Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Two-Factor Authentication Method Based on Temperament Format Information

A technology of identity authentication and authentication method, which is applied in the field of two-factor identity authentication based on rhythm format information, can solve the problem of poor non-uniqueness of challenge codes, and achieve the effect of improving non-uniqueness, ensuring safety, and providing a security barrier

Active Publication Date: 2017-03-15
SHANGHAI PEOPLENET SECURITY TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the technical problem that the existing two-factor identity authentication method is not unique because the challenge code is easily affected by a single parameter such as time in the process of generating the challenge code, the present invention provides a two-factor identity authentication method based on rhythm format information, based on The absoluteness and uniqueness of the temperament information in the twelve equal temperament format, using the twelve equal temperament information and a time-based algorithm to generate a challenge code, compared with the prior art that only uses the challenge code generated by the time factor, the present invention is more It can improve the non-uniqueness of the challenge code, thereby ensuring the security of the identity authentication system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Two-Factor Authentication Method Based on Temperament Format Information
  • A Two-Factor Authentication Method Based on Temperament Format Information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0016] First, please refer to figure 1 , figure 1 It is a method flowchart of a two-factor identity authentication method based on rhythm format information in the present invention, and the authentication method includes the following steps:

[0017] Step 101: the user uses the audio character keyboard of the audio collector to input a plurality of character key codes corresponding to the audio to generate the temperament information;

[0018] Step 102: the audio collector performs data sampling of the musical temperament information according to the twelve equal temperament format, and generates twelve equal temperament information after sampling;

[0019] Step 103: The temperament recognition device uses a temperament recognition algorithm based on the H-K algorithm to perform audio recognition on the twelve equal temperament informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a tonality format information based double-factor identity authentication method. The authentication method includes that an audio collector performs data sampling on tonality information according to a twelve-tone equal temperament format to generate twelve-tone equal temperament information, an audio identifying device performs tonality identification on the twelve-tone equal temperament information on the basis of a tonality identification algorithm of an H-K algorithm to generate binary coding information, an information encryption device uses an SM3 encryption algorithm to encrypt the binary coding information on the basis of a time factor to generate a number format challenge code, a user inputs the number format challenge code into a hardware token, the hardware token performs encryption conversion on the number format challenge code through the SM3 algorithm on the basis of the time factor to obtain a dynamic password, and the user inputs the dynamic password into an identity authentication server for user's identity authentication. According to the tonality format information based double-factor identity authentication method, on the basis of absoluteness and peculiarity of the tonality formation information, the challenge code in the two-factor identity authentication is generated, so that the challenge code is not prone to be affected by single parameters such as time.

Description

technical field [0001] The invention relates to the field of electronic authentication, in particular to a two-factor identity authentication method based on rhythm format information. Background technique [0002] With the development of e-commerce and the advancement of mobile terminal technology, people use mobile terminals more and more frequently for online consumption, and electronic payment has become one of the main means of payment for people. While electronic payment brings convenience to consumers, it also raises new issues for payment security. How to improve the reliability of electronic authentication is a technical problem that many electronic security technology development companies urgently need to solve. The use of dynamic passwords for user identity verification is a commonly used authentication method in electronic payment. There are time synchronization, event synchronization and challenge-response modes for the use of dynamic passwords. The dynamic p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 谈剑锋黄彦栋丁震宇
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products