve cipher number Word signature ECDSA algorithm.
Content based on the above embodiment carries out finger print identifying about to password fingerprint as a kind of alternative embodiment Mode, the present invention is not especially limit this, including but not limited to: according to unique public and ECDSA algorithm, to password Fingerprint carries out finger print identifying, and unique public is corresponding with core key.
Content based on the above embodiment, as a kind of alternative embodiment, about the mode authenticated to password, this hair Bright embodiment is not especially limited this, including but not limited to: according to counter values and HOTP algorithm, recognizing password Card.It should be noted that above-mentioned verification process can be realized by Verification System, Verification System may include unique public, HOTP Key and counter.Wherein, unique public refers to the public key generated by password delivery system by core key.HOTP is close Key refers to the password generated by unique public by base32 algorithm.Variable of the counter for generation natural number at random, and As counter values, which is provided to certification user.
Content based on the above embodiment is also wrapped after determining through final authentication as a kind of alternative embodiment It includes: regenerating counter values, and the counter values regenerated are supplied to certification user;Wherein, it regenerates Counter values and the counter values of history trendline do not repeat.
In conjunction with the content of above-described embodiment, the process of cipher authentication is specifically described now.Specifically, it is sent out in password In place system, certification user can will need the counter values shown in Verification System, be input in password delivery system, password Delivery system uses the numerical value and HOTP algorithm together, generates a password, such as to input 6 bit digitals that numerical value is 1 generation Password.Meanwhile being signed using the password that core key pair HOTP algorithm and count value generate using ECDSA algorithm, it generates The password fingerprint that one 142 bit length is made of numeral and letter is mentioned using password and password fingerprint as authority needed for certification Supply certification user.
Verification System first uses unique public after obtaining password and password fingerprint, using ECDSA algorithm to password and close The fingerprint of code is authenticated, if password fingerprint is obtained using the core key signature for generating unique public, can be led to Unique public is crossed to the finger print identifying of password, if password fingerprint is not that the unique public for being currently used in certification with generation is used Core private key signature obtain, then will not pass through finger print identifying.After completing finger print identifying, no matter succeeds or fail, certification Counter Value in system can remain unchanged.After finger print identifying success, Verification System is needed to fall into a trap using HOTP algorithm, and currently The value of number devices, authenticates password, if authenticated by certification eventually by cipher authentication system, and by counter Value changes into a unduplicated natural number.
If HOTP algorithm authentification failure prompts user's authentification failure, and keeps Counter Value constant.This was authenticated Cheng Zhong, it is necessary to first carry out finger print identifying and carry out HOTP algorithm verifying again.Verifying does not need networking and carries out, and HOTP algorithm certification is logical It crosses, just indicates eventually by certification.
Method provided in an embodiment of the present invention, as long as the core key as used in password delivery system is not leaked, Even if unique public and HOTP key are all leaked, attacker can not also obtain can by need Verification System authenticate authority.Though Right attacker can obtain password by HOTP key, but be not available unique public and obtain password fingerprint, and password fingerprint is only It can be obtained by core private key.In entire verification process, the password that HOTP algorithm provides has ensured that password can only be effective Verifying is primary, and can not need networking and carry out reliable offline authentication.Password fingerprint has ensured that the source of password is certification system The legitimate user of system, and the password for only allowing to obtain by legal mode, to improve the safety of Verification System.
Content based on the above embodiment, the embodiment of the invention also provides a kind of single time password offline authentication devices, should Device is for executing the single time password offline authentication method provided in above method embodiment.Referring to fig. 2, which includes: One obtains module 201 and authentication module 202;Wherein,
First obtains module 201, for obtaining the password fingerprint and password of certification user's input;
Authentication module 202, for password fingerprint carry out finger print identifying, if password fingerprint by certification, to password into Row certification, if password passes through certification, it is determined that pass through final authentication.
Content based on the above embodiment, as a kind of alternative embodiment, the device further include:
Second obtains module, for obtaining the counter values of certification user's input;
Processing module obtains password for handling based on HOTP algorithm counter values;
Signature blocks are obtained password and referred to for being signed based on default signature algorithm and using core key pair password Line, and password and password fingerprint are supplied to certification user.
Content based on the above embodiment, as a kind of alternative embodiment, the device further include:
Random generating module for generating counter values at random, and is supplied to certification user, counter values and history The counter values of generation do not repeat.
Content based on the above embodiment, as a kind of alternative embodiment, presetting signature algorithm is elliptic curve cipher number Word signature ECDSA algorithm.
Content based on the above embodiment, as a kind of alternative embodiment, authentication module 202, for according to unique public And ECDSA algorithm, finger print identifying is carried out to password fingerprint, unique public is corresponding with core key.
Content based on the above embodiment, as a kind of alternative embodiment, authentication module 202, for according to counter number Value and HOTP algorithm, authenticate password.
Content based on the above embodiment, as a kind of alternative embodiment, the device further include:
Module is regenerated, for regenerating counter values, and the counter values regenerated is supplied to and are recognized Demonstrate,prove user;Wherein, the counter values of the counter values and history trendline that regenerate do not repeat.
