Method and device for system login based on autonomously generated password of user

A technology of dynamic password and login method, applied in transmission systems, user identity/authority verification, digital data authentication, etc., can solve the problems of being different, being peeped, imitating legitimate users, etc., achieving the effect of no hardware cost and security protection

Inactive Publication Date: 2014-08-06
宗祥后 +2
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, the password used by the user is different every time. Even if the hacker intercepts the password once, it cannot use this password to counterfeit the identity of the legitimate user.
[0011] However, there is also a reason why this technology does not use dynamic passwords in large-scale cryptographic systems at present. The main reason is that this dynamic password also has some disadvantages:
However, the PIN code used by the USBkey currently in use is still static, and there is also the risk of being peeped. The above-mentioned defects all exist one by one.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for system login based on autonomously generated password of user
  • Method and device for system login based on autonomously generated password of user
  • Method and device for system login based on autonomously generated password of user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0119] Embodiment 2, the login device application of network chat tool

[0120] refer to Figures 3a to 3c , in the method according to another embodiment of the present invention, similar to the previous embodiment, the user can set a login rule for future use when applying the system for the first time, which can be completed by a rule setting unit 101 of the login device ;Such as Figure 3b As shown, the operation process of the rule setting unit 101 includes providing a display area for the user on the user's terminal, and distinguishing the controlled element setting area and the static control element setting area S311 on the display area; Or select and other methods to complete the setting of the controlled element and the setting of the static control element S312 and confirm S313, then the unit considers that the login rule setting is complete, and then the unit will set the completed login rule together with the user's ID in a storage It is stored in the unit for...

Embodiment 3

[0139] Embodiment 3, the application of online banking, online payment, online securities

[0140] refer to Figures 4a to 4c , in the method according to another embodiment of the present invention, similar to the previous embodiment, the user can set a login rule for future use when logging in for the first time, which can be completed by a rule setting 101 unit of the login device; the The rule setting unit includes providing a display area for the user on the display device of the user's terminal 20, and distinguishing the controlled element setting area and the static control element setting area S411 on the display area; The setting of the controlled element and the setting of the static control element S412 and after verification and confirmation S413, then the unit considers that the login rule setting is completed, and then the unit will store the set login rule together with the user's ID in a storage unit for Invoking S402 in the future, the storage can be encryp...

Embodiment 4

[0168] Embodiment 4, the application to the login of bank ATM, POS machine

[0169] refer to Figures 5a to 5c , in an example for this application, as Figure 5a As shown, similar to the previous embodiment, it includes login steps 503, 504, 505, 506, 507, etc., and users generally use tools such as bank cards to achieve identity verification. Therefore, the login device and method of the present invention do not need to provide user The interface for inputting the user ID, and the user ID acquisition unit 105 directly determines the user's ID by reading tools such as bank cards, and subsequent steps such as the provision of random information and the generation of reference passwords, the acquisition of input dynamic passwords, and password matching The setting of the etc. unit 107 can be such as the way of logging in for network chat tools, or can be like the way of logging in for online banking, which depends on the arrangement of ATMs or POS machines.

[0170] Login r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed are a method and device for system login based on a dynamic password generated autonomously by a user, which is based on at least one preset login rule defined autonomously by a user and dynamically generates a login password by providing random information to verify the dynamic password of the user. The present invention solves the problem of the password being unreliable caused by the fact that a random dynamic password always needs to be provided by a technician rather than a user himself / herself in the prior art, such as a so-called verification code and so on.

Description

technical field [0001] The present invention relates to all occasions where static and dynamic passwords are used as user login, payment, and electronic locks, as well as occasions where all electronic equipment is opened and its process safety is guaranteed. Background technique [0002] The use of passwords is ubiquitous in our lives, especially in today's digital age, and it has become more common. We need to perform these operations repeatedly every day. For example, we need to enter a password to open a mobile phone, and we need to enter a password You need to enter a password to log in to the company's network, you need to enter a password to log in to MSN, QQ, Fetion or Wangwang chat, etc., you need to enter a password to send and receive emails, you need to enter a password to log in to a game website to play games, you need to enter a password A password is required to enter the office, a password is required to access the Internet, online payment, and credit card s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCG06F21/30
Inventor 宗祥后金栋方国平
Owner 宗祥后
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products