Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-factor identity authentication method based on Chinese character format information

A format information and identity authentication technology, applied in the field of two-factor identity authentication based on Chinese character format information, can solve the problem of poor challenge code non-uniqueness, and achieve the effect of improving non-uniqueness, providing security barriers and ensuring security.

Active Publication Date: 2014-03-26
SHANGHAI PEOPLENET SECURITY TECH
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the technical problem that the existing two-factor identity authentication method is not unique because the challenge code is easily affected by a single parameter such as time in the process of generating the challenge code, the present invention provides a two-factor identity authentication method based on Chinese character format information, based on The absoluteness and uniqueness of the Chinese character format information of simplified Chinese characters, using simplified Chinese characters and a time-based algorithm to generate a challenge code, compared with the existing technology that only uses the challenge code generated by the time factor, the present invention can improve the challenge The non-uniqueness of the code ensures the security of the identity authentication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-factor identity authentication method based on Chinese character format information
  • Two-factor identity authentication method based on Chinese character format information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0016] First, please refer to figure 1 , figure 1 It is a method flowchart of a two-factor identity authentication method based on Chinese character format information in the present invention, and the authentication method includes the following steps:

[0017] Step 101: The user inputs simplified Chinese characters to the manual tablet, which is a hardware handwriting device;

[0018] Step 102: The artificial writing board uses the Chinese character skeleton recognition algorithm to perform Chinese character recognition on the input Chinese simplified Chinese characters, and generates corresponding binary coded information;

[0019] Step 103: The manual tablet uses the SM3 encryption algorithm to encrypt the binary coded information based on the time factor to generate a string of challenge codes in digital format;

[0020] Step 104: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-factor identity authentication method based on Chinese character format information. The two-factor identity authentication method comprises the steps that a user inputs simplified Chinese characters into a manual tablet; Chinese character recognition is conducted on the simplified Chinese characters through the manual tablet based on the Chinese character skeleton recognition algorithm, so that binary coding information is generated; encryption is conducted on the binary coding information through the SM3 encryption algorithm based on a time factor, so that a number-format challenge is generated; the user inputs the number-format challenge into a hardware token manually; encryption conversion is conducted on the number-format challenge through the hardware token by means of the SM3 algorithm based on the time factor, so that a dynamic password is obtained; the user inputs the dynamic password into an identity authentication server, and the identity authentication server authenticates the identity of the user according to the dynamic password. According to the two-factor identity authentication method based on the Chinese character format information, the challenge of two-factor identity authentication is generated based on the absoluteness and the uniqueness of the Chinese character format information, and therefore it is guaranteed that the challenge is not prone to being influenced by single parameters such as time.

Description

technical field [0001] The invention relates to the field of electronic authentication, in particular to a two-factor identity authentication method based on Chinese character format information. Background technique [0002] With the development of e-commerce and the advancement of mobile terminal technology, people use mobile terminals more and more frequently for online consumption, and electronic payment has become one of the main means of payment for people. While electronic payment brings convenience to consumers, it also raises new issues for payment security. How to improve the reliability of electronic authentication is a technical problem that many electronic security technology development companies urgently need to solve. The use of dynamic passwords for user identity verification is a commonly used authentication method in electronic payment. There are time synchronization, event synchronization and challenge-response modes for the use of dynamic passwords. Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 谈剑锋黄彦栋丁振宇
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products