A two-factor identity authentication method based on light wave information

An authentication method and identity authentication technology, applied in the field of two-factor identity authentication based on light wave information, can solve the problem of poor challenge code non-uniqueness, and achieve the effect of improving non-uniqueness, ensuring security, and providing security barriers

Active Publication Date: 2017-03-29
SHANGHAI PEOPLENET SECURITY TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the technical problem that the existing two-factor identity authentication method is not unique because the challenge code is easily affected by a single parameter such as time in the challenge code generation process, the present invention provides a two-factor identity authentication method based on light wave information. The absoluteness and uniqueness of information, using light wave information and time-based algorithms to generate challenge codes, compared with the existing technology that only uses challenge codes generated by time factors, the present invention can improve the non-uniqueness of challenge codes , so as to ensure the security of the identity authentication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A two-factor identity authentication method based on light wave information
  • A two-factor identity authentication method based on light wave information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0018] First, please refer to figure 1 , figure 1 It is a method flowchart of a two-factor identity authentication method based on light wave information in the present invention, and the authentication method includes the following steps:

[0019] Step 101: The laser transmitter emits light wave information, and the light wave is light of one or more colors;

[0020] Step 102: align the light wave receiver with the laser transmitter to receive the light wave information, and forward the received light wave information to the light wave spectrum identification system, and the light wave receiver can identify primary colors;

[0021] Step 103: The light wave spectrum recognition system generates and outputs binary coded information in a predetermined format according to the light wave information, and the light wave spectrum recognition s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an optical wave information based two-factor identity authentication method. The optical wave information based two-factor identity authentication method includes that an optical wave receiver receives optical wave information emitted from a laser emitter; predetermined format of binary coding information is generated by an optical wave spectrum recognition system according to the optical wave information; the binary coding information is encrypted based on time factors by an SM3 encryption algorithm through an information encryption system and a series of digital challenge codes are generated; a user inputs the digital challenge codes into a hardware token manually and encryption conversion is performed on the digital challenge codes based on the time factors by the SM3 algorithm through the hardware token to obtain a dynamic password; the user inputs the dynamic password into an identity authentication server and the authentication is performed on a user identity through the identity authentication server according to the dynamic password. According to the optical wave information based two-factor identity authentication method, the challenge codes in the two-factor identity authentication are generated based on the absoluteness and uniqueness of the optical wave information and accordingly the challenge codes cannot be affected by single parameters such as time easily.

Description

technical field [0001] The invention relates to the field of electronic authentication, in particular to a two-factor identity authentication method based on light wave information. Background technique [0002] With the development of e-commerce and the advancement of mobile terminal technology, people use mobile terminals more and more frequently for online consumption, and electronic payment has become one of the main means of payment for people. While electronic payment brings convenience to consumers, it also raises new issues for payment security. How to improve the reliability of electronic authentication is a technical problem that many electronic security technology development companies urgently need to solve. The use of dynamic passwords for user identity verification is a commonly used authentication method in electronic payment. There are time synchronization, event synchronization and challenge-response modes for the use of dynamic passwords. The dynamic pass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 谈剑锋黄彦栋丁震宇
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products