Safety authentication mechanism of remote password

A technology for authenticating passwords and remote devices, applied to electrical components, transmission systems, etc., can solve problems such as stealing and sending

Active Publication Date: 2014-08-27
CHINA UNIONPAY
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, when a user enters a password, the password is generally stored in the memory in plain text, so it may be stolen by malware pre-embedded in the terminal and sent to a remote illegal user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety authentication mechanism of remote password
  • Safety authentication mechanism of remote password
  • Safety authentication mechanism of remote password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] figure 1 A schematic diagram of a typical distributed processing environment. like figure 1 As shown, the distributed processing environment 10 includes a network 110 (which may be, for example, a wide area network, a metropolitan area network or a local area network), a plurality of terminals 120A, 120B, 120C, and 120D that access the network 110 in a wired or wireless manner (it should be understood that The number of terminals shown here is merely exemplary) and the plurality of servers 130A, 130B, and 130C (again, it should be understood that the number of servers shown here is only exemplary). The above-mentioned distributed processing environment can be based on client / server architecture, wherein the logical functions of the application system include display logic, application logic and data processing logic, wherein the display logic and application logic are implemented on the client side and the data processing logic is implemented on the server side. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety password authentication method which can be used in user password authentication of a C/S or B/S mode. According to the password authentication method, single-character input and multiple Hash modes are adopted. Meanwhile, by combining validate codes and a local prospective validation mechanism, authentication safety is greatly guaranteed, and present user experience is not changed for users.

Description

technical field [0001] The invention relates to identity authentication technology, in particular to a security authentication method for remote passwords in a distributed processing environment and a server and a terminal for realizing the method. Background technique [0002] Identity authentication technology is an important part of the information security system, which verifies the legitimacy and authenticity of the user's identity in the information system, thus providing a basis for granting user access rights. The judgment of the consistency between the visitor's physical identity and digital identity can be based on passwords, tokens or biological characteristics, among which the method based on passwords is the most commonly used. [0003] In the password-based method, when a user logs in to the system, he needs to enter a user name (also called a user account) and a corresponding password. In order to prevent the use of dictionary files to brute force password cr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 杨阳华锦芝
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products