Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and its identity authentication system

An identity authentication and algorithm technology, applied in the field of identity authentication system, can solve the problems of right holder infringement, loss, password user password leakage, etc., and achieve the effect of reducing the probability of illegal theft, improving security and the effectiveness of authentication

Inactive Publication Date: 2004-07-21
HUNAN HONGDA TECH
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the user directly enters the fixed password for identity authentication and then the identity authentication system performs effective identity authentication, in many cases, the user's input is easily illegally recorded and the password is leaked
For example, the identity recognition system based on network applications is often intercepted by malicious programs by recording user input information, and the input of passwords in public places such as banks is easily illegally recorded, resulting in user password leakage and other hidden dangers.
In this way, the user is forced to carefully protect the input process from being recorded while frequently changing the password, which brings great security risks and inconvenience to the user.
When using the network, whether it is online banking, online games, sending and receiving emails, etc., identity authentication is required first. At this time, the information input from the keyboard is easily recorded by the Trojan horse program in the network. name, password, etc., if illegally obtained, it is likely to cause infringement to the right holder and cause him to suffer losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and its identity authentication system
  • Identity authentication method and its identity authentication system
  • Identity authentication method and its identity authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be described in further detail below through specific embodiments and in conjunction with the accompanying drawings.

[0021] like figure 1 , figure 2 As shown, the method and system of the present invention in web-based applications:

[0022] The functions of the data processing device and the random code generating device are realized by a server system for network identity authentication, such as a server equipped with server systems such as Windows Server and Unix. Its function is to generate a random password after receiving the application request and transmit the random password to the personal computer terminal through the public data network, and then the computer terminal will use the input code of the random password and the identity authentication fixed password through the preset algorithm operation or directly send the random password and the fixed password for identity authentication are transmitted back to the server, and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

When system receives authentication request, random code generation device generates a random cipher. With random cipher and presetting fixed cipher for id authentication being received, digital processing device calculates and generates input code based on preset algorithm. The digital processing device obtains random cipher and fixed cipher of id authentication from the said input code based on inverse computation of preset algorithm so as to carry out id authentication, or id authentication is carried out based on input code directly. In each authentication, the invention uses different cipher. Thus, even input cipher is revealed or stolen in this time, encroachment is not possible to be made for obligee. The invention raises safety. Fixed cipher is not necessary to be modified frequently. Different transmission paths combined in the invention is also lowered probability of data to be stolen.

Description

【Technical field】: [0001] The invention relates to an identity authentication system and method for identity authentication. 【Background technique】: [0002] Existing password-based identity authentication systems, in practical applications, such as entering email systems, financial systems, passing through access control systems, opening safes, etc., generally need to enter a fixed password set by the customer for identity authentication. Since the user directly enters the fixed password for identity authentication and then the identity authentication system performs effective identity authentication, in many cases, the user's input is easily illegally recorded and the password is leaked. For example, the identification system based on network applications is often intercepted by malicious programs by recording user input information, and the input of passwords in public places such as banks is easily illegally recorded, resulting in user password leakage and other hidden d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/28H04L9/32
Inventor 徐文祥
Owner HUNAN HONGDA TECH