Method for improving identification authentication security based on password card

An identity authentication and password card technology, applied in the field of information security, can solve problems such as loss of legal users, illegal transactions, troubles, etc., and achieve the effect of increasing the difficulty of cracking and improving security.

Active Publication Date: 2008-11-12
FEITIAN TECHNOLOGIES
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The above-mentioned prior art adopts the same PIN each time for user identity authentication on information security equipment. Although the user can modify the PIN, it usually does not modify the PIN after each identity authentication, so there is a security risk. If If the PIN is intercepted by a hacker, the hacker may use the PIN to steal sensitive information s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for improving identification authentication security based on password card
  • Method for improving identification authentication security based on password card

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031] Example 1

[0032] see figure 1 , the embodiment of the present invention provides a method for improving identity authentication security based on a password card, the method specifically includes:

[0033] Step 101: The information security device receives the application for binding the first password card and the verification code sent by the user.

[0034] Step 102: The information security device checks whether the received verification code is consistent with the built-in verification code, and if they are consistent, execute step 103; otherwise, the binding of the information security device and the first passcard fails, and ends.

[0035] Step 103: The information security device receives the serial number of the first password card input by the user, saves the serial number, and completes the binding with the first password card.

[0036] Step 104: After receiving the user's identity authentication application, the information security device selects the fir...

Example Embodiment

[0048] Example 2

[0049] see figure 2 , the embodiment of the present invention also provides a method for improving identity authentication security based on a password card, which specifically includes:

[0050] Step 201: The information security device receives the invitation and verification code for binding the first password card sent by the user.

[0051] Step 202: The information security device compares whether the verification code is consistent with the built-in verification code, and if they are consistent, execute step 203; otherwise, the binding between the information security device and the first passcard fails, and ends.

[0052] Step 203: The information security device receives the serial number of the first password card input by the user, uses the password generation algorithm to calculate the serial number to generate a password matrix, and saves the password matrix to complete the binding with the first password card.

[0053] Step 204: After receivi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for improving the security of identity authentication based on a password card, belonging to the information security field. The method comprises the following steps: information security equipment receives applications and check codes for binding a first password card sent from users; the consistency of the check code and a built-in check code is compared, and if the two check codes are consistent, the serial number of the password card inputted by the users can be received, which is then stored to finish the binding process with the password card; in the process of identity authentication, the first coordinate value which is randomly chosen in prestored coordinates range is for users, and the password calculated according to the coordinate value, the calculation and the password which is calculated by the serial number are compared with the password inputted by the users according to the coordinate value to finish the identity authentication. The method of the invention improves the security of the identity authentication, realizes the dynamic identification. Compared with the prior art, the method avoids the problems that if the PIN is intercepted by hackers, information inside the equipment can be stolen or illegal transactions can be done, and the like, thus improving the cracking difficulty and enhancing the security.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for improving identity authentication security based on a password card. Background technique [0002] With the development of computer technology, people pay more and more attention to information security. In recent years, information security equipment is a small hardware device with a processor and memory, which can be connected to the computer through the computer's data communication interface. It is connected to the computer through the USB (Universal Serial Bus) interface, usually called USB KEY or USB Token (identity authentication device). The information security device has physical characteristics of anti-attack and high security, so it is widely used It is used in fields such as identification, online banking and VPN (Virtual Private Network, virtual private network), and can encrypt / decrypt the data stored in the information security device, so the infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products