TW201004266A - System and method for protecting passwords of electronic accounts - Google Patents

System and method for protecting passwords of electronic accounts Download PDF

Info

Publication number
TW201004266A
TW201004266A TW97126340A TW97126340A TW201004266A TW 201004266 A TW201004266 A TW 201004266A TW 97126340 A TW97126340 A TW 97126340A TW 97126340 A TW97126340 A TW 97126340A TW 201004266 A TW201004266 A TW 201004266A
Authority
TW
Taiwan
Prior art keywords
password
time
module
time period
user
Prior art date
Application number
TW97126340A
Other languages
Chinese (zh)
Inventor
Hao Yan
Original Assignee
Hon Hai Prec Ind Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hon Hai Prec Ind Co Ltd filed Critical Hon Hai Prec Ind Co Ltd
Priority to TW97126340A priority Critical patent/TW201004266A/en
Publication of TW201004266A publication Critical patent/TW201004266A/en

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A system for protecting passwords of electronic accounts is provided. The system includes: a setting module, an encrypting module, a storing module, a receiving module, a time acquiring module, a matching module, and a prompting module. The setting module is configured for setting an electronic account name, and for setting a plurality of passwords corresponding to the electronic account name, wherein each of the passwords has a valid using time. The encrypting module is configured for encrypting the account name with each of the passwords and the corresponding valid using time, and generating a secret key for each of the passwords. The storing module is configured for storing the secret keys into a database. The receiving module is configured for receiving an electronic account name and a password inputted by a user. The time acquiring module is configured for acquiring a current system time, and computing the valid using time of the system time. The matching module is configured for encrypting the received electronic account name and the password, with the computed valid using time to generating a verifying secret key, and matching the verifying secret key with the secret keys stored in the database. The prompting module is configured for prompting that the user is unqualified if the verifying secret key is not identical with one of the secret keys stored in the database, or prompting that the user is qualified if the verifying secret key is identical with one of the secret keys stored in the database. A related method is also provided.

