Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method adopting static passwords as source to generate dynamic passwords

A technology of dynamic password and static password, applied in the direction of encryption device with shift register/memory, etc., can solve the problems of static password theft, easy to be stolen, and reduced risk of static password being stolen, so as to reduce the risk of being stolen. The effect of stealing and improving security

Inactive Publication Date: 2014-02-26
周灿旭
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. Easy to be stolen: Since the input of the static password is directly typed by the user on the keyboard by pressing the corresponding number or letter, the third person can obtain the password only by recording or watching the input process of the password, and the password can be obtained by viewing it once. It is possible to steal all the information of the password, therefore, the static password is easy to be stolen by others at once
[0008] First, the dynamic verification code requires additional equipment to receive or generate it, and there is a risk that the dynamic verification code will be intercepted or the special algorithm for generating the dynamic verification code will be cracked;
[0009] Second, the user's static password is separate from the existing dynamic password and needs to be entered into the client together with the dynamic verification code, which cannot achieve the purpose of protecting the user's original static password from being peeped by others. To add a layer of protection for identity verification, the risk of static passwords being stolen has not been reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method adopting static passwords as source to generate dynamic passwords
  • Method adopting static passwords as source to generate dynamic passwords
  • Method adopting static passwords as source to generate dynamic passwords

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Such as figure 1 and Figure 4 As shown, the method for generating a dynamic password using a static password as a source in Embodiment 1 of the present invention includes the following steps:

[0047] (S1) The server stores the static password and index code preset by the user;

[0048] (S2) Every time the server receives a password input request sent by the user through the user terminal, it randomly generates an intermediate password mapping relationship set, and the index code is used as one of the password mapping relationships in the intermediate password mapping relationship set to select The base point is used to designate one of the intermediate password mapping relationship sets as the intermediate password used for the current password input, and then generate a dynamic password through the dynamic password mapping relationship between the intermediate password and the input keyboard; and, the server randomly generates The password mapping relationship set ...

Embodiment 2

[0066] The method for generating a dynamic password using a static password as a source in Embodiment 2 of the present invention is basically the same as Embodiment 1, and their difference lies in that in Embodiment 2, it is not necessary to use the index code to calculate the positioning reference bar through a specific calculation rule. Instead, use the index code +1 as the first mapping mark of the static password on the positioning reference bar. At this time, the index code is any natural value. Of course, you can also directly use the value of the index code as the static code. The first bit of the password on the positioning reference bar is mapped to the marker bit, but at this time the index code should be preset to any natural value other than 0, and this method will not be described for example.

[0067] The following is an example to illustrate the specific operation steps for the user to use the index code to obtain the dynamic password through the password mapping...

Embodiment 3

[0074] The method for generating a dynamic password from a static password in Embodiment 3 of the present invention is basically the same as Embodiment 1, and their difference lies in that the input keyboard in Embodiment 3 includes ten keyboard grids. In addition, the input keyboard can also include eleven or more keyboard grids, and English characters are added as the numbers of the keyboard grids. The implementation principle is the same as that of the third embodiment, and will not be repeated here.

[0075] In the following, an example is used to illustrate the specific operation steps for the user to use the index code to obtain the dynamic password through the password mapping relationship set displayed on the operation interface of the user terminal in the third step (S3) of this embodiment:

[0076] Such as Figure 9 As shown, when the server receives the password input request sent by the user through the client, the password mapping relationship set is randomly gene...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method adopting static passwords as a source to generate dynamic passwords. The method comprises the following steps that: S1, a server end stores static passwords and index codes; S2, the server end randomly generates an intermediate password mapping relation set when the server end receives a password input request from a user end every time, wherein the index codes are used for designating one piece of relation of the intermediate password mapping relation set as intermediate passwords which is used by current password inputting, and the server end generates dynamic passwords according to a dynamic password mapping relation between the intermediate passwords and an input keyboard; S3, the server end displays the intermediate password mapping relation set on an operation interface of the user end so as to prompt the user to use the index codes to find middle passwords and to obtain dynamic passwords through using the dynamic password mapping relation between the intermediate passwords and the input keyboard; and S4, the user end transmits the dynamic passwords inputted by the user to the server end, and the server end verifies whether the dynamic passwords inputted by the user are consistent with the dynamic passwords generated in the S2. The method adopting the static passwords as the source to generate the dynamic passwords of the invention can improve the protection for the static passwords.

Description

technical field [0001] The invention relates to a dynamic password method, in particular to a method for generating a dynamic password from a static password. Background technique [0002] At present, the password input method in many fields such as finance and the Internet still uses static password as the main identity verification method, and static password input is used as identity verification alone, which has the following defects: [0003] 1. Easy to be stolen: Since the input of the static password is directly typed by the user on the keyboard by pressing the corresponding number or letter, the third person can obtain the password only by recording or watching the input process of the password, and the password can be obtained by viewing it once. It is possible to steal all the information of the password, therefore, the static password is easy to be stolen by others all at once. [0004] 2. Easier to be deciphered: Even if you can only observe the process of enter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06
Inventor 周灿旭
Owner 周灿旭
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products