Authentication method, system and device based on improved cryptographic algorithm

A cryptographic algorithm and authentication technology, applied in computing, computer parts, character and pattern recognition, etc., can solve problems such as hidden dangers, insufficient security of authority identification methods, and easy to be seen by others, and achieve the goal of improving security. Effect

Pending Publication Date: 2022-04-08
CHINA SOUTHERN POWER GRID COMPANY
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the password-based authentication method is too simple, easy to crack, and cannot accurately judge the authenticity of the identity of the unlocker; moreover, the user is easily seen by others during the process of entering the password, which has certain security risks
[0003] Therefore, the current permission identification method has the defect of insufficient security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, system and device based on improved cryptographic algorithm
  • Authentication method, system and device based on improved cryptographic algorithm
  • Authentication method, system and device based on improved cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0056] The authentication method based on the improved cryptographic algorithm provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the mobile terminal 102 communicates with the server 104 and the password lock 106 respectively through the network. The server 104 can receive the user group identification and biometric information corresponding to the user to be identified sent by the combination lock 106, and obtain the target registration biometric information corresponding to the user group identification by quer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authentication method, system and device based on an improved cryptographic algorithm, computer equipment and a storage medium. The method comprises the following steps: acquiring target registration biological characteristic information corresponding to a user group identifier by utilizing the user group identifier of a to-be-identified user through a server, identifying the identity of the to-be-identified user according to a comparison result of the target registration biological characteristic information and the biological characteristic information of the to-be-identified user sent by a coded lock, and sending the to-be-identified user to the coded lock after the identity authentication is passed. The authentication passing information is sent to the coded lock, the coded lock receives the information, generates a random key and sends the random key to the server and the mobile terminal of the user to be recognized, and therefore the server can compare the key input by the user and sent by the mobile terminal with the random key, and authority authentication is conducted on the coded lock unlocking authority of the user to be recognized. Compared with a traditional verification mode through a password, the password lock unlocking authority of the user is authenticated by verifying the biological characteristics and the random key of the user, and the authority identification safety is improved.

Description

technical field [0001] The present application relates to the field of security technology, in particular to an authentication method, system, device, computer equipment and storage medium based on an improved cryptographic algorithm. Background technique [0002] Combination lock is a kind of security equipment to protect equipment or information security, so it is very important to improve the security of combination lock. At present, many combination locks only use simple passwords for identity authentication and authority identification. However, the password-based authentication method is too simple, easy to crack, and cannot accurately judge the authenticity of the identity of the unlocker; and the user is easily seen by others during the process of entering the password, which has certain security risks. [0003] Therefore, the current permission identification method has the defect of insufficient security. Contents of the invention [0004] Based on this, it is n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/31G06F21/60G06K9/62
Inventor 吴金宇陶文伟胡荣苏扬仇伟杰江泽铭
Owner CHINA SOUTHERN POWER GRID COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products