Description

201004266 九、發明說明: 【發明所屬之技術領域】 • 本發明涉及一種密碼保護系統及方法,尤其涉及一種 ▲ 基於時段的密碼保護系統及方法。 【先前技術】 在資訊化的時代,密碼被廣泛地用來驗證用戶身份。 當用戶需要個性化的服務時,為了保護用戶的個人權益及 隱私,需要在提供服務的系統中開設個人帳戶,獲得一個 唯一的帳號,並設定一個密碼。以後當用戶需要進入該系 統時,會被要求輸入帳號及密碼,而帳號及密碼正確是進 入該系統的充要條件。因此,帳號及密碼成為資訊時代的 通行證。 實際操作中,驗證帳號及密碼的過程全由電腦自動完 成。由於電腦是只認資料不認人,因此,若用戶的帳號及 密碼一旦被其他人盜取,其他人就能以真實用戶的身份進 入系統中,從而進行各類侵犯用戶利益的活動。由於帳號 在使用中是公開的,因此,密碼保護也就成了用戶保護自 己權益的重要手段。 通常,大多數用戶都沒有經常改變密碼的習慣。當用 戶使用密碼時總會留下現場痕跡而使密碼被盜取。如記錄 下用戶輸入密碼的全過程或者截留用戶的密碼資訊,就可 以破譯用戶密碼,從而冒充用戶登陸,對用戶的資訊安全 構成巨大威脅。 目前,各類金融卡、電信卡、服務消費卡、軟體、專 6 201004266 用儀器等以及網上的各類服務都大量使用帳號及密碼作為 用戶身份驗證的唯一手段,用戶密碼被盜取就意味著犯罪 分子可以肆意侵犯用戶的各種權利,使用戶蒙受巨大的損 失。目前因密碼被盜取而引發的案件正逐年大幅增加,已 成為一個嚴重的社會問題。因此可以看出,傳統的密碼保 護技術已受到嚴重的挑戰。 【發明内容】 鑒於以上内容,有必要提出一種密碼保護系統及方 法,其能夠更有效的保護用戶的帳號密碼,從而保證用戶 的資訊安全。 一種密碼保護系統,其運行於電腦中。該系統包括: 設置模組,用於設置一個資訊服務系統的帳號,以及將一 天分割成多個時段,並為每一個時段設置一個該帳號的密 碼;加密模組,用於採用加密演算法將設置的帳號、各個 時段及各個時段對應的密碼進行加密計算,以為每一個時 段生成一個對應的密鑰;存儲模組,用於將上述生成的密 鑰保存在一個分時密碼資料字典中;接收模組,用於接收 用戶輸入的帳號及密碼;時間獲取模組,用於獲取用戶輸 入帳號及密碼時的系統時間,並計算該系統時間所處的時 段;所述加密模組,還用於採用上述的加密演算法對用戶 輸入的帳號、密碼及計算出的時段進行加密運算以生成一 驗證密鑰;匹配模組,用於將該驗證密鑰與上述分時密碼 資料字典中保存的密鑰進行匹配操作;提示模組,用於當 上述驗證密鑰與分時密碼資料字典中保存的密鑰匹配不成 7 201004266 功時,提示用戶身份驗證失敗,並結束身份驗證程式;及 許可權授予模組,用於當上述驗證密鑰與分時密碼資料字 典中保存的密鑰匹配成功時,確認用戶的身份。 一種密碼保護方法,該方法包括:設置某一資訊服務 系統的帳號;根據實際情況將一天分割為多個時段,並為 每一個時段設置一個該帳號的密碼;採用加密演算法將上 述設置的帳號、各個時段及各個時段對應的密碼進行加密 計算,以為每一個時段生成一個對應的密鑰;將上述生成 的密鑰保存在一個分時密碼資料字典中;接收用戶輸入的 帳號及密碼;獲取用戶輸入帳號及密碼時的系統時間,並 計算該系統時間所處的時段;採用上述加密演算法對用戶 輸入的帳號、密碼及計算出的時段進行加密運算並生成一 個驗證密鑰;將該驗證密鑰與上述分時密碼資料字典中保 存的密鑰進行匹配操作;當上述驗證密鑰與分時密碼資料 字典中保存的密鑰匹配不成功時,提示用戶身份驗證失 敗;及當上述驗證密鑰與分時密碼資料字典中保存的密鑰 匹配成功時,確認用戶的身份。 相較於習知技術,本發明所提供之密碼保護系統及方法 將密碼與時間的概念相結合,建立分時密碼資料字典,實 現帳號的密碼與時間的匹配機制,從而保證用戶的資訊安 0 【實施方式】 如圖1所示,係本發明密碼保護系統較佳實施例的實 施環境圖。所述密碼保護系統10運行於電腦1中,用於透 8 201004266 過與時間的概念相結合來保護用戶的帳號密碼。所述的密 碼保護系統10包栝設置模組1〇〇、加密模組1〇1、判斷模 . 組102、存儲模組1〇3、接收模組104、時間獲取模組1〇5、 匹配模組106、提系模組107、以及許可權授予模組1〇8。 上述所稱的各個模組係完成某一特定功能的電腦移 式段,比程式更適合於描述軟體在電腦中的執行過#,因 此在本發明將軟麟择式的功能分別用各個模組來描述。 其中,所述的設置模纽100主要用於設置某一資訊脈 務系統的帳號。所述的資訊服務系統可以是各類金融卡、 電信卡、服務消費卡、軟體、專用儀器等,或者是網上的 各類資訊服務系統。 進一步地,所述的設置模組100還用於將一天分割成 多個時段,及為每/個時段設置一個該帳號的密碼。在0又 置密碼之前,用戶首先根據實際情況將一天分割為多個時 段,每個時間段 < 以包括1個小時、2個小時、3個小時、 I 4個小時、6個小時或者12個小時’其中所有時段的時間 總和等於24小時。在本實施例中’以每個時段包括6個小 時為例進行說明,所述的設置模組10〇可以將201004266 IX. Description of the Invention: [Technical Field] The present invention relates to a password protection system and method, and more particularly to a ▲ time-based password protection system and method. [Prior Art] In the age of informationization, passwords are widely used to authenticate users. When a user needs a personalized service, in order to protect the user's personal rights and privacy, it is necessary to open a personal account in the system providing the service, obtain a unique account number, and set a password. Later, when the user needs to enter the system, he or she will be required to enter an account number and password, and the correct account number and password are necessary and sufficient conditions for entering the system. Therefore, the account number and password become the passport of the information age. In actual operation, the process of verifying the account number and password is automatically completed by the computer. Since the computer only recognizes the information and does not recognize the person, if the user's account number and password are stolen by others, other