Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dynamic two-dimension code token and authentication method of dynamic two-dimension code instruction

A dynamic two-dimensional code and dynamic password technology, applied in the field of information security, can solve the problems of malicious operation, no non-repudiation information, easy to be attacked by phishing, etc., and achieve the effect of improving security.

Active Publication Date: 2014-01-08
宋博韬
View PDF3 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the network environment, the proliferation of hackers, Trojan horses and viruses makes static passwords more vulnerable
In addition, static passwords also have the following security risks and defects:
[0007]1) The user's password may be peeped or recorded by the image acquisition device when entering the password
[0008]2) The user's password usually has certain regularity and short length, which is easy to be guessed and cracked by monitoring;
[0009]3) The user's password is fixed for a relatively long period of time and may be leaked
[0010]4) The user's password does not contain non-repudiation information and may be manipulated maliciously
[0011]5) For some reason, the user tells others the password and forgets to modify it afterwards, resulting in loss
[0013]7) The user's password is manually entered, and entry errors may occur
[0015]9) Information asymmetry between the server and the client makes it vulnerable to phishing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic two-dimension code token and authentication method of dynamic two-dimension code instruction
  • Dynamic two-dimension code token and authentication method of dynamic two-dimension code instruction
  • Dynamic two-dimension code token and authentication method of dynamic two-dimension code instruction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0183] In order to make the technical solutions and advantages of this patent more clear and definite, an example is listed below, which is only an application scenario of this patent, not all examples.

[0184] This patent provides a dynamic two-dimensional code token and a dynamic two-dimensional code password authentication method, which significantly improves the security of identity authentication. Below in conjunction with embodiment this patent is described in detail.

[0185] see figure 1 , which shows the architecture diagram of a dynamic two-dimensional code password authentication platform.

[0186] A dynamic two-dimensional code token is a user terminal device that generates and displays a dynamic two-dimensional code password. In this embodiment, a smart phone is taken as an example, and the predefined dynamic two-dimensional code token program is deployed in the program memory of the smart phone in the form of a mobile phone application.

[0187] The dynamic ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is an authentication method of a dynamic two-dimension code instruction. A dynamic two-dimension code token comprises a collection module, a display module, an authentication module, an instruction module, a management module, a two-dimension code module and a control module. The control module, the management module, the authentication module, the instruction module and the two-dimension code module are integrated in the same microprocessor. The collection module is connected with the control module and the two-dimension code module. The display module is connected with the control module and the two-dimension code module. An authentication system of the dynamic two-dimension code instruction is the integration of service programs for carrying out the functions of authentication of the dynamic two-dimension code instruction, token synchronization, and management and configuration of relevant states of the token. The dynamic two-dimension code instruction has the characteristics of preventing exposure, being high in intensity, unpredictable, resistant to replay and disavowal, free of memory, accurate and efficient, and having physical isolation and bidirectional authentication, and safety of identity authentication is improved remarkably.

Description

technical field [0001] The invention belongs to the field of information security, relates to two-dimensional code technology and dynamic token technology, in particular to a dynamic two-dimensional code token and a dynamic two-dimensional code password authentication method. Background technique [0002] With the advent of the information age, people rely more and more on information systems, and people pay more and more attention to the security of information systems. [0003] Passwords have the highest security requirements in information systems. Once passwords are stolen or lost, information systems may be accessed without authorization, resulting in direct economic losses and indirect reputation losses. The losses are huge and even fatal. [0004] According to a survey of thousands of system administrators conducted by a security association in the United States, passwords are the first thing most information systems are attacked and broken through. [0005] The pass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 宋博韬石秀英张贵良
Owner 宋博韬
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products