Method and device for generating dynamic passwords

A technology of dynamic passwords and commands, applied in the field of identity authentication, can solve problems such as affecting users' rights and interests, data tampering, and damage to users' interests.

Active Publication Date: 2012-03-14
FEITIAN TECHNOLOGIES
View PDF2 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the text message or email is illegally intercepted or the dynamic password token is used by illegal users, or the data is tampered with when the user conducts transaction operations, the user logs in to the phishing website, and the input dynamic password is intercepted, it will cause damage to the user's interests and seriously Affect the rights and interests of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for generating dynamic passwords
  • Method and device for generating dynamic passwords
  • Method and device for generating dynamic passwords

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] see figure 1 , Embodiment 1 of the present invention provides a method for generating a dynamic password, the specific steps are as follows:

[0077] Step 101: The card reader terminal establishes a connection with the smart card, and the device is powered on;

[0078] Preferably, in this embodiment, after the card reader establishes a connection with the smart card, the circuit is turned on, the device is automatically powered on, and when the power-on time reaches a preset time, the device is automatically powered off.

[0079] Preferably, in this embodiment, after the device is powered on, the following steps may also be included:

[0080] Step 101-1: The card reader terminal prompts the user to input a PIN code;

[0081] Preferably, in this embodiment, the PIN code may be the PIN code of the card reader terminal, or the offline PIN code of the smart card.

[0082] Step 101-2: Obtain the PIN code entered by the user, and verify whether the PIN code entered by the ...

Embodiment 2

[0147] see figure 2 , Embodiment 2 of the present invention provides a device for generating a dynamic password, including a card reader terminal 21 and a smart card 22, specifically as follows:

[0148] The card reader terminal 21 includes

[0149] The card slot module 2101 is used to establish a connection between the card reader terminal 21 and the smart card 22;

[0150] The first communication module 2102 is configured to send the first command to the smart card 22; receive the first command response sent by the smart card 22 to the card reader terminal 21; send the second command to the smart card 22; receive The second command response sent by the smart card 22; for sending the third command to the smart card 22; sending the third command, receiving the third command response returned by the smart card; for sending the read record command to the smart card, and receive the read record command response returned by the smart card; it is also used to realize the transmi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for generating dynamic passwords, which relate to the field of identity authentication. The method includes the following steps: a card-reading terminal establishes connection with an intelligent card, and the device is electrified; the card-reading terminal sends a first command to the intelligent card, and receives the first command response of the intelligent card; the card-reading terminal sends a second command to the intelligent card, and receives and parses the second command response returned by the intelligent card to obtain an application file list; according to the application file list, a reading record command is generated and sent to the intelligent card; the reading record command response returned by the intelligent card is received and parsed, so that a second data request list is obtained; second data are generated according to the second data request list; a third command is generated and sent to the intelligent card, and the third command response returned by the intelligent card is received; and the third command response is compressed and converted into a dynamic password which is then outputted. The invention provides the security of dynamic passwords.

Description

technical field [0001] The invention relates to the field of identity authentication, in particular to a method and device for generating a dynamic password. Background technique [0002] With the development of the network, more and more activities of people rely on the network, such as online banking, telephone banking, etc. Network information security is closely related to people's interests, and identity authentication technology has also developed accordingly, which is more secure than static passwords The unique identity authentication method-the dynamic password authentication method is also more and more subject to people's favor. [0003] At present, the dynamic password is generally generated by the server and sent to the user in the form of a short message or email, or generated by a dynamic password token held by the user. If the text message or email is illegally intercepted or the dynamic password token is used by illegal users, or the data is tampered with w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products