Dynamic encrypting device in network and its password identification method

A dynamic encryption and password technology, applied in secure communication devices, user identity/authority verification, instruments, etc., can solve problems such as stealing user passwords

Active Publication Date: 2005-03-02
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] A dynamic encryption device and its password authentication method in the network is an identity authentication device and method, and its main purpose is to solve the problem that current Trojan horse programs often steal user passwords

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic encrypting device in network and its password identification method
  • Dynamic encrypting device in network and its password identification method
  • Dynamic encrypting device in network and its password identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] figure 1 Among them, the data management device 1 can be a PC server or a host computer, runs a database management system, stores enterprise data and customer information, such as user names, passwords, etc., and is responsible for customer access management after authentication.

[0021] The service provider 2 can be a web server or a server providing access. Provide clients with services based on http and https protocols, dynamically generate web page files, provide them to client terminal devices, and interact with client terminal devices. When the client terminal device 7 starts to access the service related to security in the service provider 2, if the user has not passed the authentication, the service provider 2 requires user authentication, obtains a random password encrypted command string from the security service device 4, and generates a user The initial data required for authentication is sent to the client terminal device 7, and the initial data may be a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a dynamic encipheror and its password certification method in a network of data certification field. The device includes a data management device, a service provide device, an internal network, a safety service device, a network safety device, a shared network and a customer end device. The method includes the following steps: The customer end requests for identity certification, a service provide device responds the request to generate initialized data and send it to the customer end which receives the data, checks and downloads the latest edition password input control parts to display its screen, the user inputs the customer identification, clicks a picture region with password character for inputting the password which controller converts the click position to an intermediate value and ciphers it, judges if the input is finished and sends certification data to the service provide device receiving it for certification and returning the result to the customer end which displays the result.

Description

technical field [0001] The invention relates to the technical field of data authentication in the network, in particular to a dynamic encryption device in the network and a password authentication method thereof. Background technique [0002] Password authentication methods include static password authentication methods and dynamic password authentication methods. The password of the current static password authentication method is easily stolen by a Trojan horse program, which is very unsafe. Current dynamic password authentication methods are all based on smart tokens. The hard token method is highly secure but requires a considerable investment in hardware equipment. The soft token method soft token software and static passwords may also be obtained by Trojan horses. [0003] In e-commerce, user identity authentication is the primary link of system access control. However, Trojan horse programs steal passwords constantly, causing certain economic losses to customers and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/18H04L9/32
Inventor 罗巨明赵宏鑫李兵
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products