people can enter the system as the real user, thereby performing various activities that infringe the interests of the user. Since the account number is publicly available, password protection has become an important means for users to protect their rights and interests. Often, most users don't have the habit of changing passwords often. When the user uses the password, there will always be traces of the scene and the password will be stolen. For example, if the user inputs the password or intercepts the user's password information, the user password can be deciphered, thereby impersonating the user to log in, posing a great threat to the user's information security. At present, all kinds of financial cards, telecom cards, service consumer cards, software, special 6 201004266 instruments, and various online services use a large number of accounts and passwords as the only means of user authentication. User passwords are stolen. Criminals can indiscriminately infringe on the rights of users and cause huge losses to users. At present, the number of cases caused by the theft of passwords is increasing year by year, which has become a serious social problem. Therefore, it can be seen that the traditional password protection technology has been seriously challenged. SUMMARY OF THE INVENTION In view of the above, it is necessary to provide a password protection system and method, which can more effectively protect a user's account password, thereby ensuring user information security. A password protection system that runs on a computer. The system includes: a setting module for setting an account of an information service system, dividing the day into a plurality of time periods, and setting a password for the account for each time period; and an encryption module for using an encryption algorithm The set account, each time period, and the password corresponding to each time period are encrypted and calculated to generate a corresponding key for each time period; the storage module is configured to save the generated key in a time-sharing password data dictionary; The module is configured to receive an account and a password input by the user; the time acquisition module is configured to obtain a system time when the user inputs the account and the password, and calculate a time period in which the system time is; the encryption module is further used for The encryption algorithm is used to encrypt the account, the password and the calculated time period input by the user to generate a verification key; the matching module is configured to store the verification key and the secret stored in the time-sharing password data dictionary. The key performs a matching operation; the prompting module is configured to match the key stored in the verification key and the time-sharing password data dictionary Not 7 201004266, prompting the user to fail authentication and ending the authentication program; and the permission granting module, for confirming the user when the matching key stored in the verification key and the time-sharing password data dictionary is successfully matched Identity. A password protection method, the method comprises: setting an account of an information service system; dividing the day into a plurality of time