[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN1622508A - One-time password table based one-time password generation and authentication system and method - Google Patents

One-time password table based one-time password generation and authentication system and method Download PDF

Info

Publication number
CN1622508A
CN1622508A CN 200410098462 CN200410098462A CN1622508A CN 1622508 A CN1622508 A CN 1622508A CN 200410098462 CN200410098462 CN 200410098462 CN 200410098462 A CN200410098462 A CN 200410098462A CN 1622508 A CN1622508 A CN 1622508A
Authority
CN
China
Prior art keywords
password
effective code
user
password table
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 200410098462
Other languages
Chinese (zh)
Inventor
刘云清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN 200410098462 priority Critical patent/CN1622508A/en
Publication of CN1622508A publication Critical patent/CN1622508A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention is dynamic cipher creating and confirming system and method based on dynamic cipher list. Principally, one dynamic cipher list comprising random number is created in a cipher creator, bounded to corresponding account and provided to the user in paper or electronically, and the initial effective cipher position is appointed orally or via communication. The effective cipher is used for only one time, the ciphers in the cipher list are used circularly, and effective cipher may be corrected and the cipher list may be replaced in all time. The present invention also includes static cipher. The key of the dynamic cipher is 'change'. The present invention is safe, reliable, low in cost and suitable for electronic trade, electronic paying and inside cipher confirming system.

