Dynamic password identity authentication system applicable to network based on software token

A software token and dynamic password technology, applied in the AAA field, can solve problems such as interception, counterfeiting, malicious borrowing, large amount of data, etc., and achieve improved security performance, strong practicability, and easy distribution Effect

Inactive Publication Date: 2003-07-23
西安海星现代科技股份有限公司
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is inconvenient to carry multiple hardware tokens or smart cards if multiple such systems are to be used
[0004] (2) Although biometric identification uses typical personal characteristics (such as face recognition, fingerprint recognition, iris scanning and voice identification) to verify user identity, it has a high degree of security, but due to the large amount of data, it is difficult to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic password identity authentication system applicable to network based on software token
  • Dynamic password identity authentication system applicable to network based on software token
  • Dynamic password identity authentication system applicable to network based on software token

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be described in further detail below in conjunction with the accompanying drawings and the inventor's specific implementation methods.

[0041] According to the technical scheme of the present invention, based on the dynamic password identity authentication system applicable to the network based on the software token, the system as a whole adopts a B / S modular structure, and the software token is iconized (see details). figure 1 ),include:

[0042] An authentication server 1;

[0043] a management console 2;

[0044] A software token 3, downloaded from the WEB site to the client's terminal equipment via the intranet or the Internet, and installed and run;

[0045] an interface component 4;

[0046] The authentication server 1 software follows the standard RADIUS protocol for international identity authentication services, and authenticates the dynamic password generated by the software token 3, so that the original application system adds mul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

B/S modularization structure is used in the system and icons are used as the software takens. The system includes the supervisors console, the software token and the interface module possessing the standard program interface and protocol. Comparing with the identity authentication system, which uses hardware tokens, intelligent cards and the biology feature recognition to generate passworks or dynamic passwords, the invented system features not need of additional device, easy of distribution, maintenance and installation etc. The passwork is changed at a time. It is not valid to use same password twice so as to prevent guess and eavesdropping etc. safety problem.

Description

1. Technical field [0001] The invention relates to the AAA technology with Authentication, Authorization and Administration as the core, and relates to the fields of dynamic password technology and the like. Specifically, a dynamic password generator—software token is made by software through the above-mentioned technology to realize the identity authentication of different log-in users in the network-based application system. 2. Background technology [0002] As we all know, any type of computer application system, such as: information website, game website, personal mailbox, online payment, remote login, enterprise information system, etc., will require the operator to input a password or password when logging in. The user password is like the user's identity certificate on the network or computer system. If it is stolen by others, it is entirely possible to pretend to be your identity for "legal" operations. Most of the application systems set passwords in a static way, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/45
Inventor 王以和陈超冯虞
Owner 西安海星现代科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products