Intelligent cipher signature identity authentication bidirectional authentication method and system
A smart password and identity authentication technology, applied in the field of smart password signature identity authentication two-way authentication, can solve the problems of identity forgery and identity refusal, such as difficult judicial evidence collection, to achieve protection and social public interest security, ensure uniqueness and non-repudiation, The effect of ensuring uniqueness and reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0015] What this embodiment describes is a method and system for two-way authentication of smart password signature identity authentication. The method and system include: a mobile phone smart password signer, a communication network, an authentication server, an authentication client, the Internet, and an application server, such as figure 1 Shown. The mobile phone smart password signer includes a 60-second change of the time seed dynamic password. The user uses the rule key and the dynamic password to calculate the signature and transform the smart password through the rule key operation key and the rule key operation module. Communication networks include mobile communication networks, the Internet, wired telephone networks, local area networks, and wireless communication networks, including all communication networks that are used in the public domain and can communicate with each other. The authentication server includes the control of all remote users' access to the networ...
Embodiment 2
[0024] This embodiment is an improvement in the method and system for mutual authentication of the smart password signature identity authentication described in the first embodiment and the system uses the rule key and the mobile phone smart password signer to calculate the signature and transform the smart password to perform identity authentication mutual authentication. image 3 Shown.
[0025] The sub-steps in the step of performing identity authentication and mutual authentication by calculating the signature and transforming the smart password through the rule key and the mobile smart password signer include:
[0026] The login authentication client enters the user account number and the mobile smart password signer dynamic password to be transmitted to the authentication server, and the authentication server retrieves the user account information from the database including the sub-step of dynamic password verification.
[0027] If the verification is correct, the authenticati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


