Password compiling method based on authentication terminal

A terminal and password technology, which is applied in the field of network and information security, can solve problems such as the inability to confirm the identity authenticity of network activity personnel, and achieve the effect of accurately confirming identity authenticity, ensuring authenticity, and ensuring absolute security

Inactive Publication Date: 2020-05-26
BEIJING PASSWORD TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the current identity authentication method, the authentication system can only confirm the legitimacy of what is known and possessed, including the unique physical characteristics, but cannot confirm the authenticity of the identities of each other, including the unique physical characteristics.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password compiling method based on authentication terminal
  • Password compiling method based on authentication terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0015] A process of creating a password method based on an authentication terminal is as follows: figure 1 As shown, the running steps are:

[0016] The step of authenticating the terminal operation, the authentication terminal is the authentication terminal authorized by the authentication system for the network active personnel, and the authentication system administrator binds the authentication terminal with the identity of the network active personnel to ensure the uniqueness of the authentication terminal and the identity of the network active personnel; The authentication terminal operation interface is equipped with regular keys and fingerprint keys, including regular keys for addition, regular keys for subtraction, regular keys for multiplication, regular keys for misplacement, regular keys for carry, regular keys for abdication, regular keys for numbers 1, and regular keys for 2 Number regular key, number regular key of 3, number regular key of 4, number regular key ...

Embodiment 2

[0027] This embodiment is an improvement in the steps of creating a password based on the authentication terminal described in the first embodiment, using the authentication terminal, the identification rule key, the identity certification fingerprint, and human behavior. figure 2 shown.

[0028] The sub-steps in the step of creating a password by authenticating the terminal and identity identification rule key and identity proof fingerprint and human behavior include:

[0029] The sub-steps of operating the authentication terminal rule key and fingerprint key to create a password through the identity identification rule key and identity certification fingerprint and human behavior;

[0030] The authentication terminal is based on the operation rule key and fingerprint key of the network active personnel. Through the microprocessor and memory, the identity identification rule key and identity certificate fingerprint identification is correct. The instruction key signature mod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of network and information security, and in particular relates to a password compiling method based on an authentication terminal in the field of network and information security. The method comprises the operation steps of authenticating terminal operation, identity identification rule secret key operation, identity authentication fingerprint operation, human behavior operation, and password compiling through the authentication terminal, the identity identification rule key, the identity certificate fingerprint and the behavior of the person. According to the password compiling method based on the authentication terminal, which is provided by the invention, the authentication terminal compiles a password based on the operation rule key and the fingerprint key through a microprocessor, the memory identity identification rule key and the identity certification fingerprint identity authentication and dynamic password digital signature; mutual identity authenticity of network activity personnel who compile the password operation rule key and the fingerprint key can be accurately confirmed; real and reliable identity authentication is realized; and absolute security of network resource authorized access is guaranteed.

Description

technical field [0001] The invention relates to the field of network and information security, in particular to a method for compiling a password based on an authentication terminal in the field of network and information security. Background technique [0002] The establishment of passwords is the basis for identity authentication to confirm the authenticity of each other's identities, and it is also the basis and guarantee of network information security. The current identity authentication is to use what you know and have, including unique physical characteristics, to confirm the authenticity of the identity of network operators. The first way is known, such as static password or dynamic password and so on. The authentication system confirms the authenticity of each other's identities by logging in with static passwords or dynamic passwords. Authentication-based systems can only confirm the legitimacy of static passwords or dynamic passwords, but cannot confirm the auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3226H04L9/3231H04L9/3247H04L63/0807H04L63/0861
Inventor 不公告发明人
Owner BEIJING PASSWORD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products