An intelligent cryptographic signature authentication two-way authentication method and system
A technology of intelligent password and identity authentication, applied in the field of two-way authentication of intelligent password signature identity authentication, can solve the problems of identity forgery and identity refusal, such as difficult judicial evidence collection, to achieve protection and social public interest security, ensure uniqueness and non-repudiation, The effect of ensuring uniqueness and reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0015]Described in this embodiment is a method and system for two-way authentication of intelligent cryptographic signature identity authentication. figure 1 shown. The mobile phone intelligent password signer includes a time seed that changes the dynamic password within 60 seconds, and the user uses the rule key and the dynamic password to calculate the signature and transform the smart password through the rule key operation key and the rule key operation module. Communication networks include mobile communication networks, the Internet, wired telephone networks, local area networks, wireless communication networks, and all communication networks that are used in the public domain and can communicate with each other are included. The authentication server includes controlling all remote users' access to the network and providing comprehensive authentication, authorization and auditing service functions. The authentication client is an application system terminal that needs ...
Embodiment 2
[0024] This embodiment is an improvement in the steps of two-way authentication of identity authentication by using the rule key and the smart password signer of the mobile phone to calculate the signature and transform the smart password to carry out the two-way authentication of identity authentication in the intelligent password signature identity authentication method and system described in the first embodiment. image 3 shown.
[0025] The sub-steps in the step of using the rule key and the smart password signer of the mobile phone to calculate the signature and transform the smart password to perform identity authentication and two-way authentication include:
[0026] The login authentication client enters the user account number and the dynamic password of the smart password signer of the mobile phone and transmits it to the authentication server, and the authentication server calls out the user account information from the database including the dynamic password for co...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