Description

Dynamic password generation and Verification System and method based on time password table
Technical field
The present invention is a kind of dynamic password generation and Verification System and method based on time password table, the password that can be widely used in the aspects such as securities trading, E-Payment, shopping online of securities business, financial circles and e-commerce field generates and Verification System, also can be used for intramural cipher authentication system.
Background technology
At present, identity identifying method in the electronic network system adopts the account to add the method for static password more, the user is when using this system, account and password are revealed easily or are stolen, when especially on electric network, using, the easier computer technology means such as wooden horse of being used by other people are intercepted and captured, thereby may bring loss to the user.The system that also has adopts the authentication method of non-other dynamic password of the present invention, and as with time being the method that radix produces dynamic password, these class methods need special-purpose hardware device, expense costliness; User side needs special equipment to produce password, and the clock of equipment is synchronous with the equipment clock of service end, and the time error of equipment can directly influence the authentication of password; Equipment also damages easily or loses, if the equipment loss is because the password of current demonstration is exactly a valid password on the equipment, very dangerous; If necessary fee not only will take place in exchange device more, generally to get in person, very inconvenient.These shortcomings have caused this type systematic expense height, and fail safe is low, and is difficult in maintenance, are difficult for promoting.The cipher authentication system is badly in need of low, safe, the easy realization of expense resemble the present invention, the good cipher authentication system of promoting, safeguarding well.
Summary of the invention
The objective of the invention is: remedy the lower deficiency of static password Verification System fail safe that extensively adopts at present, shortcomings such as the safety that overcomes other dynamic cipher system is not high, expense is expensive, difficult popularization, difficult maintenance.
The present invention thes contents are as follows: a kind of dynamic password generation and Verification System and method based on time password table, it is characterized in that utilizing time password table and use certain rule dynamically to produce different valid passwords that it comprises, and time password table (hereinafter to be referred as the password table), current effective dynamic password (hereinafter to be referred as effective code), effective code calibration, effective code are calculated, time password table maker, cipher authentication system and the user side's of service square end user terminal.The present invention realizes by following three steps:
1, the generation of time password table: according to different users, service side utilizes the time password table maker to produce a time password table of being made up of random number (being designated hereinafter simply as the password table) respectively, and this password table is tied on the user account of correspondence, the number of password can be as required determined arbitrarily in the figure place of password and the password table, can be 1 to infinitely great in theory.The number of password is big more in the figure place of password and the password table, and cipher authentication is safe more.Password can be made up of the character that any computers such as numeral and letter can be discerned.The password table can print on the paper, or saves as the form of e-file.The user can get the password table face to face, also can pass through forms such as mail, Email or SMS and obtain.The password table can be changed at any time according to service side and user's needs.The time password table maker can be that program design language calls the turn the function that generates random number, also can work out function voluntarily and realize.The password table also can generate and submit to service side by user oneself.
2, effective code calibration and effective code are calculated: after the user obtains the password table, service can be to arrange the position of initial effective code in the password table by modes such as oral, phone, SMS and user, be which password is initial effective code in the password table, this is that effective code is calibrated first.The user is when the login service method, system, effective code can only be used once, effective code will become the password of the next position of current effective code position in the password table when login next time, as current effective code position be in the password table last the time, next effective code becomes first sign indicating number in the table, promptly end to end the keying sequence in the password table, recycle.When the user forgets the position of effective code, can reappoint the position of current effective code by various communication modes and service side, promptly effective code is recalibrated.
3, password authentification: except providing the dynamic password, also provide static password in the native system for the user.The user should import user account, static password when login, also will import dynamic password (being effective code), has only when account, static password and effective code all pass through checking, assert that just the user is legal, allows its login system.For the disabled user who obtains the password table, do not know effective code in table the position or when not knowing the account or not knowing static password, can't login system; Simultaneously, can also and increase extra-code technology such as (or claiming check code) in conjunction with wrong input locking account repeatedly and prevent that landing of the unknown carried out exhaustive illegally scans exploration.
The present invention has the following advantages:
1, the present invention has grasped the marrow of dynamic password " change ": utilize the password in the time password table to recycle by rule, promptly change after making dynamic password use once.
2, safe: for the system that uses user side dynamic password generator apparatus, in case generator is lost, the current password that shows on the generator is exactly a valid password; And for the present invention, the illegal user who obtains other people password table when not knowing the position of effective code in the password table, still can't know effective password, and the user can apply for changing the password table at any time and not need expense, and the number of password can be determined very greatly as required in the password table.
2, expense is extremely low: realization of the present invention does not need special-purpose hardware device, and user side only needs a piece of paper or electronic document, and the service method, system only needs the very change of simple software aspect.
3, principle is simple, realizes easily, is easy to be accepted by the ordinary people, the good popularization.
4, be convenient to safeguard: the user can get the password table face to face, also can obtain the password table or carry out the effective code calibration by means of communication, has adapted to the virtual characteristics of electric network well.
Description of drawings
Fig. 1 is based on the dynamic password generation of time password table and the general structure diagram of system of Verification System
Fig. 2 is based on the dynamic password generation of time password table and the basic principle flow chart of authentication method
Embodiment
For understanding technical scheme of the present invention better, be further described below in conjunction with accompanying drawing and concrete realization.
As shown in Figure 1, service side at first increases time password table systematic function, effective code calibration function, dynamic password verification function, effective code reckoning function in system, then, revise the login interface of user side, increases the dynamic password input field.
Provide the implementation method that wherein can embody function of the present invention with the mark program language below:
If: L is the number of wishing the contained password of time password table, and promptly table is long; P is an array of depositing time password table, and its length 〉=L, the order of elements number of array are that subscript identifies from 0 to L-1; I is the initial position of effective code, 0≤I<L; N is the step-length that effective code moves, 1<=N<L; Wherein: L, I, N are integers.So
The following realization of time password table systematic function:
If t is a temporary variable; T=0; ZWHILE t<L DO BEGIN
P[t]=call and produce a random code function;
T=t+1; END; The following realization of effective code calibration function: establishing C is the position of the effective code of service side and user's agreement, the i.e. ordinal number of effective code in time password table; IF C<0 OR C 〉=L THEN BEGIN
The position of report agreement is beyond the boundary;
Withdraw from service; END; ELSE I=C; Dynamic password verification and effective code are calculated the following realization of function: establish PO and be the dynamic password that provides when the client logins; IF PO=P[I] THEN/* judges PO and intrasystem effective code P[I] identical */BEGIN whether
I=I+N; The position * of/* reckoning effective code/
IF I 〉=L THEN I=I-L; / * such as effective code position exceed the password table, then then from the code table head calculate */
Send the information that password authentification is passed through;
ENDELSE
Send the unsanctioned information of password authentification;

Claims (3)