Device provided in an embodiment of the present invention refers to password by obtaining the password fingerprint and password of certification user's input Line carries out finger print identifying, if password fingerprint authenticates password, by certification if password passes through certification, it is determined that pass through Final authentication.Since a variety of high strength encrypting algorithms can be integrated, to not only solve the offline authentication problem of single time password, together When improve the safety of key.
Fig. 3 illustrates the entity structure schematic diagram of a kind of electronic equipment, as shown in figure 3, the electronic equipment may include: place Manage device (processor) 310, communication interface (Communications Interface) 320,330 He of memory (memory) Communication bus 340, wherein processor 310, communication interface 320, memory 330 complete mutual lead to by communication bus 340 Letter.Processor 310 can call the logical order in memory 330, to execute following method: obtain the close of certification user's input Code fingerprint and password;Finger print identifying is carried out to password fingerprint, if password fingerprint authenticates password, by certification if close Code passes through certification, it is determined that passes through final authentication.
In addition, the logical order in above-mentioned memory 330 can be realized by way of SFU software functional unit and conduct Independent product when selling or using, can store in a computer readable storage medium.Based on this understanding, originally Substantially the part of the part that contributes to existing technology or the technical solution can be in other words for the technical solution of invention The form of software product embodies, which is stored in a storage medium, including some instructions to So that a computer equipment (can be personal computer, electronic equipment or the network equipment etc.) executes each reality of the present invention Apply all or part of the steps of a method.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. it is various It can store the medium of program code.
The embodiment of the present invention also provides a kind of non-transient computer readable storage medium, is stored thereon with computer program, The computer program is implemented to carry out the various embodiments described above offer method when being executed by processor, for example, obtain certification The password fingerprint and password of user's input;To password fingerprint carry out finger print identifying, if password fingerprint by certification, to password into Row certification, if password passes through certification, it is determined that pass through final authentication.
The apparatus embodiments described above are merely exemplary, wherein described, unit can as illustrated by the separation member It is physically separated with being or may not be, component shown as a unit may or may not be physics list Member, it can it is in one place, or may be distributed over multiple network units.It can be selected according to the actual needs In some or all of the modules achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creativeness Labour in the case where, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation Method described in certain parts of example or embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of single time password offline authentication method characterized by comprising
Obtain the password fingerprint and password of certification user's input;
Finger print identifying is carried out to the password fingerprint, if the password fingerprint authenticates the password by certification, if The password passes through certification, it is determined that passes through final authentication.
2. the method according to claim 1, wherein the password fingerprint and password for obtaining certification user's input Before, further includes:
Obtain the counter values of the certification user input;
The counter values are handled based on HOTP algorithm, obtain the password;
It signs based on default signature algorithm and using password described in core key pair, obtains password fingerprint, and will be described close Code and the password fingerprint are supplied to the certification user.
3. according to the method described in claim 2, it is characterized in that, the counter values for obtaining the certification user input Before, further includes:
The counter values are generated at random, and are supplied to the certification user, the meter of the counter values and history trendline Number device numerical value does not repeat.
4. according to the method described in claim 2, it is characterized in that, the default signature algorithm is elliptic curve cipher number label Name ECDSA algorithm.
5. according to the method described in claim 4, it is characterized in that, described carry out finger print identifying to the password fingerprint, comprising:
According to unique public and the ECDSA algorithm, finger print identifying carried out to the password fingerprint, the unique public with it is described Core key is corresponding.
6. according to the method described in claim 5, it is characterized in that, described authenticate the password, comprising:
According to the counter values and the HOTP algorithm, the password is authenticated.
7. the method according to claim 1, wherein the determination passes through after final authentication, further includes:
The counter values are regenerated, and the counter values regenerated are supplied to the certification user;Wherein, weight The counter values of newly-generated counter values and history trendline do not repeat.
8. a kind of single time password offline authentication device characterized by comprising
First obtains module, for obtaining the password fingerprint and password of certification user's input;
Authentication module, for carrying out finger print identifying to the password fingerprint, if the password fingerprint passes through certification, to described close Code is authenticated, if the password passes through certification, it is determined that pass through final authentication.
9. a kind of electronic equipment characterized by comprising
At least one processor;And
At least one processor being connect with the processor communication, in which:
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to instruct energy Enough methods executed as described in claim 1 to 7 is any.
10. a kind of non-transient computer readable storage medium, which is characterized in that the non-transient computer readable storage medium is deposited Computer instruction is stored up, the computer instruction makes the computer execute the method as described in claim 1 to 7 is any.
CN201811564925.3A 2018-12-20 2018-12-20 Single time password offline authentication method and device Pending CN109586923A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811564925.3A CN109586923A (en) 2018-12-20 2018-12-20 Single time password offline authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811564925.3A CN109586923A (en) 2018-12-20 2018-12-20 Single time password offline authentication method and device