periods according to actual conditions, and setting a password of the account for each time period; using the encryption algorithm to set the account set by using the encryption algorithm The password corresponding to each time period and each time period is encrypted, so as to generate a corresponding key for each time period; the generated key is stored in a time-sharing password data dictionary; the user input account and password are received; and the user is obtained. Enter the system time of the account and password, and calculate the time period of the system time; use the above encryption algorithm to encrypt the account, password and calculated time period input by the user and generate a verification key; The key is matched with the key stored in the time-sharing password data dictionary; when the verification key is not successfully matched with the key stored in the time-sharing password data dictionary, the user authentication failure is prompted; and when the verification key is used When the key stored in the time-sharing password data dictionary matches successfully, Identify the identity of the user. Compared with the prior art, the password protection system and method provided by the present invention combines the concept of password and time to establish a time-sharing password dictionary to realize the matching mechanism of the password and time of the account, thereby ensuring the user's information security. [Embodiment] FIG. 1 is a diagram showing an implementation environment of a preferred embodiment of the password protection system of the present invention. The password protection system 10 runs in the computer 1 and is used to protect the user's account password by combining the concept of time with 201004266. The password protection system 10 includes a setting module 1〇〇, an encryption module 1〇1, a determination module, a group 102, a storage module 1〇3, a receiving module 104, a time acquisition module 1〇5, and a matching The module 106, the lifting module 107, and the permission grant module 1〇8. Each of the above-mentioned modules is a computer shifting section that performs a specific function, and is more suitable for describing the execution of the software in the computer than the program. Therefore, in the present invention, the functions of the soft lining type are respectively used for each module. To describe. The setting module 100 is mainly used to set an account of a certain information processing system. The information service system may be various types of financial cards, telecommunication cards, service consumption cards, software, special instruments, etc., or various types of information service systems on the Internet. Further, the setting module 100 is further configured to divide the day into a plurality of time periods, and set a password of the account for each time period. Before the password is set to 0, the user first divides the day into multiple time periods according to the actual situation, and each time period < includes 1 hour, 2 hours, 3 hours, I 4 hours, 6 hours or 12 The sum of the hours of all hours is equal to 24 hours. In the present embodiment, the description is made by taking 6 hours per time period as an example, and the setting module 10〇 can be

