Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for improving identification authentication security based on password card

An identity authentication and password card technology, applied in the field of information security, can solve the problems of illegal transactions, loss of legal users, hidden dangers, etc., to achieve the effect of improving security and increasing the difficulty of cracking

Active Publication Date: 2010-09-08
FEITIAN TECHNOLOGIES
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The above-mentioned prior art adopts the same PIN each time for user identity authentication on information security equipment. Although the user can modify the PIN, it usually does not modify the PIN after each identity authentication, so there is a security risk. If If the PIN is intercepted by a hacker, the hacker may use the PIN to steal sensitive information such as certificates stored in the smart key device, conduct illegal transactions, and bring losses to legitimate users
Moreover, the unlocking method in the prior art requires the user to go to a special counter, which is cumbersome and time-consuming, and if the user is in a hurry, it will cause a lot of inconvenience to the user, and even cause economic losses to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for improving identification authentication security based on password card
  • Method for improving identification authentication security based on password card
  • Method for improving identification authentication security based on password card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0031] Referring to Fig. 1, the embodiment of the present invention provides a method for improving identity authentication security based on a password card, the method specifically includes:

[0032] Step 101: The information security device receives the serial number of the first password card input by the user, the first coordinate value of the password matrix on the first password card, and the password for binding corresponding to the first coordinate value, and the information security device internally stores There is a coordinate range, and the coordinate range is larger than the coordinate range of the password matrix on the first pass card;

[0033] There are usually multiple passwords on the first password card purchased by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for improving the security of identity authentication based on a password card, belonging to the formation security field. The method comprises the following steps: information security equipment receives the serial number of a first password card, first coordinate value of a password matrix on the first password card and the corresponding password for binding, calculates the serial number to generate the first password matrix; the information security equipment chooses the corresponding first password in the first password matrix according to the first coordinate value; and the consistency of the first password and the password for binding is compared; if the two passwords are consistent, the first password matrix is stored to finish the binding process; in the process of identity authentication, the second coordinate value is offered to the users, and a corresponding second password is chosen from the first password matrix; the second password and the password input by the users according to the second coordinate value are compared, and if the two passwords are consistent, the identity authentication is passed. The method of the invention improves the security of the identity authentication, realizes the dynamic identification. Compared with the prior art, the method avoids the problems that if the PIN is intercepted by hackers, information inside the equipment can be stolen or illegal transactions can be done, etc.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for improving identity authentication security based on a password card. Background technique [0002] With the development of computer technology, people pay more and more attention to information security. In recent years, information security equipment is a small hardware device with processor and memory, which can be connected to the computer through the data communication interface of the computer. It is connected to the computer through the USB (Universal Serial Bus) interface, usually called USB KEY or USB Token (identity authentication device). The information security device has physical characteristics of anti-attack and high security, so it is widely used It is used in fields such as identification, online banking and VPN (Virtual Private Network, virtual private network), and can encrypt / decrypt the data stored in the information security device, so the in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00H04L9/32G06F21/34
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products