Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

One-time password certification system token resynchronization method based on event

A password authentication and resynchronization technology, applied in the field of computer and information security, can solve problems such as out-of-sync and remain unchanged, and achieve the effect of fast running speed, ensuring security, and simple calculation

Inactive Publication Date: 2013-06-05
李慧娟 +2
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Generally, in the hardware token, if the user clicks the button once, the counter value will be incremented by one; in the authentication server, if the authentication is successful once, the counter value will be incremented by one. If the user keeps clicking the button on the hardware token without performing the authentication operation , it will cause the counter value in the hardware token to increase continuously, while the counter value in the authentication server remains unchanged, making the two out of sync

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • One-time password certification system token resynchronization method based on event
  • One-time password certification system token resynchronization method based on event
  • One-time password certification system token resynchronization method based on event

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The token resynchronization method of the event-based one-time password authentication system of the present invention has been fully and detailedly introduced above. The technical features and implementation methods of the present invention will be further described below in conjunction with the accompanying drawings.

[0038] This implementation example provides a complete event-based one-time password authentication system token resynchronization method, see figure 1 , is a flowchart of the event-based one-time password authentication system token resynchronization method, specifically including:

[0039] Step 101, the system presets the resynchronization window size;

[0040] Step 102, the hardware token generates a client password and sends it to the authentication server;

[0041] Step 103, the authentication server receives the client password sent in step 102, and at the same time, generates a server password based on the counter value, and compares whether the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A one-time password certification system token resynchronization method based on an event aims to solve the problems of step out of the token due to inconsistency of counter values of a hardware token and an authentication server of the one-time password certification system based on the event and provides a resynchronization method. The method is divided into window inner resynchronization and window outer resynchronization on basis of a preset size of the window and the counter values as synchronization factors. When step out times of the hardware token and the server are within the size of the window, the window inner resynchronization is carried out, repetitive computation command times are smaller than or equal to the window size, and a group of consistent customer commands and service commands, and the resynchronization is achieved; if not, the widow outer resynchronization is carried out, at the moment if three customer commands and service commands are consistent continuously, the resynchronization is achieved, the whole execution process of the resynchronization method is divided into seven steps. The one-time password certification system token resynchronization method based on the event is highly-efficient, simple in computation, low in time consumption of operation, fast in operation speed, small in occupation space of system memory space, and capable of resisting brute force impact of the certification system.

Description

(1) Technical field [0001] The invention relates to Internet security identity authentication technology, in particular to an event-based token resynchronization method when a hardware token and an authentication server are out of sync in a one-time password authentication system. It belongs to the technical field of computer and information security. (2) Technical background [0002] The one-time password authentication technology provides randomly generated and different authentication passwords for users during identity authentication, which solves the danger of traditional static passwords being easily stolen. One-time password authentication has been more and more widely used in e-commerce, online games, online banking and other network platforms that require identity authentication. [0003] Most of the existing various one-time password authentication technologies and schemes provide hardware tokens and authentication servers, and the hardware tokens are used to rand...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 李慧娟刘博李为宇张薇周炼赤
Owner 李慧娟
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products