Authentication method adopting complex cryptographic technique

A cryptographic technology and cryptographic technology, applied in the field of authentication using double-entry cryptography, can solve the problems of user leakage, low security, and inability to determine the identity of the password user, and achieve the effect of improved security and high security.

Inactive Publication Date: 2008-10-22
丁洪涛
View PDF2 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. When the password setting is simple, it is easy to be deciphered and guessed, resulting in low security;
[0006] 2. It is easy to be forgotten when the password setting is complex and lengthy
In order to prevent the password from being deciphered, some users set the password to be complicated and lengthy, but it is difficult to remember, and there are many things that the user forgets or remembers the password incorrectly;
[0007] 3. Due to the fixedness of the password in this password scheme, the user is easily peeped and leaked during the use
Chinese patent application CN02112960.6 provides a good anti-peeping scheme, but this scheme cannot solve other drawbacks of existing encryption schemes, and also increases the complexity of operations;
[0008] 4. In this kind of password scheme, the service agency can only judge the authenticity of the password, but cannot judge the identity of the password user
If criminals use violence or other means to obtain the real password of the password user, the user's property may be lost
Chinese patent application CN01108566.5 proposes a warning scheme for this drawback, but in this scheme the victim is required to provide an emergency password when being victimized
Because this emergency password is not used at ordinary times, and the situation is very tense when being victimized, it is not easy for the victim to remember the emergency password and tell the criminals accurately, so the anti-riot effect is not very good. it is good
And this scheme also cannot solve other drawbacks of existing schemes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method adopting complex cryptographic technique

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Refer below figure 1 The shown flow chart of the present invention adopting the interactive multiple password technique for authentication is described in detail for the present invention. Include the following steps:

[0031] Step 101: First, the user of the password and the service organization agree on multiple relatively simple passwords, which we call subcodes in this article. At the same time, each subcode also agrees on a corresponding sequence number. All subcodes and their corresponding sequence numbers together form a compound password.

[0032] The subcodes and subcodes are independent of each other, and the sequence numbers corresponding to different subcodes are also independent and different from each other. That is to say, the double-entry password is composed of several subcodes with sequential numbers. It can also be said that the double-entry password is divided into several parts according to the agreed rules, and each part is a subcode. It can be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for utilizing the duplex type cryptographic technique to authenticate. The method comprises the following steps that: a plurality of subcodes are appointed for a user using a password, different subcodes correspond to different sequence numbers, and all the subcodes and the sequence numbers form a duplex type password; when the authentication process is performed, the sequence of all the sequence numbers is disrupted, the disrupted sequence numbers are indicated to the user; according to the indicated sequence numbers, the user inputs the subcodes corresponding to the sequence numbers in sequence to finish the input of the password; according to the passwords inputted by the user, the identity of the user is authenticated. In the process of authenticating the password of the user, the method can realize simple operation of the user and high security.

Description

technical field [0001] The invention belongs to the technical field of cipher security, and in particular relates to a method for authentication by adopting a double cipher technique. Background technique [0002] With the rapid development of computer technology and the Internet in today's society, passwords (the passwords referred to in this article include the characteristic information extracted by numbers, fingerprints, retina, voice and other various recognition technologies, as well as the hybrids of these characteristic information.) are widely used. applied in our life. It is of great significance to protect personal privacy and corporate secrets as well as public and private property. Especially in some information that is only exchanged and released within a certain range, as well as securities and property that flow between designated individuals, etc., passwords play an irreplaceable role. [0003] At present, the scheme of password authentication widely used ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
Inventor 丁洪涛
Owner 丁洪涛
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products