0:01AM〜6:00AM設置為第一時段’將6:〇lAM〜12:00AM 設置為第二時段’將12:01PM〜18:00PM設置為第三時段’ 以及將18:01PM〜24:00PM設置為第四時段。其中,設置的 密碼的個數與時段的個數相等同。其次’用戶將設置的各 個密碼與各個時段相對應。 所述加密模組101主要用於採用加後决鼻法將設置的 9 201004266 帳號、各個時段及各個時段對應的密碼進行加密計算,從 而為每一個時段生成一個對應的密鑰。 所述判斷模組102主要用於判斷是否所有的密鑰都已 經生成完畢。其中,密鑰的個數取決於分割的時段個數, 例如,如果將一天分割成四個時段,則會生成四個密鑰分 別對應於四個時段。 所述存儲模組103主要用於將上述生成的各個密鑰保 存在一個分時密碼資料字典中。該分時密碼資料字典可以 存儲在電腦1外部的一個資料庫(未圖示)中,也可以存 儲在該電腦1内部的硬碟等存儲單元中。 所述接收模組104主要用於接收用戶輸入的帳號及密 碼。 所述時間獲取模組105主要用於獲取用戶輸入帳號及 密碼時的系統時間,並計算該系統時間所處的時段。例如, 若用戶輸入帳號及密碼的時間為17:30,則根據設置的 0:01AM〜6:00AM 為第一時段,6:01AM〜12:00AM 為第二時 段,12:01PM~18:00PM 為第三時段,以及將 18:01PM〜24:00PM為第四時段可以得知,該系統時間處於 第三個時段。 進一步地,所述的加密模組101還用於採用上述的加 密演算法對上述用戶輸入的帳號、密碼及計算出的時段進 行加密運算以生成一驗證密鑰。 所述匹配模組106主要用於將上述驗證密鑰與上述分 時密碼資料字典中保存的密鑰進行匹配操作。 10 201004266 所述提示模組107主要用於當上述驗證密鑰與分時密 碼資料字典中保存的密鑰匹配不成功時’提示用戶身份驗 證失敗,並結束身份驗證程式,從而阻止該用戶進入該資 訊服務系統。 所述許可權授予模組108主要用於當上述驗證密鑰與 分時密碼資料字典中保存的密鑰匹配成功時’確認用戶的 身份,允許該用戶進入該資訊服務系統中,並授予該用戶 對應的操作許可權。 參閱圖3所示,係本發明密碼保護方法較佳實施例的 流程圖。 步驟Sioo,用戶透過設置模組100設置某一資訊服務 系統的帳號。所迷的資訊服務系統可以是各類金融卡、電 k卡、服務消費卡、軟體、專用儀器等,或者是網上的各 類服務。0:01AM~6:00AM is set to the first time period 'Set 6:〇lAM~12:00AM to the second time period', set 12:01PM~18:00PM to the third time period' and 18:01PM~24: 00PM is set to the fourth time period. Among them, the number of passwords set is equal to the number of time slots. Secondly, each password set by the user corresponds to each time slot. The encryption module 101 is mainly used for encrypting and setting the passwords of the 9 201004266 account, the respective time periods and the respective time periods, and then generating a corresponding key for each time period. The determining module 102 is mainly used to determine whether all the keys have been generated. The number of keys depends on the number of divided time periods. For example, if the day is divided into four time periods, four keys are generated corresponding to four time periods. The storage module 103 is mainly configured to save each generated key in a time-sharing password dictionary. The time-sharing password data dictionary may be stored in a database (not shown) external to the computer 1, or may be stored in a storage unit such as a hard disk inside the computer 1. The receiving module 104 is mainly configured to receive an account and a password input by a user. The time acquisition module 105 is mainly used to obtain the system time when the user inputs the account number and the password, and calculates the time period in which the system time is located. For example, if the user enters the account and password at 17:30, the first time period is 0:01AM~6:00AM, and the second time is 6:01AM~12:00AM, 12:01PM~18:00PM. For the third time period, and the 18:01 PM~24:00 PM is the fourth time period, it can be known that the system time is in the third time period. Further, the encryption module 101 is further configured to perform an encryption operation on the account, the password, and the calculated time period input by the user by using the encryption algorithm to generate a verification key. The matching module 106 is mainly configured to perform the matching operation between the verification key and the key stored in the time-sharing password data dictionary. 10 201004266 The prompt module 107 is mainly used to prompt the user identity verification failure when the verification key and the key stored in the time-sharing password data dictionary are unsuccessful, and end the authentication program, thereby preventing the user from entering the Information service system. The permission grant module 108 is mainly used to confirm the identity of the user when the verification key and the key stored in the time-sharing password dictionary are successfully matched, allow the user to enter the information service system, and grant the user Corresponding operating permission. Referring to Figure 3, there is shown a flow chart of a preferred embodiment of the cryptographic protection method of the present invention. In the step Sioo, the user sets the account of a certain information service system through the setting module 100. The information service system can be various types of financial cards, electric k-cards, service consumption cards, software, special instruments, etc., or various types of services on the Internet.

