Dynamic password input rule

A dynamic password and rule technology, applied in the direction of user identity/authority verification, etc., can solve problems such as user identity authentication information protection threats, and achieve the effect of preventing phishing/domain spoofing/memory attacks and keyboard hacking attacks

Inactive Publication Date: 2010-03-10
BEIJING PASSWORD TECH
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In contrast, the client side of the network system used by users becomes a weak point. The client side of the network system is the place where user identity information such as user account numbers and passwords are input. If the defense fails, no matter how good the defense function of the application system and server is, The protection of user identity authentication information will be seriously threatened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic password input rule
  • Dynamic password input rule
  • Dynamic password input rule

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] What the present embodiment described is a kind of dynamic password input rule, and the system that described rule uses comprises: mobile phone, communication network, short message platform server, user PC, Internet, application server, such as figure 1 shown. The mobile phone is an ordinary general-purpose mobile phone without any special requirements. Communication networks include mobile communication networks, the Internet, wired telephone networks, local area networks, wireless communication networks, and all communication networks that are used in the public domain and can communicate with each other are included. The SMS platform server includes a dynamic password input rule application control center that accepts the user's request information and verifies the user's identity through the user database. For authenticated legal users, the command password generation module generates a dynamic password, and the generated dynamic password is sent to the applicatio...

Embodiment 2

[0033] This embodiment is an improvement in the steps of logging in through the dynamic password input rules in the dynamic password input rules described in the first embodiment, as image 3 shown.

[0034] The sub-steps in the step of logging in through the dynamic password input rule include:

[0035] The sub-step of logging in the PC network system client to get in touch with the SMS platform, and sending the user account number.

[0036] The short message platform receives the user account and enters the rule control center through the dynamic password to compare and verify the information stored in the user database. If the information comparison and verification error will stop the operation immediately, if the information comparison verification is correct, then enter the next sub-step.

[0037] For authenticated legal users, the control center instructs the password survival module to save the dynamic password and arranges the input rule module to send the dynamic pa...

Embodiment 3

[0041] What is described in this embodiment is the step of logging in through the dynamic password input rules described in the second embodiment. The dynamic passwords described in the step of adding input rules are arranged in order.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a dynamic password input rule which can prevent dynamic password from illegal use; a using system in the invention comprises a mobile phone, a communication network, a short message platform server, a user PC, an internet and an application server; the operating steps of the rule are as follows: dynamic password input rule is registered; the dynamic password input rule isset; login is carried out by the dynamic password input rule. By adopting the dynamic password input rule, the dynamic password operation is converted into one-time password privacy information, and the security features of the password are ensured by keyboard input in the PC, and personal information such as user account number is ensured to be transmitted safely; even if under a hostile environment, the personal information can be ensured not to be threatened, so as to ensure the dynamic password input safety.

Description

technical field [0001] The invention relates to a dynamic password input rule, which is a rule for secretly computing the dynamic password into private information, and a rule for preventing the dynamic password from being illegally embezzled. Background technique [0002] With the development of information technology, the Internet is gradually changing people's work and life style with its openness, convenience and popularity. From government departments to enterprises, from telecom operators to Internet SPs, they all use this platform to build application systems to speed up information communication, improve work efficiency, reduce service costs, and improve service levels. Various Internet-related network applications such as online banking, online securities, online shopping, e-commerce, online games, and e-government affairs are developing vigorously, presenting a thriving scene. However, the openness, popularity, and freedom from time and space constraints of the In...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 张师祝
Owner BEIJING PASSWORD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products