Unlock instant, AI-driven research and patent intelligence for your innovation.

A dynamic image-based authentication system and authentication method

A technology of dynamic image and authentication system, applied in the field of authentication system, can solve the problems that users need to carry around, high cost, trouble to use, etc., and achieves the effect of convenient use, low cost, and guaranteed security.

Active Publication Date: 2015-09-16
CHINA UNIONPAY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the cost of information security equipment is usually high, and users need to carry it with them, which is troublesome to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A dynamic image-based authentication system and authentication method
  • A dynamic image-based authentication system and authentication method
  • A dynamic image-based authentication system and authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings, in which the same reference numerals denote the same elements.

[0041] figure 1 It is a schematic structural diagram of an authentication system according to an embodiment of the present invention. As shown in the figure, the authentication system includes an encryption machine 10 , a dynamic image generator 20 , a first server 30 , a user terminal 40 , a second server 50 and a transaction processor 60 .

[0042] The encryption machine 10, in response to the dynamic image generation request from the dynamic image generator 20, generates a random sequence that has a one-to-one correspondence with the password sequence and encrypts it according to the first encryption algorithm to generate a random sequence ciphertext, and converts the random sequence, The random sequence ciphertext and the one-to-one correspondence are sent to the dynamic image ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication system and method based on a dynamic image. The authentication system based on the dynamic image comprises an encryption machine, a dynamic image generator, a first server, a user terminal and a second server, wherein the encryption machine is used for transmitting a random sequence, a random sequence cipher text and one-to-one corresponding relation to the dynamic image generator and analyzing code position information to obtain a code; the dynamic image generator is used for generating a task descriptor and transmitting a dynamic image and the task descriptor to the first server; the first server is used for transmitting the dynamic image and the task descriptor to the user terminal; the user terminal is used for transmitting the code position information and the task descriptor to the second server; and the second server is used for obtaining the random sequence cipher text from the image generator and obtaining a code cipher text from the encryption machine. The authentication system and method disclosed by the invention have the advantages of guarantee on the safety, lower cost and convenience in use.

Description

technical field [0001] The invention relates to an authentication system, in particular to a dynamic image-based remote authentication method. Background technique [0002] Due to the rapid development of banking, transportation, network, communication and other industries, information security has penetrated into all aspects of people's daily life, and information security involves more and more fields. The difficulty and importance of information security are also becoming more and more prominent. As the core technology of the information security industry, identity authentication is being paid more and more attention by people. Usually image verification codes and information security devices are used for identity verification. [0003] An image verification code is an image containing characters or numbers. The characters or data in this image are usually distorted or added with some noise on the premise of ensuring human visual recognition, so as to increase the diffi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 刘风军李金良赵振祥肖波张春玲稽文俊郝义泉王宝玺郭宇航
Owner CHINA UNIONPAY