。步驟Sl01’用戶首先根據實際情況將一天分割成多個 時 幻如’將一天分割成0:01AM〜6:00AM為第一時段, 二為第二時段,12:01PM〜18:00PM為第三 時段、’以及18:01Pm〜24:00PM為第四時段;其次,用戶透 過上述的叹置模組40為每一個時段設置一個該帳號的密 碼0 步驟S1 1 〇 加密模組101採用加密演算法將設置的帳 ^ 固夺^及各個時段對應的密碼進行加密計算,從而 為母個段生成一個對應的密鑰。 步驟S]ψ 判斷模組102判斷是否所有的密鑰都已經 11 201004266 生成完畢。其中,密錄的個數取決於分割的時段的個數, 例如,如果將一天分割成四個時段,則會生成四個密錄分 別對應於該四個時段。 若還有密鑰沒有生成完畢,則返回步驟S102。 否則,若所有的密鑰都已經生成完畢,則步驟S104, 存儲模組103將上述生成的各個密鑰保存在一個分時密碼 資料字典中。 步驟S105,接收模組104接收用戶輸入的帳號及密碼。 步驟S106,時間獲取模組105獲取用戶輸入帳號及密 碼時的系統時間,並計算該系統時間所處的時段。例如, 若用戶輸入帳號及密碼的系統時間為17:30,則根據設置 的 0:01AM〜6:00AM 為第一時段,6:01AM〜12..00AM 為第 二時段,12:01PM〜18:00PM為第三時段,以及將 18:01PM~24:00PM為第四時段可以得知,該系統時間處於 第三個時段。 步驟S107,加密模組101採用上述的加密演算法對上 述用戶輸入的帳號、密碼及計算出的時段進行加密運算並 生成一個驗證密鑰。 步驟S108,匹配模組106將該驗證密鑰與上述分時密 碼資料字典中保存的密鑰進行匹配操作。 步驟S109,判斷模組102判斷上述驗證密鑰與分時密 碼資料字典中保存的密鑰是否匹配成功。 若上述驗證密鑰與分時密碼資料字典中保存的密鑰 匹配不成功,則步驟S110,提示模組107提示用戶身份驗 12 201004266 證失敗’並結束身份驗證程式,從而阻止該用戶進入該資 訊服務系統。 若上述驗證密鑰與分時密碼資料字典中保存的密鑰 匹配成功,則步驟Sill,許可權授予模組108確認用戶的 身份’允許該用戶進入該資訊服務系統中,並授予該用戶 對應的操作許可權。 以上所述僅為本發明之較佳實施例而已,且已達廣泛 之使用功效,凡其他未脫離本發明所揭示之精神下所完成 之均等變化或修飾,均應包含在下述之申請專利範圍内。 【圖式簡單說明】 圖1係本發明密碼保護系統較佳實施例的實施環境 圖。 圖2係本發明密碼保護方法較佳實施例的流程圖。 【主要元件符號說明】 1 10 100 101 102 103 104 105 106 107 電腦 密碼保護系統 設置模組 加密模組 判斷模組 存儲模I且 接收模組 時間獲取模組 匹配模組 提示模組 13 201004266 108 許可權授予模組 14. Step S101 'The user first divides the day into multiples according to the actual situation. The illusion is 'divide the day into 0:01AM~6:00AM for the first time period, two for the second time period, and 12:01PM~18:00PM for the third time. The time period, 'and 18:01 Pm~24:00 PM is the fourth time period; secondly, the user sets a password for the account number for each time period through the above-mentioned sigh module 40. Step S1 1 〇 The encryption module 101 adopts an encryption algorithm. The set account and the password corresponding to each time period are encrypted and calculated, thereby generating a corresponding key for the parent segment. Step S] 判断 The judgment module 102 determines whether all the keys have been generated by 201004266. The number of the ciphers depends on the number of divided periods. For example, if the day is divided into four periods, four ciphers are generated corresponding to the four periods. If the key has not been generated yet, the process returns to step S102. Otherwise, if all the keys have been generated, in step S104, the storage module 103 saves the generated keys in a time-sharing password data dictionary. In step S105, the receiving module 104 receives the account and password input by the user. In step S106, the time acquisition module 105 acquires the system time when the user inputs the account number and the password, and calculates the time period in which the system time is located. For example, if the system time for entering the account and password is 17:30, the first time period is 0:01AM~6:00AM, and 6:01AM~12..00AM is the second time period, 12:01PM~18 : 00PM is the third time period, and 18:01PM~24:00PM is the fourth time period, and the system time is in the third time period. In step S107, the encryption module 101 performs an encryption operation on the account, the password, and the calculated time period input by the user by using the encryption algorithm described above, and generates a verification key. In step S108, the matching module 106 performs a matching operation on the verification key and the key stored in the time-sharing password data dictionary. In step S109, the determining module 102 determines whether the key stored in the verification key and the time-sharing password data dictionary is successfully matched. If the matching of the verification key and the key stored in the time-sharing password data dictionary is unsuccessful, then in step S110, the prompting module 107 prompts the user identity 12 201004266 to fail the certificate and ends the authentication program, thereby preventing the user from entering the information. service system. If the verification key is successfully matched with the key stored in the time-sharing password data dictionary, then in step Sill, the permission grant module 108 confirms the identity of the user 'allowing the user to enter the information service system, and granting the user the corresponding Operational permission. The above is only the preferred embodiment of the present invention, and has been used in a wide range of applications. Any other equivalent changes or modifications which are not departing from the spirit of the present invention should be included in the following claims. Inside. BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is a diagram showing an implementation environment of a preferred embodiment of the cryptographic protection system of the present invention. 2 is a flow chart of a preferred embodiment of the cryptographic protection method of the present invention. [Main component symbol description] 1 10 100 101 102 103 104 105 106 107 Computer password protection system setting module encryption module judgment module storage module I and receiving module time acquisition module matching module prompt module 13 201004266 108 Right grant module 14

