Two-Dimensional Code Authentication System Based on Quantum Communication Network

A quantum communication and authentication system technology, applied in the field of two-dimensional code authentication system, can solve problems such as insufficient security, inconvenient management, and potential safety hazards, and achieve the effect of convenient and fast verification

Active Publication Date: 2020-11-17
ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1. In the prior art, in the process of using dynamic tokens for identity authentication, application terminal users need to manually input dynamic tokens, which is too cumbersome to operate and has potential safety hazards
[0011] 2. In the prior art, the key of the mobile phone token is stored in the memory of the mobile phone, which can be stolen by malicious software or malicious operations
[0012] 3. In the existing technology, the seed key of the mobile phone token is unchanged, and the security is not high enough
[0013] 4. In the prior art, the dynamic password system of each application server is independent, and the user needs to maintain multiple dynamic tokens or dynamic token software, which is inconvenient to manage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-Dimensional Code Authentication System Based on Quantum Communication Network
  • Two-Dimensional Code Authentication System Based on Quantum Communication Network
  • Two-Dimensional Code Authentication System Based on Quantum Communication Network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] QR code authentication process QRA_FLOW

[0063] The parties directly involved in QRA_FLOW include the mobile terminal MT (the current quantum key card is MTK, and its identification number is MTKID), the application terminal AT, and the application server AS (the current quantum key card is ASK, and its identification number is ASKID), The authentication service module QMT of the quantum communication service station corresponding to the current key of MTK (its identification number is QMTID), and the authentication service module QAS of the quantum communication service station corresponding to the current key of ASK (its identification number is QASID). AT users hold MT, and MT is currently paired with MTK, so AT users hold MTK.

[0064] AT users hold MTK to register with AS. The identification number assigned by AS to AT users is UID; the identification number of the bound quantum key card is MTKID. The AS stores the UID and its corresponding MTKID to the account ...

Embodiment 2

[0122] QR code authentication simplified process QRA_SFLOW

[0123] The special case of QRA_FLOW is that when the quantum communication service station corresponding to the quantum key card used by the application server and the mobile terminal is the same, that is, when there is only QAS and no QMT, the process is appropriately simplified. Its specific process is similar to the QRA_FLOW of Embodiment 1, only a few steps of communication between QAS and QMT are omitted.

[0124] See image 3 , QRA_SFLOW is as follows:

[0125] 4.1 AT sends user access request to AS;

[0126] 4.2 AS processes user access requests;

[0127] 4.3 AS sends the QR code picture to AT;

[0128] 4.4 AT displays the QR code picture;

[0129] 4.5 MT collects QR code pictures and obtains relevant information;

[0130] 4.6 MT generates a QR code response value;

[0131] 4.7 MT sends a response to AS, including QR code ID, MTKID, and QR code response value;

[0132] 4.8 AS judges the legality of the...

Embodiment 3

[0146] Simplified operation of QR code authentication process SQRA_FLOW

[0147] For the aforementioned QRA_FLOW and QRA_SFLOW, the first step needs to input the UID to the AT. If the input of the UID is complicated, the operation will be inconvenient. To further facilitate user operation, the following flow SQRA_FLOW that does not require AT users to input UID can be used.

[0148] The parties directly involved in SQRA_FLOW are the same as QRA_FLOW.

[0149] The AT user holds MTK to register with the AS, and the AS records the MTKID in the account database of the AS, which is recorded as SQRA_FLOW_REG; or not registered, which is recorded as SQRA_FLOW_UNREG. In the case of SQRA_FLOW_REG, AS can also store the user's biological characteristics corresponding to MTKID to the account database, such as fingerprint characteristics, iris characteristics, face characteristics, vein characteristics, palmprint characteristics, etc.

[0150] See Figure 4 , SQRA_FLOW is as follows: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a two-dimensional code authentication system based on a quantum communication network, which comprises an application server, an application terminal and a mobile terminal. A quantum communication service station and a quantum key card matched with the mobile terminal are also provided. A corresponding quantum key is stored between the quantum key card and the quantum communication service station; after the mobile terminal obtains a two-dimensional code generated from the application server via the application terminal, the stored quantum key card is utilized to generate a two-dimensional code response value in the matched quantum key card, the two-dimensional code response value is sent to the quantum communication service station for authentication via the application server, and an authentication result is sent to the mobile terminal and / or the application terminal via the application server for executing the related service. The system uses the mobile terminal to scan and verify the two-dimension code quickly and conveniently, and the key used for authentication is stored in the quantum key card to further improve the security.

Description

technical field [0001] The invention relates to the field of network security communication, in particular to a two-dimensional code authentication system based on a quantum communication network. Background technique [0002] During identity authentication, static passwords are easy to be stolen by malware, or cracked violently because they are fixed. In order to solve the security problem of static passwords, dynamic token technology has become popular. [0003] Dynamic tokens replace traditional static passwords with one-time passwords generated based on three variables: time, event, and key. Each dynamic token card has a unique key, which is stored on the server side at the same time. Each time the dynamic token card and the server are authenticated according to the same key, the same random parameters (time, event) and The same algorithm calculates the dynamic token to be authenticated, so as to ensure the consistency of the password bilaterally and realize the identi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04B10/70G07C9/20G07C1/10G06K19/06
CPCG06K19/06037G07C1/10G07C9/33H04B10/70H04L9/0852H04L63/08
Inventor 富尧钟一民
Owner ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products