Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety device for identifying cipher and safety identifying method

A password security and password technology, applied in the field of identifying password security devices, can solve the problems of expansion of password card space, increase of memory cost, unfavorable portability, etc.

Inactive Publication Date: 2006-01-04
彭国展 +1
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Of course, increasing the number of identification passwords in a large amount, for example, increasing the identification passwords arranged by 30,000 sets of random numbers to 3 million sets can achieve the effect of reducing the risk of fraudulent use, but this method not only causes each encryption machine The cost of medium memory increases, or the length of the password card is greatly expanded, which is not conducive to carrying, especially considering that financial institutions must face tens of thousands or even millions of customers. When the password of each customer increases by a hundred times, the financial institution itself The database capacity will also be greatly doubled accordingly, and the skyrocketing cost will inevitably deter financial institutions, leaving room for further improvement in the security of this solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety device for identifying cipher and safety identifying method
  • Safety device for identifying cipher and safety identifying method
  • Safety device for identifying cipher and safety identifying method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The structural features of the present invention are described in detail as follows with reference to the drawings and embodiments:

[0042] Such as image 3 Shown below is the flow of the Taiwanese Patent Application No. 93111819 applied to the present invention. When a financial institution accepts the user's connection in step 31, it immediately asks the user to input such as name, ID number, and Identification data such as identity authentication passwords; and in step 33, after the server confirms that the data is correct, then directly select any password address in the identification password group corresponding to the user to ask the question, and ask the user to operate the password machine Or read the password card to find out the identification password output corresponding to the address; in step 34, accept and confirm that the user identification password is correct, and in step 35, accept the user instruction.

[0043] The difference from the previous case is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a kind of security device for identifying code, which stores multi-identifying codes. The server terminal is calculated through a pre-designed formula and disperses the outgoing enquired address into a numerical value, which is larger than that of the indexed information of the address. After incoming the security device, an identifying code obtained by a processing unit decipher is sent out. Through a broad increase of the transmitted numerical value of the indexed information, the malicious intruder wrongly judges the indexed information as a true address, thus enhancing the difficulty of the decoding and reducing the possibility of the intruding.

Description

Technical field: [0001] The invention relates to an identification password security device, in particular to an identification password security device that disperses the storage address of the identification password through a predetermined formula calculation and improves the difficulty of malicious intrusion and cracking. Background technique: [0002] According to the news announced by the police, once the homeowner replaces the door lock with a more difficult-to-break high-level lock, the household’s theft rate will drop significantly. That is to say, the thief judges that the time cost of the intrusion has increased and the risk of being cracked has increased, and that the household is not worthy of intrusion, and changed to steal from other people with lower intrusion costs. Such criminal psychology also exists in the online world. [0003] Due to the convenient network transmission, the speed of information transmission is increasing day by day, regardless of financial-r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00
Inventor 彭国展
Owner 彭国展
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products