Dynamic cipher authentication system

A password authentication and password technology, applied in the field of password authentication system, can solve problems such as identity confirmation security problems, and achieve the effect of solving dynamic

Active Publication Date: 2008-09-24
SHENZHEN ROUTDATA TECH
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Third, for applications that require client programs, Trojans can even modify the application to steal passwords
In this w

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic cipher authentication system
  • Dynamic cipher authentication system
  • Dynamic cipher authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Such as figure 1 As shown, the client holds an authentication password generator 2, which generates an authentication password.

[0028] The business system access authentication system client 3 is a terminal connected to the authentication system server 1 with each other.

[0029] The user can input his identity password through the terminal interface of the business system, and the business system in the background of the business system is transmitted from the authentication system client 3 to the authentication system server 1, and the authentication system server 1 can be calculated and checked by the corresponding algorithm. And identify the identity of the customer.

[0030] figure 2 with image 3 It is an implementation of the password authentication system of the present invention.

[0031] Such as figure 2 As shown, the system server 1 includes: a system interface 11, an authentication module 12, and a system database 13.

[0032] The system interface 11 is us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a password authentication system which comprises a system server (1) used for storing the system information and carrying out identification password authentication and an authentication password generator (2) used for generating an identification password. The system server (1) comprises a system interface (11) and a system database (13), an authentication module (12) used for reading the user identification password and the additional code submitted by the system interface (11) and customizing different generating modes by the written parameters in the authentication password generator (2). The authentication password generator (2) comprises an identification password register (24), a clock (23), a password generating module (22), a key input module (25) and a display module (21); the authentication password generator (2) adopts the X arithmetic which is the same as the system server (1) to generate the identification password; the X arithmetic can be different in each authentication password generator (2); the identification password is a numeric string.

Description

Technical field [0001] The invention relates to a password authentication system, in particular to a dynamic password authentication system. Background technique [0002] With the development of e-commerce, more and more business activities are taking place on the Internet, and the security of customer accounts has become an important issue. In traditional network business activities, the client connects to the server from the client, and the server sends out identity confirmation information. The user enters the confirmation information through the keyboard at the client, such as a password composed of numbers or letters. The confirmation information will be transmitted to the server. Undergo verification. In such a system, there are greater security risks: firstly, because the identity authentication process uses a single fixed password, once the password is known or deciphered by others, it will cause serious consequences for transaction security. Secondly, network viruses are...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/16G06F17/30G06Q30/00
Inventor 谈宏刘宗沛郑俊明张立栋朱晓东
Owner SHENZHEN ROUTDATA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products