1, a kind of dynamic password generation and Verification System and method based on time password table, it is characterized in that: utilize time password table and use certain rule dynamically to produce different valid passwords, it comprises, and time password table, current effective dynamic password (being designated hereinafter simply as effective code), effective code calibration, effective code are calculated, time password table maker, the Verification System of dynamic password and user side's the user terminal of service square end.
2, a kind of generation of dynamic password and authentication method is characterized in that:
(1) time password table generates: the time password table maker produces a time password table of being made up of random number (being designated hereinafter simply as the password table) respectively according to different users, and this password table is tied on the corresponding user account.The number of password can be determined arbitrarily as required in the figure place of password and the password table.Password can be made up of the character that any computers such as numeral and letter can be discerned.The password table can print on the paper, or saves as the form of e-file.The user can get the password table face to face, also can obtain by forms such as Email or SMSs.
(2) effective code calibration and effective code reckoning: after the user obtained the password table, service can be to arrange the position of the initial effective code in the password table by mode such as oral, letter, phone, note and user, and promptly which password is initial effective code in the password table.When the user forgets the position of effective code, can reappoint the position of effective code by various communication modes and service side, i.e. effective code calibration.During the user login services method, system, effective code can only be used once, effective code will become the Next Password of current effective code position in the password table when login next time, when the position of effective code be the password table last the time, next effective code becomes first sign indicating number in the password table, promptly end to end the keying sequence in the password table, recycle.Perhaps calculate next effective code as follows: end to end the keying sequence in the password table, form cipher ring; If the length of password table is L, promptly in the table L password arranged; If N is greater than 0 integer less than L, so after the user successfully logins once, during the next time login effective code be this use in the password table the effective code position backward or several forward N password, N promptly is the step-length that effective code moves.
(3) cipher authentication: the user has account and the static password corresponding with the account in the service method, system, the user will import user account, static password and dynamic effective code simultaneously when login, have only when account, static password and effective code all pass through checking, assert that just the user is legal, allows its login system.
3, a kind of generation of dynamic password and authentication method, it is characterized in that: utilize the password in the time password table described in claim 2 to calculate the current effective dynamic password, and use the certain calculation rule to calculate the password position that is used to calculate valid password when next time logining through the certain calculation rule.
CN 200410098462 2004-12-13 2004-12-13 One-time password table based one-time password generation and authentication system and method Pending CN1622508A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200410098462 CN1622508A (en) 2004-12-13 2004-12-13 One-time password table based one-time password generation and authentication system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200410098462 CN1622508A (en) 2004-12-13 2004-12-13 One-time password table based one-time password generation and authentication system and method

Publications (1)

Publication Number Publication Date
CN1622508A true CN1622508A (en) 2005-06-01

Family

ID=34766644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200410098462 Pending CN1622508A (en) 2004-12-13 2004-12-13 One-time password table based one-time password generation and authentication system and method

Country Status (1)

Country Link
CN (1) CN1622508A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009018685A1 (en) * 2007-08-08 2009-02-12 Kamfu Wong The device and the method of encrypting and authenticating against trojan horse with one time key
WO2009018684A1 (en) * 2007-08-08 2009-02-12 Kamfu Wong The keyboard for encrypting and authenticating against trojan horse with one time key
CN101335619B (en) * 2007-06-27 2010-10-13 刘建军 Authorized using method of disposal dynamic cipher telephone or short message
CN101304315B (en) * 2008-06-30 2010-11-03 北京飞天诚信科技有限公司 Method for improving identification authentication security based on password card
WO2011044784A1 (en) * 2009-10-12 2011-04-21 中兴通讯股份有限公司 Terminal and method for password change
CN101304422B (en) * 2008-06-30 2011-05-18 北京飞天诚信科技有限公司 Method for improving identification authentication security based on password card
CN102930646A (en) * 2012-11-05 2013-02-13 张金木 Authentication technology based on stock market quotation
CN103118925A (en) * 2010-09-14 2013-05-22 本田技研工业株式会社 Structure of front section of vehicle body
CN103297399A (en) * 2012-03-01 2013-09-11 董建飞 Method and system for improving safety of intelligent secret key equipment
CN104008312A (en) * 2014-03-18 2014-08-27 深圳怡化电脑股份有限公司 Cardholder identity verification method of ATM (Automatic Teller Machine)
CN104537738A (en) * 2014-02-24 2015-04-22 袁磊 Dynamic coded lock system for acquiring codes by virtue of table look-up
CN106534221A (en) * 2017-01-05 2017-03-22 张正峰 Remote non-networked encryption algorithm agreed appointed time switching device and control method