Claims (1)

201004266 十、申請專利範圍 1 π種㈣保護系統,運行於電腦巾,該系統包括: 又3、且’用於設置一個資訊服務系統的帳號,以及將- •成夕個時段,並為每一個時段設置一個該帳號的密 碼, 加密模組,用於採用加密演算法將設置的帳號、各個時段 及各個時段對應的密碼進行加密計算,以為每—個時 成一個對應的密鑰; 料用於將上述生成的密鑰保存在一個分時密碼資 接收板組’用於接收用戶輸入的帳號及密碼; =間獲取模組,驗獲取好輸人帳號及密碼時的系統時 間,並計算該系統時間所處的時段; 所述加密模組,還用於採用上述的加密演算法對用戶輸入 的帳號、密碼及計算出的時段進行加密運算以 密鑰; 兄 匹配模組,用於將該驗證密輪與上述分時密碼資料字典中 保存的密鑰進行匹配操作; 提示模組,用於當上述驗證密鑰與分時密碼資料字典中保 存的密鑰匹配不成功時,提示用戶身份驗證失敗,並結束 身份驗證程式;及. 柯權授予模組,用於當上述驗證密输與分時密碼資料字 典中保存的密鍮匹配成功時,確認用戶的身份。 2·如申請專利範圍帛1項所述之密碼保護系統,其中,所 15 201004266 述資訊服務系統為金融卡、電信卡、服務消費卡、軟體、 專用儀器,或者網上的各種資訊服務系統。 - 3 ·如申請專利範圍第1項所述之密碼保護系統,其中所有 - 時段的時間總和等於24小時。 ' 4 · 一種密碼保護方法,包括: 設置某一資訊服務系統的帳號; 根據實際情況將一天分割為多個時段,並為每一個時段設 置一個該帳號的密碼; 採用加密演算法將上述設置的帳號、各個時段及各個時段 對應的密碼進行加密計算,以為每一個時段生成一個對應 的密鑰; 將上述生成的密鑰保存在一個分時密碼資料字典中; 接收用戶輸入的帳號及密碼; 獲取用戶輸入帳號及密碼時的系統時間,並計算該系統時 間所處的時段; C 採用上述的加密演算法對上述用戶輸入的帳號、密碼及計 算出的時段進行加密運算並生成一個驗證密鑰; 將該驗證密鑰與上述分時密碼資料字典中保存的密鑰進 行匹配操作; 當上述驗證密鑰與分時密碼資料字典中保存的密鑰匹配 不成功時,提示用戶身份驗證失敗;及 當上述驗證密鑰與分時密碼資料字典中保存的密鑰匹配 成功時,確認用戶的身份。 5 ·如申請專利範圍第4項所述之密碼保護方法,其中,於 16 201004266 步驟採用加密演算法將帳號、時段及時段對應的密碼進行 加密計算,生成對應的密鑰之後,還包括: * 判斷是否所有的密鑰都已經生成完畢。 ~ 6 ·如申請專利範圍第4項所述之密碼保護方法,其中,所 述的資訊服務系統為金融卡、電信卡、服務消費卡、軟體、 專用儀器,或者網上的各種資訊服務系統。 7 ·如申請專利範圍第4項所述之密碼保護方法,其中所有 時段的時間總和等於24小時。 17201004266 X. Patent application scope 1 π species (four) protection system, running on computer towel, the system includes: 3, and 'used to set up an information service system account, and will be - • a time period, and for each The password of the account is set in the time period, and the encryption module is used for encrypting the set account, each time period and the password corresponding to each time period by using an encryption algorithm, so as to form a corresponding key for each time; The above generated key is stored in a time-sharing cryptographic receiving board group 'for receiving the user-entered account number and password; = obtaining module, checking the system time when the input account and password are obtained, and calculating the system The time period in which the time is located; the encryption module is further configured to perform encryption operation on the account, the password, and the calculated time period input by the user by using the above encryption algorithm; the brother matching module is used for the verification The secret wheel performs a matching operation with the key stored in the time-sharing password data dictionary; the prompting module is used for the above-mentioned verification key and time-sharing password When the key matching in the data dictionary is unsuccessful, the user authentication failure is prompted, and the authentication program is terminated; and the credit granting module is used to save the password in the above-mentioned verification secret and time-sharing password data dictionary. When the match is successful, confirm the identity of the user. 2. The password protection system described in the scope of patent application ,1, wherein the information service system is a financial card, a telecommunication card, a service consumer card, a software, a special instrument, or a variety of information service systems on the Internet. - 3 · The password protection system described in claim 1 of the patent application, wherein the sum of all - time periods is equal to 24 hours. ' 4 · A password protection method, comprising: setting an account of an information service system; dividing the day into a plurality of time slots according to actual conditions, and setting a password for the account for each time period; using the encryption algorithm to set the above The password corresponding to the account number, each time period, and each time period is encrypted, so as to generate a corresponding key for each time period; the generated key is stored in a time-sharing password data dictionary; the user input account and password are received; The system time when the user inputs the account number and password, and calculates the time period in which the system time is; C uses the above encryption algorithm to encrypt the account, password and calculated time period input by the user and generate a verification key; Matching the verification key with the key stored in the time-sharing password data dictionary; when the verification key and the key stored in the time-sharing password data dictionary are unsuccessful, the user authentication failure is prompted; The above-mentioned verification key and the secret stored in the time-sharing password data dictionary When the match is successful, confirm the user's identity. 5. The password protection method according to item 4 of the patent application scope, wherein the encryption algorithm is used to encrypt the password corresponding to the account number, the time period and the time period in the step of 2010 201026, and after generating the corresponding key, the method further includes: Determine if all the keys have been generated. The password protection method described in claim 4, wherein the information service system is a financial card, a telecommunication card, a service consumption card, a software, a special instrument, or a variety of information service systems on the Internet. 7. The method of password protection as described in claim 4, wherein the sum of time in all time periods is equal to 24 hours. 17
TW97126340A 2008-07-11 2008-07-11 System and method for protecting passwords of electronic accounts TW201004266A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97126340A TW201004266A (en) 2008-07-11 2008-07-11 System and method for protecting passwords of electronic accounts

