Verification method combining static password and dynamic password and terminal equipment

A dynamic password and static password technology, applied to the usage of multiple keys/algorithms, and key distribution, can solve the problems of SMS password Trojan horse software interception, high cost of independent password equipment, etc., and achieve the effect of easy memory and simple and stable upgrade

Inactive Publication Date: 2016-08-17
张雪莱
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology allows for securely storing passwords on both users' devices (static) with different levels of security level. It also includes an algorithm called Dynamic Password which changes its value based upon factors like how many times it was last used beforehand. These features make them difficult if copied without permission from hackers who can access their accounts through these systems.

Problems solved by technology

This patented technology solves issues with traditional methods for accessing secure systems that require users' physical presence (passwords) while they are logged into their accounts or utilizing credit/debit cards. However, these techniques may also allow criminals to steal them without paying any charges. Therefore there needs an improved way to protect against this type of attack.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0005] The dynamic password involved in this solution needs to specify an algorithm when creating or setting an account, and can provide a variety of calculation formulas for users to choose, such as (not limited to) providing 2 to 3 optional variables and operators between variables, each The first variable can be the number of the month, date, time, week, and the first few digits of the amount of the transaction or the reverse order of the above variables, or it can be a fixed value or a character displayed at a specific position on the current page. If you need to limit the number of digits of the dynamic password, you must also set a truncation or filling strategy. Assuming that a user sets a dynamic password formula as: current month + reverse order of current date + 32, and the current date is May 09, the generated dynamic password is: 05+90+32=127, if the limited password length is 2 and takes After two digits, the password is 27.

[0006] The password entered by the user

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a dynamic password verification method, which is characterized in that the password input by the user includes static and dynamic characters, and the user agrees in advance on the calculation method of the dynamic password when creating or setting an account, and the calculation method uses variable data such as date, after Simply change the dynamic password used for verification; when the password needs to be verified, the user enters the static password and the dynamic password formed by simple calculation on the terminal device or the client software interface, or uses the dynamic password to encrypt the string obtained by encrypting the static password and submits it for verification ; The terminal device or client software decomposes the obtained input into a static password and a dynamic password string or uses a dynamic password to decrypt the input string to obtain a static password; the server compares the received encrypted static password with the pre-saved user password, such as If necessary, compare the received dynamic password with the string obtained according to the same algorithm to determine whether it can pass the verification.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner 张雪莱
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products