Personal identification process for dynamic cipher password bidirectional authentication based on multiple variables
A technology of dynamic password and authentication method, which is applied in the field of two-way authentication and information security, and can solve the problems of difficult large-scale popularization and use of the system, system incompatibility and transformation cost, long time and other problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0051] This example demonstrates the normal login process of the user, the schematic diagram is attached Figure 4 .
[0052] In the first step, the client submits the user account "Test001" and the static password "MyBirthDay+1" to the server, and the user's IP address is "61.134.1.1". After the authentication server receives the data submitted by the user, it retrieves the relevant authentication information according to the user account, and verifies that the user's static password is correct. Then set the flag Fs to 1, increase the synchronous counter value Ns by 1, that is, change from 0 to 1, and record the user's IP address.
[0053] The authentication server forwards the generated dynamic password "17297397" to the user in the second step, and the user judges the authenticity of the server based on this password. The user receives the password sent by the server, and then generates a password on his own password token. At this time, the synchronization counter value ...
example 2
[0056] This example demonstrates the principle of preventing the "Secret Treasure Terminator" Trojan horse attack, the schematic diagram is attached Figure 5 .
[0057] Assume that the attacker has obtained the account number and static password of the user in Example 1 by using the Trojan horse program "Secret Treasure Terminator" and other Trojan horse programs, and intercepted the dynamic password "95017043" submitted by the user to the authentication server in the third step of the authentication process. ", and at the same time modify the content in the user authentication data package, the user's dynamic password authentication process is unsuccessful. At this time, the state characteristics of the authentication server end are: the synchronization count value Ns=2, and the static password authentication success flag Fs=0. The following is the authentication process after the attacker obtains the user's dynamic password:
[0058] The attacker enters the user account "...
example 3
[0062] This example demonstrates the principle of preventing "parallel session attack", the schematic diagram is attached Image 6 .
[0063] The so-called "parallel session attack" means that the attacker deliberately runs multiple protocol processes concurrently, in an attempt to obtain the answer needed by a certain process in multiple running processes.
[0064] The first step of the attacker is to enter the user name "Test001" and the correct static password on the machine with the IP address "61.138.1.2", and the server sends a password "20014829" after passing the verification. Then enter the user name "Test001" and the correct static password on another machine with the IP address "61.138.1.3", and the server sends a password "07196154" after passing the verification, so the attacker can Complete the first authentication process, enter the password "07196154" on the machine with the IP address "61.138.1.2", and at this time the synchronization counter value on the aut...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



