Unlock instant, AI-driven research and patent intelligence for your innovation.

Intelligent cipher signature identity authentication bidirectional authentication method and system

A smart password and identity authentication technology, applied in the field of smart password signature identity authentication two-way authentication, can solve the problems of identity forgery and identity refusal, such as difficult judicial evidence collection, to achieve protection and social public interest security, ensure uniqueness and non-repudiation, The effect of ensuring uniqueness and reliability

Active Publication Date: 2017-06-30
BEIJING PASSWORD TECH
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the separation of virtual identity and physical identity, identity forgery and identity denial are difficult to obtain judicial evidence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent cipher signature identity authentication bidirectional authentication method and system
  • Intelligent cipher signature identity authentication bidirectional authentication method and system
  • Intelligent cipher signature identity authentication bidirectional authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0015] What this embodiment describes is a method and system for two-way authentication of smart password signature identity authentication. The method and system include: a mobile phone smart password signer, a communication network, an authentication server, an authentication client, the Internet, and an application server, such as figure 1 Shown. The mobile phone smart password signer includes a 60-second change of the time seed dynamic password. The user uses the rule key and the dynamic password to calculate the signature and transform the smart password through the rule key operation key and the rule key operation module. Communication networks include mobile communication networks, the Internet, wired telephone networks, local area networks, and wireless communication networks, including all communication networks that are used in the public domain and can communicate with each other. The authentication server includes the control of all remote users' access to the networ...

Embodiment 2

[0024] This embodiment is an improvement in the method and system for mutual authentication of the smart password signature identity authentication described in the first embodiment and the system uses the rule key and the mobile phone smart password signer to calculate the signature and transform the smart password to perform identity authentication mutual authentication. image 3 Shown.

[0025] The sub-steps in the step of performing identity authentication and mutual authentication by calculating the signature and transforming the smart password through the rule key and the mobile smart password signer include:

[0026] The login authentication client enters the user account number and the mobile smart password signer dynamic password to be transmitted to the authentication server, and the authentication server retrieves the user account information from the database including the sub-step of dynamic password verification.

[0027] If the verification is correct, the authenticati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an intelligent cipher signature identity authentication bidirectional authentication method and system, which can keep off a phishing website, identity forging and identity denial. The system comprises the intelligent cipher signature device of a mobile phone, a communication network, an authentication server, an authentication client, the Internet and an application server. The method comprises the operating steps of operation of the intelligent cipher signature device of the mobile phone, operation of a regular secret key, operation of calculating a signature algorithm by the regular secret key, and identity authentication bidirectional authentication through calculation of signature transformation intelligent cipher by the regular secret key and the intelligent cipher signature device of the mobile phone. By means of the intelligent cipher signature identity authentication bidirectional authentication method and system, the uniqueness and undeniability of information, a transaction website and the identity of a user are guaranteed, so that identity authentication safety and system safety are authentic and reliable.

Description

Technical field [0001] The invention relates to an intelligent password signature identity authentication two-way authentication method and system, a method and system for preventing phishing websites and identity forgery and identity denial, and a method and system for authentic and reliable identity authentication. Background technique [0002] In the age of network information, each of us has a large number of authentication passwords, such as power-on passwords, email passwords, bank passwords, payment passwords, forum login passwords, etc.; have IC smart cards, USBKEYs, etc., have unique fingerprints and other biological characteristics Recognition. These are the authentication methods of current identity authentication technology: 1. What do you know. Prove your identity based on the information you know, such as passwords, passwords, and so on. Assuming that this information is known by others, others can forge your identity. 2. What do you have. Prove your identity ba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0863H04L9/3228H04L9/3273H04L63/0838H04L63/0869
Inventor 张师祝
Owner BEIJING PASSWORD TECH