A dynamic identity certification method and system

An identity authentication and dynamic technology, applied in the field of information security authentication, can solve problems such as the inability to guarantee real-time authentication, and achieve the effects of improving security, reducing usage costs, and ensuring real-time performance.

Inactive Publication Date: 2004-11-17
HUAZHONG UNIV OF SCI & TECH
View PDF4 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, this method cannot guarantee the real-time performance of authentication when the wireless network communication is crowded.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A dynamic identity certification method and system
  • A dynamic identity certification method and system
  • A dynamic identity certification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] Taking the banking system as an example below, the present invention will be further described in detail in conjunction with the accompanying drawings.

[0072] 1. System Structure Description

[0073] FIG. 1 is an overall structural diagram of the authentication system, including a user terminal 6, a user information server 1, an authentication server 2 and a mobile phone token 5. User information server 1 is the data server in the system, using the oracle9i database system, which stores the form set according to the identity authentication protocol, and provides each user information required in the authentication process. It includes the following fields: ID number, user ID, registration password Pr, encryption and decryption key Ke, current work password Ks (the same as the current work password stored in the mobile phone token), the sign that the account is being used ( prevent competitive attacks) and mobile phone numbers, etc. The user information server 1 rece...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a kind of dynamic identification certificating method and system. The steps are: 1. inputs the user's information, and sends out certification query to the server; 2. the server receives the query, verifies the validity of the user's information, instructs the legal user to input the terminal code; 3. the user generates the terminal code through the mobile phone token; 4. the user inputs the user terminal code through the user terminal and transmitted to the certification server; 5. if the code received by the certification server is consistent to the generated one, then it passes the identification certification; otherwise, it won't pass. The system includes a user terminal, the user information server, the certification server and mobile phone token. The certification server receives and completes the service application of the user; the mobile phone token is used to generate synchronous identification certificating code.

Description

technical field [0001] The invention belongs to information security authentication technology, which is realized by comprehensive utilization of electronic computer, information coding and mobile communication technology, and can be applied to many systems and fields requiring identity authentication such as banks and securities. Background technique [0002] Identity authentication is one of the important mechanisms to achieve network security. In secure network communication, all parties involved in the communication must pass some form of identity authentication mechanism to verify whether their identities are consistent with what they claim, and then they can achieve different User access control and logging. As early as the early 1970s, the International Bank Card Association encountered the problem of how to authenticate users to ensure system security. With the rapid development of information technology, eavesdroppers can use low-level peeping methods to obtain pas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04W12/06H04W12/084
Inventor 胡汉平王祖喜吴晓刚曾伟国吴俊王凌斐刘博
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products