Publications (1)

Publication Number Publication Date
CN109586923A true CN109586923A (en) 2019-04-05

Family

ID=65930255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811564925.3A Pending CN109586923A (en) 2018-12-20 2018-12-20 Single time password offline authentication method and device

Country Status (1)

Country Link
CN (1) CN109586923A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101163014A (en) * 2007-11-30 2008-04-16 中国电信股份有限公司 Dynamic password identification authenticating system and method
CN101197667A (en) * 2007-12-26 2008-06-11 北京飞天诚信科技有限公司 Dynamic password authentication method
CN101674284A (en) * 2008-09-08 2010-03-17 联想(北京)有限公司 Authentication method and system, user side server and authentication server
US20120252414A1 (en) * 2011-03-30 2012-10-04 Buffalo Inc. Network device, server device, information processing device, and authentication method
CN103795724A (en) * 2014-02-07 2014-05-14 陈珂 Method for protecting account security based on asynchronous dynamic password technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101163014A (en) * 2007-11-30 2008-04-16 中国电信股份有限公司 Dynamic password identification authenticating system and method
CN101197667A (en) * 2007-12-26 2008-06-11 北京飞天诚信科技有限公司 Dynamic password authentication method
CN101674284A (en) * 2008-09-08 2010-03-17 联想(北京)有限公司 Authentication method and system, user side server and authentication server
US20120252414A1 (en) * 2011-03-30 2012-10-04 Buffalo Inc. Network device, server device, information processing device, and authentication method
CN103795724A (en) * 2014-02-07 2014-05-14 陈珂 Method for protecting account security based on asynchronous dynamic password technology

Similar Documents

Publication Publication Date Title
US10700861B2 (en) System and method for generating a recovery key and managing credentials using a smart blockchain contract
CN110569658B (en) User information processing method and device based on blockchain network, electronic equipment and storage medium
CN110401615B (en) Identity authentication method, device, equipment, system and readable storage medium
WO2020073513A1 (en) Blockchain-based user authentication method and terminal device
CN110348853B (en) Block chain off-line transaction method and system based on identification authentication
CN106452772B (en) Terminal authentication method and device
US9219602B2 (en) Method and system for securely computing a base point in direct anonymous attestation
CN111723387A (en) Block chain-based data decryption method and device
CN109088902B (en) Register method and device, authentication method and device
CN110099048A (en) A kind of cloud storage method and apparatus
CN109829294A (en) A kind of firmware validation method, system, server and electronic equipment
CN112953978B (en) Multi-signature authentication method, device, equipment and medium
CN108496323B (en) Certificate importing method and terminal
US11757659B2 (en) Post-quantum certificate binding
CN111737715A (en) Decentralized electronic contract online signing method and system
CN108011719A (en) A kind of endorsement method, device and digital signature system
WO2017006118A1 (en) Secure distributed encryption system and method
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN110266653A (en) A kind of method for authenticating, system and terminal device
CN109257381A (en) A kind of key management method, system and electronic equipment
CN108965315A (en) A kind of authentic authentication method of terminal device, device and terminal device
CN109766716A (en) A kind of anonymous bidirectional authentication method based on trust computing
CN110381114B (en) Interface request parameter processing method and device, terminal equipment and medium
CN116881936A (en) Trusted computing method and related equipment
CN109960949A (en) A kind of data storage verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190405