Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intelligent password signature identity authentication method and system

A smart password and identity authentication technology, which is applied in the field of smart password signature identity authentication and authentication, can solve the problems of identity forgery and identity denial, and the difficulty of judicial evidence collection, and achieve the effect of ensuring uniqueness and reliability

Active Publication Date: 2017-07-04
BEIJING PASSWORD TECH
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the separation of virtual identity and physical identity, identity forgery and identity denial are difficult to obtain judicial evidence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent password signature identity authentication method and system
  • Intelligent password signature identity authentication method and system
  • Intelligent password signature identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0015] Described in this embodiment is a method and system for identifying and authenticating an intelligent cryptographic signature, the method and system comprising: a smart cryptographic signature device for a mobile phone, a communication network, an authentication server, an authentication client, the Internet, and an application server, such as figure 1shown. The mobile phone intelligent password signer includes a time seed that changes the dynamic password within 60 seconds, and the user uses the rule key and the dynamic password to calculate the signature and transform the smart password through the rule key operation key and the rule key operation module. Communication networks include mobile communication networks, the Internet, wired telephone networks, local area networks, wireless communication networks, and all communication networks that are used in the public domain and can communicate with each other are included. The authentication server controls all remote ...

Embodiment 2

[0024] This embodiment is an improvement in the step of using the rule key and the smart password signer of the mobile phone to calculate the signature and transform the smart password for identity authentication and authentication in the smart password signature identity authentication method and system described in the first embodiment, as follows: image 3 shown.

[0025] The sub-steps in the step of performing identity authentication and authentication by calculating signatures and transforming smart passwords with the rule key and the smart password signer of the mobile phone include:

[0026] Log in to the authentication client to enter the user account and use the rule key and the dynamic password of the smart password signer of the mobile phone to calculate the signature through the rule key operation key and the rule key operation module. The smart password is sent to the authentication server to verify the signature identity authentication, and the calculated signatur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an intelligent password signature identity authentication method and system, and is a method and system for preventing identity counterfeiting and identity denying. The method and system include a mobile phone intelligent password signature device, a communication network, an authentication server, an authentication client, an internet and an application server, and the operating steps of the method and system include a step of mobile phone intelligent password signature device operation, a step of rule key operation, a step of rule key signature calculation algorithm operation, and a step of performing identity authentication through the rule key and a calculation signature-converted intelligent password of a mobile phone intelligent password signature device. By adoption of the intelligent password signature identity authentication method and system, a signature is calculated through the rule key and a mobile phone intelligent password signature device dynamic password to perform identity authentication, thereby ensuring uniqueness and undeniability of user identity, and realizing true and reliable identity authentication security and system security.

Description

technical field [0001] The invention relates to a method and system for identifying and authenticating an intelligent password signature, which is a method and system for preventing identity forgery and identity denial, and a method and system for authentically and reliably authenticating identity. Background technique [0002] In today's network information age, each of us has a large number of authentication passwords, such as power-on passwords, email passwords, bank passwords, payment passwords, forum login passwords, etc.; IC smart cards, USBKEYs, etc., and unique fingerprints and other biological characteristics identify. These are the authentication methods of the current identity authentication technology: 1. What do you know. Prove your identity based on information you know, such as passwords, passwords, etc. Assuming this information is known by others, others can forge your identity. Two, what do you have. Prove your identity based on what you have, such as I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/16H04L29/06
CPCH04L9/16H04L9/3226H04L9/3247H04L63/0846
Inventor 张师祝
Owner BEIJING PASSWORD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products