Method for improving identification authentication security based on password card
An identity authentication and password card technology, applied in the field of information security, can solve problems such as loss of legal users, illegal transactions, troubles, etc., and achieve the effect of increasing the difficulty of cracking and improving security.
Active Publication Date: 2008-11-12
FEITIAN TECHNOLOGIES
0 Cites 9 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Method used
View more
Abstract
The invention discloses a method for improving the security of identity authentication based on a password card, belonging to the information security field. The method comprises the following steps: information security equipment receives applications and check codes for binding a first password card sent from users; the consistency of the check code and a built-in check code is compared, and if the two check codes are consistent, the serial number of the password card inputted by the users can be received, which is then stored to finish the binding process with the password card; in the process of identity authentication, the first coordinate value which is randomly chosen in prestored coordinates range is for users, and the password calculated according to the coordinate value, the calculation and the password which is calculated by the serial number are compared with the password inputted by the users according to the coordinate value to finish the identity authentication. The method of the invention improves the security of the identity authentication, realizes the dynamic identification. Compared with the prior art, the method avoids the problems that if the PIN is intercepted by hackers, information inside the equipment can be stolen or illegal transactions can be done, and the like, thus improving the cracking difficulty and enhancing the security.
Application Domain
User identity/authority verification
Technology Topic
PasswordBinding process +4
Image
Examples
- Experimental program(2)
Example Embodiment
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Trusted computing platform chip applicable to mobile communication equipment and authentication method thereof
Owner:HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
Capacity calling method, capacity calling request device, capacity calling platform and capacity calling system
Owner:CHINA MOBILE COMM GRP CO LTD
Method, device and system for sending and receiving scheduling user data information
Owner:HUAWEI TECH CO LTD
Hidden frame glass curtain wall structure and method for mounting same
Owner:XINCHANG SICHUANG DESIGN CONSULTING CO LTD
Classification and recommendation of technical efficacy words
- Increase the difficulty of cracking
- improve security
Method and device for improving terminalself-flashing safety through ciphertext handshaking
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD +1
Program protection method and device
ActiveCN103853943AIncrease the difficulty of crackingProtect source code
Owner:BEIJING AUTONAVI YUNMAP TECH CO LTD
Network information transmission method and system therefor
Owner:CHINA TELECOM CORP LTD +1
Bluetooth device safe login identity authentication method and device
Owner:福州米立科技股份有限公司
Log encryption method and device and log decryption method and device
Owner:SUZHOU KEDA TECH