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97126340A TW201004266A (en) 2008-07-11 2008-07-11 System and method for protecting passwords of electronic accounts

Publications (1)

Publication Number Publication Date
TW201004266A true TW201004266A (en) 2010-01-16

Family

ID=44825813

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97126340A TW201004266A (en) 2008-07-11 2008-07-11 System and method for protecting passwords of electronic accounts

Country Status (1)

Country Link
TW (1) TW201004266A (en)

Similar Documents

Publication Publication Date Title
US9124433B2 (en) Remote authentication and transaction signatures
US9288044B2 (en) Method for providing cryptographic key pairs
US8667285B2 (en) Remote authentication and transaction signatures
US7930554B2 (en) Remote authentication and transaction signatures
Anakath et al. Privacy preserving multi factor authentication using trust management
Li et al. Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
US8627424B1 (en) Device bound OTP generation
Idrus et al. A review on authentication methods
WO2020073513A1 (en) Blockchain-based user authentication method and terminal device
US10848304B2 (en) Public-private key pair protected password manager
KR20070024633A (en) Renewable and private biometrics
Cresitello-Dittmar Application of the blockchain for authentication and verification of identity
CN109067766A (en) A kind of identity identifying method, server end and client
Cheng et al. Identity based encryption and biometric authentication scheme for secure data access in cloud computing
WO2021249527A1 (en) Method and apparatus for implementing motopay, and electronic device
WO2022042745A1 (en) Key management method and apparatus
Papaioannou et al. User authentication and authorization for next generation mobile passenger ID devices for land and sea border control
Nath et al. Issues and challenges in two factor authentication algorithms
Pandya et al. An overview of various authentication methods and protocols
Reece et al. Self-Sovereign Identity in a World of Authentication: Architecture and Domain Usecases
Rong et al. A secure data access mechanism for cloud tenants
Bhargav-Spantzel TRUSTED EXECUTION ENVIRONMENT FOR PRIVACY PRESERVING BIOMETRIC AUTHENTICATION.
Hasan et al. Interaction provenance model for unified authentication factors in service oriented computing
TW201004266A (en) System and method for protecting passwords of electronic accounts
US10491391B1 (en) Feedback-based data security