A dynamic password authentication method and service end system

A technology of dynamic password and static password, which is applied in the field of password authentication, can solve the problems that the password cannot be received in time, is difficult to save, and is inconvenient to use, and achieves the effects of small impact, not easy to lose, and convenient use

Inactive Publication Date: 2008-04-23
ALIBABA GRP HLDG LTD
View PDF0 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The technical problem to be solved by the present invention is to provide a more convenient and safer dynamic password authentication method and system to solve the problems in the prior art that passwords cannot be received in time, difficult to save, inconvenient to use and easy to lose confidentiality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A dynamic password authentication method and service end system
  • A dynamic password authentication method and service end system
  • A dynamic password authentication method and service end system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0042] refer to figure 1 , is a method flowchart of the present invention, specifically comprising the following steps:

[0043] Step 101, preset the corresponding relationship between the user account and the user's mobile terminal device number.

[0044] On the server side, user information is pre-stored, including user account number, user mobile terminal device number and other information, which can be required to be provided by the user when registering, or obtained by importing user data from other systems, or by a special input The user's mobile terminal device can be the user's mobile phone, handheld computer and other equipment, and the number of the user's mobile device can be the number of the SIM card (subscriber ide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a method for authenticating dynamic ciphered codes including: presetting a corresponding relation of the account number of a user and the number of its mobile terminal device, generating a character string randomly according to the request of the user and sending it to the mobile terminal device, generating cipher prompt information randomly according to the authentication application of the user and sending it to the client end stipulating that character combination of specific bits in the string is the dynamic code of the authentication application this time, the user end inputs dynamic codes according to the character string received by the mobile terminal device and the code prompt information received by the client end to judge the validity of the dynamic code, if it is effective, the authentication is passed.

Description

technical field [0001] The invention relates to the field of password authentication, in particular to a dynamic password authentication method and a server system. Background technique [0002] In real life, our personal identity is mainly confirmed by various documents, such as: ID card, household registration book, etc., and various system resources of the computer (such as: files, data, and application systems, etc.) also need to be protected by authentication mechanisms , so as to ensure that these resources are used by the right people. [0003] At present, various types of computing resources are mainly protected by password authentication, generally using static password authentication and dynamic password authentication. [0004] The static password authentication method adopts the "username + password" authentication method. When a user logs in, the application server performs identity authentication through a static password to confirm whether the user is a legi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/16
Inventor 陆兆禧
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products