Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method of Improving Identity Authentication Security Based on Password Card

An identity authentication and password card technology, applied in the field of information security, can solve problems such as illegal transactions, loss of legal users, troubles, etc., and achieve the effect of improving security and increasing the difficulty of cracking

Active Publication Date: 2011-12-28
FEITIAN TECHNOLOGIES
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The above-mentioned prior art adopts the same PIN each time for user identity authentication on information security equipment. Although the user can modify the PIN, it usually does not modify the PIN after each identity authentication, so there is a security risk. If If the PIN is intercepted by a hacker, the hacker may use the PIN to steal sensitive information such as certificates stored in the smart key device, conduct illegal transactions, and bring losses to legitimate users
Moreover, the unlocking method in the prior art requires the user to go to a special counter, which is cumbersome and time-consuming, and if the user is in a hurry, it will cause a lot of inconvenience to the user, and even cause economic losses to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of Improving Identity Authentication Security Based on Password Card
  • Method of Improving Identity Authentication Security Based on Password Card
  • Method of Improving Identity Authentication Security Based on Password Card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0034] see figure 1 , the embodiment of the present invention provides a method for improving identity authentication security based on a password card, the method specifically includes:

[0035]Step 101: The information security device receives the serial number of the first password card input by the user. The information security device has an identification matrix pre-stored. The coordinate value range of the identification matrix is ​​greater than the coordinate value range of the password matrix on the first password card, and the identification matrix The value in is used to identify whether the password of the corresponding location calculated by the information security device is available. For example, setting this value to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for improving identity authentication security based on a password card, belonging to the field of information security. The method includes: the information security device receives the serial number of the first password card input by the user, selects the first coordinate value in the pre-stored identification matrix for the user, and calculates the check code by using the password generation algorithm, the serial number and the coordinate value; Compare the verification code with the verification code calculated and returned by the server according to the above-mentioned password generation algorithm and the serial number and first coordinate value of the first password card input by the user. If they are consistent, the serial number is saved and the binding with the card is completed; During identity authentication, the second coordinate value of the identification matrix is ​​provided to the user, and the password calculated according to the coordinate value, the above algorithm and the serial number is compared with the password entered by the user according to the coordinate value to complete the identity authentication. The invention improves the security of identity authentication, realizes dynamic authentication, and can avoid problems such as PIN being intercepted by hackers, information in equipment being stolen by hackers or illegal transactions.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for improving identity authentication security based on a password card. Background technique [0002] With the development of computer technology, people pay more and more attention to information security. In recent years, information security equipment is a small hardware device with processor and memory, which can be connected to the computer through the data communication interface of the computer. It is connected to the computer through the USB (Universal Serial Bus) interface, usually called USB KEY or USB Token (identity authentication device). The information security device has physical characteristics of anti-attack and high security, so it is widely used It is used in fields such as identification, online banking and VPN (Virtual Private Network, virtual private network), and can encrypt / decrypt the data stored in the information security device, so the in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products