Access control system generated and verified on the basis of dynamic password and authentication method thereof

A technology of dynamic password and access control system, applied in the field of identity authentication, which can solve problems such as loss and copying

Inactive Publication Date: 2009-12-02
FEITIAN TECHNOLOGIES
View PDF0 Cites 96 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the passwords of current contact cards and non-contact cards are all static passwords. After the legitimate user's card is lost or stolen, the static password and other important information of the card are easily copied by illegal persons, causing serious losses and consequences.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control system generated and verified on the basis of dynamic password and authentication method thereof
  • Access control system generated and verified on the basis of dynamic password and authentication method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Such as figure 1 As shown, the embodiment of the present invention includes a system host 1, a card reader 2, an electric lock 3 and multiple user cards.

[0050] The system host 1 includes a storage unit 11 , a verification password generation unit 12 , an acquisition unit 13 , a comparison unit 14 , a communication unit 15 , a user information database unit 16 , and a sending unit 17 . The storage unit 11 in the system mainframe 1 stores preset algorithms and keys required to generate the verification password, and the preset algorithms can be HOPT, DES, RSA, SHA algorithms or preset by the manufacturer. The verification password generating unit 12 in the system mainframe 1 is used to use the preset algorithm and key stored in the storage unit 11 to generate a verification password according to the ID of the user card obtained and the dynamic factor of the card stored in the user information library unit 16 . The obtaining unit 13 in the system host 1 is used to obt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control system generated and verified on the basis of dynamic password and an identity verification method, belonging to the field of security certificate. The system comprises a user terminal for generating dynamic password and a certificate terminal for verifying dynamic password, wherein, the user terminal comprises a storage module which is used for storing arithmetic, keys and dynamic factors, and the certificate terminal comprises a reading module, a locker module and a certificate server module. The method of the invention comprises the following steps: after receiving an order sent by the certificate terminal, the user terminal generates dynamic password, the certificate terminal generates verified password according to stored arithmetic and key which are identical to the user terminal and corresponding dynamic factors, and the dynamic password and the verified password are compared to verify the validity and availability of the dynamic password of the user terminal.

Description

technical field [0001] The invention relates to identity authentication technology, in particular to a user identity authentication method in an access control system. Background technique [0002] As a system for controlling and managing personnel access, the access control system must first authenticate the identity of the personnel entering and exiting to determine whether they have permission to pass. With the deepening of social electronic intelligence, the access control systems we see now can be divided into password access control systems, card swiping access control systems and biometric access control systems according to different input devices, media and methods. [0003] The use of the password access control system is to enter the password, and the system judges that the password is correct to drive the electric lock and open the door for release. The advantage is that you only need to remember the password, you don't need to carry other media, and the cost is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products