Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method based on dynamic token, and decryption and encryption terminal

A technology of identity authentication and dynamic token, which is applied in user identity/authority verification and key distribution, which can solve problems such as key leakage and system loss of security, so as to improve security, avoid replay attacks, and increase the speed of verification Effect

Inactive Publication Date: 2019-09-10
TSINGHUA UNIV
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the current method, the master key used for each user is the same, and the dynamic password is encrypted. If the device used by a user is attacked and the key stored in it is leaked, the entire system will lose security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on dynamic token, and decryption and encryption terminal
  • Identity authentication method based on dynamic token, and decryption and encryption terminal
  • Identity authentication method based on dynamic token, and decryption and encryption terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0020] An embodiment of the present invention provides an identity authentication method based on a dynamic token, which can be applied to the above identity authentication scenario. The execution subject corresponding to this method may be a decryption terminal or an encryption terminal, or may be implemented interactively by a decryption termina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an identity authentication method based on a dynamic token and a decryption and encryption terminal. The method comprises the steps: carrying out the encryption operation of ID data according to a main secret key if the dynamic token comprising an encryption end one-time password and the ID data is received, and obtaining a decryption end personal secret key; performing encryption operation on the current timestamp of the decryption end according to the personal secret key of the decryption end to obtain a one-time password of the decryption end, and ifthe one-time password of the decryption end is consistent with the one-time password of the encryption end, passing identity authentication; wherein the encryption end one-time password is obtained after the encryption end personal secret key carries out encryption operation on the current timestamp of the encryption end, and the encryption end personal secret key is obtained after the decryptionterminal carries out encryption on the ID information according to the main secret key. The invention has the advantages that the secret keys used by users are different, the system safety is improved under the scene that the terminal safety cannot be guaranteed, bidirectional communication is not needed, the verification speed is increased, the one-time password is obtained according to the timestamp, and the replay attack can be effectively avoided.

Description

technical field [0001] The invention relates to the field of identity authentication, in particular to an identity authentication method based on a dynamic token, and a decryption and encryption terminal. Background technique [0002] Graphical tokens such as QR codes and barcodes have been widely used in the field of identity authentication. In particular, in access management systems such as access control systems, the application of graphic tokens has been quite popular. The current two-dimensional code token is mainly implemented through a static two-dimensional code. This method is difficult to prevent attacks such as voyeurism and screenshots, which affects the security of the entire access management system. [0003] At present, this problem can be avoided to a certain extent by means of graphical OTP tokens. According to various factors such as time and ordinal number and the key, a dynamic password is generated through an encryption algorithm operation, and displa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0863H04L9/0866H04L9/0872H04L9/3228
Inventor 高一川党凡丁旋刘云浩
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products