Dynamic password authentication method and system based on two-dimensional code

A technology of dynamic password and authentication method, applied in the direction of digital data authentication, user identity/authority verification, etc., can solve the problems of input error, inconvenience and time-consuming, etc.

Inactive Publication Date: 2015-03-04
HENGBAO
View PDF7 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The generated challenge factor can be very long in theory, but it takes a long time for the use...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic password authentication method and system based on two-dimensional code
  • Dynamic password authentication method and system based on two-dimensional code
  • Dynamic password authentication method and system based on two-dimensional code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Embodiment 1. A dynamic password authentication method based on a two-dimensional code. Combine below Figure 1-Figure 4 The method provided in this embodiment will be described in detail.

[0029] see figure 1 , S101. Scanning the dynamic token to obtain a challenge factor in the form of a two-dimensional code generated by the authentication device, and decoding the challenge factor in the form of a two-dimensional code into a challenge factor in a digital form.

[0030] Specifically, see figure 2 , the authentication device randomly generates an initial challenge factor in digital form with a predetermined length, wherein the length of the initial challenge factor can be set by the user, which is not strictly limited in this embodiment; the generated initial challenge factor is encrypted using a predetermined encryption algorithm, such as , use the symmetric encryption algorithm to encrypt the initial challenge factor to form the challenge factor in the encrypted ...

Embodiment 2

[0045] Embodiment 2. A dynamic password authentication system based on a two-dimensional code. Combine below Figure 5 The system provided in this embodiment will be described in detail.

[0046] see Figure 5 , the system provided by this embodiment includes a dynamic token 500 and an authentication device 600, wherein the dynamic token 500 includes a challenge factor acquisition module 5001, a first dynamic password generation module 5002, a second encryption module 5003 and a transmission module 5004, and the authentication device 600 includes an initial challenge factor generation module 6001 , a first encryption module 6002 , a two-dimensional code encoding module 6003 , a display module 6004 , a decryption module 6005 , a second dynamic password generation module 6006 , a comparison module 6007 and an authentication determination module 6008 .

[0047] The initial challenge factor generating module 6001 in the authentication device 600 is mainly used to randomly genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic password authentication method and system based on two-dimensional codes. The method comprises the following steps: scanning a dynamic token to acquire a challenge factor with a two-dimensional code form generated by authentication equipment and decoding the challenge factor into a challenge factor with a digital form; operating by adopting a preset algorithm according to the challenge factor with the digital form, a seed secrete key, a time factor and a dynamic factor and generating a first dynamic password; transmitting the generated first dynamic password to the authentication equipment through a wireless communication link mode; comparing the first dynamic password received with a pre-generated second dynamic password through the authentication equipment; determining whether the first dynamic password passes authentication or the authentication fails according to comparison results through the authentication equipment. Through the method disclosed by the invention, the challenge factor generated by the authentication equipment can be automatically inputted into the dynamic token, and a dynamic password generated by the dynamic token can be automatically inputted into the authentication equipment, so that the problems of low manual input speed and high probability of making mistakes are solved.

Description

technical field [0001] The invention relates to the technical field of password authentication, in particular to a dynamic password authentication method and system based on a two-dimensional code. Background technique [0002] The traditional static password authentication technology has been gradually replaced by dynamic password authentication technology in recent years due to its low security. Among the dynamic password authentication technologies, the most common one is the dynamic password authentication technology based on the challenge-response mechanism. The system randomly generates a challenge factor, and then calculates a dynamic password based on the challenge factor through the token, and then the user enters the dynamic password into the authentication system, and the authentication system uses the dynamic password calculated by itself based on the challenge factor to compare with the dynamic password entered by the user. Then the authentication is successful....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06F21/36
Inventor 薛原
Owner HENGBAO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products