Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Login verification method and system based on SM3 algorithm and random challenge code

A login verification and random challenge technology, applied in the field of information security, can solve problems such as low randomness of data, short digits of summary information, security risks, etc., achieve high randomness of data, improve randomness and one-time, and secure sex high effect

Inactive Publication Date: 2018-07-31
广州江南科友科技股份有限公司
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, international algorithms such as MD5 are generally used to calculate the digest of encrypted data, but the number of digits of the digest information of international algorithms such as MD5 is relatively short, and the collision attack on it is becoming more and more easy to realize with the development of computer capabilities. less secure
In addition, international algorithms such as MD5 use timestamps as the only login challenge code, and the randomness of the data is not high. Such an implementation mechanism has certain risks in terms of security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login verification method and system based on SM3 algorithm and random challenge code
  • Login verification method and system based on SM3 algorithm and random challenge code
  • Login verification method and system based on SM3 algorithm and random challenge code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further explained and described below in conjunction with the accompanying drawings and specific embodiments of the description. For the step numbers in the embodiment of the present invention, it is only set for the convenience of explanation and description, and there is no limitation on the order of the steps. The execution order of each step in the embodiment can be carried out according to the understanding of those skilled in the art Adaptive adjustment.

[0045] refer to figure 1 , the present invention is based on SM3 algorithm and the login verification method of random challenge code, comprises the following steps:

[0046] Abstract calculation based on SM3 algorithm to store user registration information;

[0047] According to the stored registration information, login verification is performed on the user's login information based on the double login random number generated at the login terminal and the background system respe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a login verification method and system based on an SM3 algorithm and a random challenge code. The method comprises the following steps: performing summary calculation based onthe SM3 algorithm to store registration information of a user; and based on the stored registration information, performing login verification on the login information of the user based on double login random numbers. The system comprises a storage module and a verification module. According to the login verification method and system, the registration information of the user is stored based on the SM3 algorithm, compared with the existing international algorithms such as MD5, the irreversible SM3 algorithm can avoid the playback of the user login data and improve the security of the login data. In addition, based on the stored registration information, the login verification is performed on the login information of the user based on double login random numbers, thus improving the randomness and one-time of the login data, further preventing the replay attack, the data randomness and the security are high, and the login verification method and system can be widely applied to the information security field.

Description

technical field [0001] The invention relates to the field of information security, in particular to a login verification method and system based on an SM3 algorithm and a random challenge code. Background technique [0002] Replay: Replay Attacks, also known as replay attacks, replay attacks, or Freshness Attacks, refer to the attacker sending a packet that the destination host has received, especially in the authentication process, for The package received by authenticating the user's identity is used to deceive the system. It is mainly used in the identity authentication process and destroys the security of authentication. [0003] The SM3 password digest algorithm is the Chinese commercial password hash algorithm standard announced by the State Cryptography Administration of China in 2010. The SM3 algorithm is suitable for digital signature and verification in commercial cryptographic applications, and is an improved algorithm based on SHA-256. The SM3 algorithm adopts ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06
CPCH04L9/0643H04L9/3239
Inventor 房寒平张永定杨武
Owner 广州江南科友科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products