Unlock instant, AI-driven research and patent intelligence for your innovation.

Dynamic password for electronic key

A dynamic password and electronic key technology, applied in electrical components, user identity/authority verification, digital transmission systems, etc., can solve non-subjective leakage of users, data loss, and password beryllium dictionary attacks. Crack and other problems to achieve the effect of high security performance

Inactive Publication Date: 2017-03-22
SHAANXI YUHANG ELECTRONICS
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method of static user password has the following security risks: ①The password may be intercepted and monitored during network transmission; ②The password may be attacked by a dictionary. The possibility of cracking; ③ the possibility of non-subjective disclosure by the user in the process of using the password; ④ the possibility of data loss due to the user forgetting the password

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The dynamic password of a kind of electronic key described in the present invention, it comprises the following steps:

[0014] (3) User identity authentication process of dynamic password;

[0015] (4) The server creates a session after receiving the request;

[0016] (5) The user starts the III browser, enters the website link address, and sends a session request to the server

[0017] (6) Generate and save a random string x, and then hide the random string in the page and return it to the client;

[0018] (7) The client submits the received random string x to the electronic digital key inserted in the machine, and performs calculations inside the electronic key. The calculation result is Rc=HMAC-MD5(KEY, X), and KEY is stored in the key key. Then the user uses Rc as the user password, and attaches the serial number ID and password Rc of the user key to the link address of the data request and sends it to the server.

[0019] (8) The server creates a session after...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a dynamic password for an electronic key. The dynamic password is characterized by comprising a user identity authentication process of the dynamic password and a process of creating a session after a server receives a request. Preferably, the user identity authentication process of the dynamic password comprises the following steps that: a user starts a browser III; the user inputs a website linkage address; and the user sends a session request to the server. In the dynamic password for the electronic key, a system automatically generates a random character string and saves the random character string until a session ends every time the session is created, so that user passwords generated by different random character strings every time are different; corresponding relationships between fixed user numbers and different dynamic passwords are formed; data access which is performed by re-creation of a session through the browser III is rejected by the server even if an illegal user illegally acquires an ID number and a password used when the user accesses the server at a certain time; and very high security performance is achieved.

Description

technical field [0001] The invention relates to a dynamic password of an electronic key. Background technique [0002] Password is a kind of authentication and access control mechanism commonly used in computer applications at present. In traditional network applications, a frequently used user account management mode is a static correspondence between user names and passwords. That is: when the user logs in to the remote server, the system requires the user to enter the user name and a few passwords to determine the legal identity of the user. The user can regularly modify his password as necessary, and within a certain period of time, the user's password is fixed. of. This method of static user password has the following security risks: ①The password may be intercepted and monitored during network transmission; ②The password may be attacked by a dictionary. The possibility of cracking; ③ the possibility of non-subjective disclosure by the user in the process of using th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0846H04L9/3228
Inventor 郝青
Owner SHAANXI YUHANG ELECTRONICS