Network identity authentication method based on U-disk and dynamic differential password and system thereof

A network identity and authentication method technology, applied in the field of two-factor network identity authentication, can solve the problems of immature biometric authentication technology, insecure user names and passwords, and inability to solve the problem of popularization, achieving easy purchase, easy implementation, light weight effect

Inactive Publication Date: 2009-10-07
姚清野
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the matrix password card is fixed, when the virus records the user input multiple times, it can crack the content of the password card. Many companies recommend that customers replace the password card regularly, but users do not know when to replace it, because they do not know when hackers can crack it. , its security cannot be guaranteed, and users need to purchase a password card before using it, which is not safe enough in the long run and is not conducive to popularization
[0007] 4. In addition, there are traditional methods based on user names and passwords, biometric authentication, etc. The method of user names and passwords seems to be very insecure now, and the biometric authentication technology is not yet mature.
[0008] Existing network identity authentication schemes cannot solve the problems of security and popularity at the same time. Merchants shift the responsibility to users, let users use the network correctly, install anti-virus software and other methods can not solve the real problem, USB Key, dynamic password, matrix password Although technical solutions such as digital certificates can improve the security of the network to a certain extent, they cannot solve the problem of popularity due to the need to spend money on hardware, and digital certificates, USB Keys, etc. need to install drivers, which are complicated to use, leaving some users beyond their reach.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network identity authentication method based on U-disk and dynamic differential password and system thereof
  • Network identity authentication method based on U-disk and dynamic differential password and system thereof
  • Network identity authentication method based on U-disk and dynamic differential password and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the purpose of the present invention, technical solutions and advantages clearer, the embodiment of the present invention will be further described below in conjunction with the accompanying drawings: because the USB interface and U disk are quite popular, what the present invention realizes is exactly based on U disk and dynamic difference password A network identity authentication method and system. Depend on figure 1 Visible, realize that the concrete system of the present invention is the same as traditional network system, all comprises: user computer, network server, database server, and its difference just is:

[0050] 1. The user's computer also includes a U disk plugged into the computer's USB interface;

[0051] 2. The network server contains two-factor authentication components based on U disk and dynamic differential password.

[0052] The authentication component as described in figure 2 As shown, it includes: a core module, a hardware ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a double factor network identity authentication method based on U-disk and dynamic differential password and a system thereof, which have the characteristics of high safety, good universality and easy operation and can be applied in the fields of banks, securities, network games, electronic commerce and the like. The method comprises the following steps of: before application, preparing a U-disk and binding an user account and the chosen U-disk; during application, opening a login interface first and then inputting a user name; then transmitting a random prompt code to a user by a server and then inputting differential passwords according to the content of the prompt code; inserting the U-disk used for authentication; submitting an enciphered message to the server by the user for authentication; confirming the user identity if the authentication is passed, and then using the network service; and prompting the user to be authorized again if the authentication is failed. The system comprises the U-disk, a user computer, a network server and a database server, wherein the U-disk is inserted in the user computer, and the network server comprises an identity authentication component.

Description

technical field [0001] The present invention relates to an authentication method and system for determining user identity on the network, especially a two-factor network identity authentication method and system based on a common U disk and a dynamic differential password suitable for the Web. Of course, the method can not only It is used in B / S structure and can also be used in C / S structure. Background technique [0002] Although China's Internet is developing rapidly, and the number of users in industries such as online banking, e-commerce, and online games is increasing year by year, users' sense of security is constantly declining. Due to the existence of black industry chains such as viruses, incidents such as theft of customer funds and theft of game equipment have occurred from time to time. [0003] At present, the commonly used identity authentication methods in the network system mainly include the following types: [0004] 1. Dynamic password (Dynamic Password)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 姚清野
Owner 姚清野
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products