Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for improving identification authentication security based on password card

An identity authentication and password card technology, applied in the field of information security, can solve problems such as illegal transactions, loss of legal users, troubles, etc., and achieve the effect of improving security and increasing the difficulty of cracking

Active Publication Date: 2011-05-18
FEITIAN TECHNOLOGIES
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The above-mentioned prior art adopts the same PIN each time for user identity authentication on information security equipment. Although the user can modify the PIN, it usually does not modify the PIN after each identity authentication, so there is a security risk. If If the PIN is intercepted by a hacker, the hacker may use the PIN to steal sensitive information such as certificates stored in the smart key device, conduct illegal transactions, and bring losses to legitimate users
Moreover, the unlocking method in the prior art requires the user to go to a special counter, which is cumbersome and time-consuming, and if the user is in a hurry, it will cause a lot of inconvenience to the user, and even cause economic losses to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for improving identification authentication security based on password card
  • Method for improving identification authentication security based on password card
  • Method for improving identification authentication security based on password card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0036] see figure 1 , the embodiment of the present invention provides a method for improving identity authentication security based on a password card, the method specifically includes:

[0037] Step 101: The information security device receives the serial number of the first password card input by the user.

[0038] The coordinate range of itself and the coordinate range of the first password card are prestored in the information security device, and the coordinate range of the information security device itself is larger than the coordinate range of the first password card.

[0039] Step 102: The information security device uses a password generation algorithm to calculate the received serial number of the first password card accor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for improving the security of identity authentication based on a password card, belonging to the field of information security, which comprises the following steps: information security equipment calculates the inputted serial number of a first password card by using password generation algorithm so as to generate a plurality of passwords which, except the password on the first password card, are all regarded as check codes and then the serial number and the check codes are stored to finish binding; when in the process of identity authentication, first coordinate values are offered to users and the first password calculated according to the coordinate values is compared with the password inputted by users according to the coordinate values to finish the identity authorization of users. The method improves the security of the identity authentication and realizes the dynamic identification; compared with the prior technology, the method avoids the problem that if PIN is intercepted by hackers, information inside the equipment can be stolen or illegal transactions can be carried out, and the like, and the declassification difficulty in increased and the security is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for improving identity authentication security based on a password card. Background technique [0002] With the development of computer technology, people pay more and more attention to information security. In recent years, information security equipment is a small hardware device with processor and memory, which can be connected to the computer through the data communication interface of the computer. It is connected to the computer through the USB (Universal Serial Bus) interface, usually called USB KEY or USB Token (identity authentication device). The information security device has physical characteristics of anti-attack and high security, so it is widely used It is used in fields such as identification, online banking and VPN (Virtual Private Network, virtual private network), and can encrypt / decrypt the data stored in the information security device, so the in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products