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335619B (en) * 2007-06-27 2010-10-13 刘建军 Authorized using method of disposal dynamic cipher telephone or short message
CN101933315B (en) * 2007-08-08 2014-03-26 黄金富 The keyboard for encrypting and authenticating against trojan horse with one time key
WO2009018684A1 (en) * 2007-08-08 2009-02-12 Kamfu Wong The keyboard for encrypting and authenticating against trojan horse with one time key
CN101933287A (en) * 2007-08-08 2010-12-29 黄金富 The device and the method of encrypting and authenticating against trojan horse with one time key
CN101933287B (en) * 2007-08-08 2015-11-25 黄金富 The encrypting and authenticating apparatus and method of the disposable one time key of antagonism wooden horse formula
WO2009018685A1 (en) * 2007-08-08 2009-02-12 Kamfu Wong The device and the method of encrypting and authenticating against trojan horse with one time key
CN101304315B (en) * 2008-06-30 2010-11-03 北京飞天诚信科技有限公司 Method for improving identification authentication security based on password card
CN101304422B (en) * 2008-06-30 2011-05-18 北京飞天诚信科技有限公司 Method for improving identification authentication security based on password card
WO2011044784A1 (en) * 2009-10-12 2011-04-21 中兴通讯股份有限公司 Terminal and method for password change
CN103118925A (en) * 2010-09-14 2013-05-22 本田技研工业株式会社 Structure of front section of vehicle body
CN103297399A (en) * 2012-03-01 2013-09-11 董建飞 Method and system for improving safety of intelligent secret key equipment
CN102930646B (en) * 2012-11-05 2014-08-06 张金木 Authentication technology based on stock market quotation
CN102930646A (en) * 2012-11-05 2013-02-13 张金木 Authentication technology based on stock market quotation
CN104537738A (en) * 2014-02-24 2015-04-22 袁磊 Dynamic coded lock system for acquiring codes by virtue of table look-up
CN104008312A (en) * 2014-03-18 2014-08-27 深圳怡化电脑股份有限公司 Cardholder identity verification method of ATM (Automatic Teller Machine)
CN106534221A (en) * 2017-01-05 2017-03-22 张正峰 Remote non-networked encryption algorithm agreed appointed time switching device and control method
CN106534221B (en) * 2017-01-05 2023-04-18 张正峰 Appointment time switching device agreed by remote non-networking encryption algorithm and control method

Similar Documents

Publication Publication Date Title
CN101166091B (en) A dynamic password authentication method and service end system
EP1175038B1 (en) Technique for obtaining a sign-on certificate from a foreign PKI system using an existing strong authentication PKI system
EP1723594B1 (en) Token authentication system and method
EP1829281B1 (en) Authentication device and/or method
US20040123160A1 (en) Authentication system and method based upon random partial pattern recognition
EP2166697A1 (en) Method and system for authenticating a user by means of a mobile device
CN201467167U (en) Password encoder and password protection system
KR20150077446A (en) Method for signing electronic documents with an analog-digital signature with additional verification
Archana et al. Survey on usable and secure two-factor authentication
CN1622508A (en) One-time password table based one-time password generation and authentication system and method
CN105703910B (en) Dynamic token verification method based on wechat service number
CN101626369A (en) Method, device and system for single sign-on
CN101291227A (en) Password inputting method, device and system
CN104767616A (en) Message processing method, system and related device
CN104767617A (en) Message processing method, system and related device
CN109714370A (en) A kind of implementation method based on http protocol end Yunan County full communication
CN102868702B (en) System login device and system login method
CN1731723A (en) Electron/handset token dynamic password identification system
CN108259445A (en) MS windows desktops Security Login System and its login method based on smart mobile phone
CN101478400A (en) Dynamic cipher key generation and authentication method based on dynamic cipher key table
CN105162773A (en) Mobile terminal based shortcut login method for Web system
CN105763536B (en) Network registration method and system based on dynamic graphic password
CN104657860A (en) Mobile banking security authentication method
CN107580002B (en) Double-factor authentication security manager login system and method
CN106790138A (en) A kind of method of government affairs cloud application User logs in double factor checking

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication