WO2011023039A1 - 一种动态口令验证的方法及装置 - Google Patents

一种动态口令验证的方法及装置 Download PDF

Info

Publication number
WO2011023039A1
WO2011023039A1 PCT/CN2010/075009 CN2010075009W WO2011023039A1 WO 2011023039 A1 WO2011023039 A1 WO 2011023039A1 CN 2010075009 W CN2010075009 W CN 2010075009W WO 2011023039 A1 WO2011023039 A1 WO 2011023039A1
Authority
WO
WIPO (PCT)
Prior art keywords
dynamic password
mobile device
authentication server
code
diffie
Prior art date
Application number
PCT/CN2010/075009
Other languages
English (en)
French (fr)
Inventor
林汇宝
钱志坚
胡旭升
刘锐强
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Priority to BR112012004151-7A priority Critical patent/BR112012004151B1/pt
Priority to RU2012110323/08A priority patent/RU2506637C2/ru
Priority to MX2012002367A priority patent/MX2012002367A/es
Publication of WO2011023039A1 publication Critical patent/WO2011023039A1/zh
Priority to US13/399,052 priority patent/US8850540B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3013Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems

Definitions

  • the present invention relates to the field of network communications, and in particular, to a method and apparatus for dynamic password authentication. Background of the invention
  • password authentication is the most commonly used in network authentication technology.
  • password authentication can be divided into static password and dynamic password.
  • dynamic passwords have the characteristics of "one time, one secret, one effective time", so their security is much higher.
  • the carrier of dynamic passwords can usually be divided into hardware implementation and software implementation.
  • the dynamic password implemented by hardware has the advantages of high security and convenient use, but its disadvantage is high cost.
  • software-implemented dynamic passwords are less expensive than hardware implementations in terms of security and ease of use, but at a lower cost. Since personal mobile devices (mobile phones, PDAs, etc.) are user-friendly and highly secure, most of the existing software-implemented dynamic passwords are based on personal mobile devices.
  • the system for implementing dynamic passwords based on personal mobile devices is usually composed of token software and authentication servers.
  • the most important issues of such systems are: How to securely share token seeds between token software and authentication servers, here
  • the card seed is secretly shared by the token software and the authentication server, which is the key to making the token software and the authentication server generate the same dynamic password.
  • the user can first install the token software in the mobile device, and then separately obtain a file containing the token seed and import it into the token software; another method is to download the software in each token. All of them contain a unique token seed, and the user can directly install and use the token seed after downloading; or a series of real-time message interactions between the mobile device and the authentication server to negotiate the token seed. It can be seen from the above prior art solution that the security of the prior art is not guaranteed.
  • the embodiment of the invention provides a method and a device for verifying dynamic passwords, which can improve the security of identity authentication, and is easy to use; the mobile device does not generate any message interaction with the authentication server, and does not cause additional The cost of traffic reduces user burden and certification costs.
  • the embodiment of the invention provides a method for dynamic password verification, the method comprising: the mobile device generating the initial code by using the token software, and transmitting the generated initial code to the authentication server through the web page input;
  • the mobile device calculates a current dynamic password according to a DH (Diffie-Hellman) algorithm, and transmits the current dynamic password to the authentication server through a webpage page input;
  • DH Dynamic Hossion Initiation Protocol
  • the authentication server calculates its own dynamic password according to the received initial code according to the same DH algorithm as the mobile device;
  • the authentication server compares the dynamic password generated by itself with the dynamic password generated by the mobile device to verify whether the dynamic password generated by the mobile device is correct.
  • the embodiment of the present invention further provides an apparatus for dynamic password verification, comprising: an initial code generating unit, configured to be used in a mobile device, to generate an initial code by using token software; wherein, the initial code is further input through a webpage page Passed to the authentication server; a dynamic password generating unit, configured to be used in the mobile device, after the initial code verification is passed, calculate a current dynamic password of the mobile device according to a DH (Diffie-Hellman) algorithm; wherein, the current dynamic password Also passed to the authentication server via web page input;
  • DH Dynamic Hellman
  • a dynamic password verification unit configured to be used in the authentication server, to calculate a dynamic password according to the same DH algorithm as the dynamic password generating unit according to the initial code received by the authentication server, and The dynamic password of the self is compared with the entered dynamic password to verify whether the dynamic password generated by the dynamic password generating unit is correct.
  • the mobile device first generates the initial code by using the token software, and transmits the generated initial code to the authentication server through the web page input; after the initial code verification is passed, the mobile The device calculates the current dynamic password according to the DH (Diffie-Hellman) algorithm, and passes the current dynamic password to the authentication server through the web page input; the authentication server according to the received initial code, according to the The mobile device has the same DH algorithm to calculate its own dynamic password; the authentication server compares the dynamic password generated by itself with the dynamic password input by the mobile device to verify whether the dynamic password generated by the mobile device is correct. .
  • the security of the identity authentication can be improved, and the device is easy to use; at the same time, no message interaction occurs between the mobile device and the authentication server, and no additional traffic cost is incurred, which is reduced. User burden and certification costs.
  • FIG. 1 is a schematic flowchart of a dynamic password verification method according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic diagram of signaling interaction for verifying a dynamic password between a mobile device and an authentication server according to Embodiment 1 of the present invention
  • FIG. 4 is the present invention
  • Figure 5 is the hair
  • FIG. 6 is a schematic structural diagram of a dynamic password verification apparatus according to Embodiment 2 of the present invention.
  • Embodiments of the present invention provide a method and apparatus for dynamic password verification, which utilizes a DH (Diffie-Hellman) key exchange algorithm.
  • DH Densfie-Hellman
  • it is safe to share the same key between two entities, thus realizing the verification of dynamic passwords, improving the security of identity authentication, and easy to use; at the same time, due to mobile devices and authentication
  • FIG. 1 is a schematic flowchart of a dynamic password verification method according to Embodiment 1 of the present invention.
  • the method includes:
  • Step 11 Generate an initial code and pass the initial code to the authentication server.
  • the mobile device first uses the downloaded token software to generate the initial code, and then passes the generated initial code to the authentication server through the web page input.
  • the initial code generated by the mobile device by using the token software may be composed of a string of numbers and letters or a string of numbers or a string of letters, specifically a DH public key generated on the mobile device, and the DH public key may be as follows To obtain: First, the mobile device generates a DH private key private to the mobile device through the token software, and then uses the DH private key to calculate a corresponding DH public key through the DH algorithm.
  • the generated initial code may further include version number information, and the version number information refers to the version number hardcoded into the mobile device during initialization.
  • the obtained initial code may also be represented by a multi-coded representation, for example, a 32-ary coded representation of the initial code, so as to effectively reduce the input characters of the initial code, which is convenient to be generated.
  • the initial code is entered on the web page.
  • Step 12 After the initial code verification is passed, the current dynamic password is generated according to the DH algorithm, and the dynamic password is delivered to the authentication server.
  • the mobile device may calculate the current dynamic password according to the DH (Diffie-Hellman) algorithm, and then pass the current dynamic password through the webpage page.
  • the input is passed to the authentication server.
  • the process of the initial code verification may be: first, the authentication server performs a preset algorithm processing on the received initial code to generate a confirmation code; then the mobile device obtains the confirmation code generated by the authentication server, and according to The same algorithm as the authentication server calculates the confirmation code of the mobile device according to the initial code generated by the authentication server; and compares the obtained self-confirmation code with the confirmation code generated by the authentication server to verify the movement.
  • the preset algorithm processing may be an algorithm strategy pre-defined by the operator. For example, the first four digits of the initial code may be set as the confirmation code, or the last two digits of the initial code may be the confirmation code.
  • the authentication server may generate a random number string, and then the generated random number string and the received initial code are processed by a preset algorithm to obtain a corresponding school. The code is verified; then the obtained check code is combined with the generated random number string to generate a confirmation code. This makes the process of initial code verification more accurate and secure.
  • the authentication server first generates a random DH private key, and calculates a corresponding DH public key according to the generated DH private key according to the DH algorithm; After the DH public key and the received initial code are processed by a preset algorithm, a corresponding check code is obtained; and the obtained check code is combined with the calculated DH public key to generate a confirmation code. This also allows the initial code to be verified. The process is more accurate and safe.
  • the mobile device first obtains a token seed by the token software and the background server through an initialization process, and the mobile device saves the token seed, and directly uses the token seed in a subsequent dynamic password generation phase.
  • a dynamic password is generated with the current time value.
  • the process for the mobile device to calculate the current dynamic password according to the DH algorithm may be: First, the mobile device calculates its own DH key by using the DH private key according to its own DH private key, and then obtains its own DH key. The DH key obtains the corresponding token seed through the hash algorithm, and saves the token seed. The mobile device then processes the obtained token seed and the current time value through a preset algorithm to obtain the current dynamic password.
  • the preset algorithm processing may also be an algorithm strategy pre-defined by the operator, for example, the token seed and the current time value are first subjected to a hash algorithm, and then the hash value is taken to a specific value to obtain a corresponding dynamic. Password.
  • Step 13 The authentication server generates its own dynamic password based on the received initial code.
  • the authentication server may calculate its own dynamic password according to the received initial code according to the same DH algorithm as the mobile device.
  • the process that the authentication server obtains its own dynamic password may be: the authentication server obtains the DH public key of the mobile device according to the received initial code parsing; and then calculates the mobile according to the obtained DH public key.
  • the DH key of the device, and according to the obtained DH key, the token seed is obtained according to the same algorithm as the mobile device, and the token seed is saved, and the saved password is used in each process of generating the dynamic password in the future.
  • the token seed computes its own dynamic password by the same algorithm as the mobile device.
  • Step 14 Verify that the dynamic password generated by the mobile device and the dynamic password generated by the mobile device are correct.
  • the authentication server compares the dynamic password generated by itself with the dynamic password generated by the mobile device to verify whether the dynamic password generated by the mobile device is correct.
  • the time displayed by the mobile device and the time of the authentication server may be deviated, it may be set within a specified time deviation range, if the dynamic password generated by the authentication server and the dynamic password generated by the mobile device Consistent However, it can be judged that the verification is correct, thereby improving the scientificity of the verification.
  • a corresponding challenge policy is added in the authentication server, thereby further improving the security of the dynamic password verification, specifically: if the mobile The device calculates a current dynamic password represented by a string of numbers according to the DH algorithm; the authentication server generates a challenge policy, prompting the mobile device to input a specific number in the current dynamic password; and the mobile device according to the challenge policy, Passing a specific number in the current dynamic password to the authentication server via web page input; the authentication server can then verify that the dynamic password generated by the mobile device is correct in conjunction with the generated challenge policy.
  • the mobile device calculates a current dynamic password represented by a plurality of strings in accordance with the DH algorithm; the authentication server generates a challenge policy, prompting the mobile device to input one of the current dynamic passwords Serial number; the mobile device transmits the number of the corresponding string in the current dynamic password to the authentication server through the web page input according to the challenge policy; then the authentication server can verify the mobile device according to the generated challenge policy Is the generated dynamic password correct?
  • the authentication server if the mobile device calculates a current dynamic password represented by a digital matrix according to the DH algorithm; the authentication server generates a challenge policy, prompting the mobile device to input a matrix coordinate of the current dynamic password. Corresponding digit string; the mobile device transmits, according to the challenge policy, a digit string corresponding to a corresponding matrix coordinate in the current dynamic password to the authentication server through a webpage page input; and then the authentication server can combine the generated Challenge the strategy to verify that the dynamic password generated by the mobile device is correct.
  • the security of the identity authentication can be improved, and the interaction does not cause additional traffic charges, thereby reducing the user burden and the authentication cost.
  • FIG. 2 a schematic diagram of signaling interaction for verifying a dynamic password between a mobile device and an authentication server according to Embodiment 1 is shown in FIG.
  • the authentication server determines the Diffie-Hellman global public quantity used, and randomly selects its own Diffie-Hellman private key, and then calculates the corresponding Diffie-Hellman public key; then hard code Diffie-Hellman global public quantity, authentication server Diffie-Hellman public key to the mobile device.
  • the authentication server Diffie-Hellman public key in the mobile device is also hard coded with a version number.
  • the mobile device generates an initial code.
  • the mobile device generates a series of initial codes represented by numbers and letters, which are composed as follows:
  • Initial code 32-ary representation (version number + mobile device's Diffie-Hellman public key)
  • the version number refers to the version number hard-coded into the mobile device during the initialization process.
  • the Diffie-Hellman public key of the mobile device is obtained as follows: First, the Diffie-Hellman private key of the mobile device is generated according to the DH algorithm, and then the calculation can be performed. Its corresponding Diffie-Hellman public key.
  • the authentication server may not generate the authentication server private key and the public key in advance, nor hard-code the public key of the authentication server to the mobile device, and also cancel the hard-coded version. number.
  • the meaning of the initial code generated by the mobile device expressed as: 3 ⁇ 4 mouth:
  • Initial code 32-bit representation (Diffie-Hellman public key of mobile device)
  • 32-ary code 32-bit representation
  • the initial code generated by the mobile device it is transmitted to the authentication server through the webpage webpage input.
  • it can be manually input by the user, or the corresponding device can be specified to input according to the policy.
  • the authentication server can generate a confirmation code and echo it back to the mobile device.
  • the definition of the confirmation code can be expressed as follows:
  • the preset algorithm processing may be an algorithm strategy pre-defined by the operator.
  • the first four digits of the initial code may be set as the confirmation code, or the last two digits of the initial code are the confirmation codes, in order to consider the convenience of the confirmation code input.
  • the confirmation code can generally be set to a 4-digit string.
  • confirmation code generation process can be correspondingly improved.
  • definition of the confirmation code can be modified as follows:
  • the above-mentioned authentication server random number string is a string of 6 or more digits, which is used to increase the randomness from the authentication server in the process of generating the token seed; and the function of the check code is to verify the user input initial code, authentication
  • the correctness of the server's random number string which is typically a string of 2 to 4 digits.
  • the above authentication server Diffie-Hellman public key is: The authentication server first generates a random Diffie-Hellman private key, and then calculates the corresponding DH public key according to the Diffie-Hellman algorithm.
  • the function of the above check code is to verify the correctness of the user input initial code and the authentication server random number string, which is generally a 2 to 4 digit string.
  • Verify the confirmation code and generate a dynamic password The same DH algorithm as the authentication server, and the mobile device's own confirmation code is calculated according to the previous initial code; and then compared with the confirmation code generated by the authentication server; if not, the verification fails, prompting the input initial code error And exit the process. If the verification is successful, the mobile device can calculate the corresponding token seed according to the Diffie-Hellman algorithm and generate the current dynamic password.
  • the process of calculating a dynamic password can be:
  • Diffie-Hellman key Diffie-Hellman algorithm (Diffie-Hellman private key of mobile device + Diffie-Hellman public key of pre-hardcoded authentication server), ie, Diffie -
  • the Hellman key is the result of processing the Diffie-Hellman private key of the mobile device and the Diffie-Hellman public key of the pre-hardcoded authentication server using the Diffie-Hellman algorithm.
  • the Diffie-Hellman private key of the mobile device and the pre-hardcoded authentication server Diffie-Hellman public key is used as two inputs, and the two inputs are calculated by the Diffie-Hellman algorithm, and the result is a Diffie-Hellman key.
  • the token seed hash algorithm (Diffie-Hellman key), that is, the token seed is a result obtained by processing the Diffie-Hellman key by using a hash algorithm;
  • the above hash algorithm can select standard hash algorithms such as MD5 and SHA256 for calculation.
  • step 4 the authentication server generates a random number string
  • the mobile device first The server random number string.
  • Token seed hash algorithm (Diffie-Hellman key + authentication server random number string), that is, the token seed is hashed The result of the algorithm processing the Diffie-Hellman key and the authentication server random number string.
  • step 4 if in step 4, if the authentication server generates the authentication server DH public key, the mobile device first ensures that the mobile device exchanges the correct initial code and the authentication server Diffie-Hellman public key with the authentication server by verifying the check code, and then the verification is passed. After that, the token seed generation algorithm will change to the following:
  • Diffie-Hellman key Diffie-Hellman algorithm (Diffie-Hellman private key for mobile device + Diffie-Hellman public key for authentication server), that is, Diffie-Hellman key is Diffie-Hellman private key for mobile device using Diffie-Hellman algorithm And the result of processing the symbol string composed of the Diffie-Hellman public key of the authentication server.
  • Token Seed Hash Algorithm (Diffie-Hellman Key).
  • the current dynamic password of the mobile device can be calculated, which can be generally 6 to 8 digits of pure digits, specifically:
  • Dynamic Password Algorithm Processing (Token Seed + Current Time Value), ie Dynamic Password is the result of algorithmic processing of the token seed and the current time value.
  • the token seed and the time value may be processed by a preset algorithm to obtain a series of pure numbers.
  • the preset algorithm processing may also be an algorithm strategy pre-defined by the operator, for example, the token seed and the current time value are first subjected to a hash algorithm processing, and then the hash result value is given a specific value to obtain a corresponding dynamic password.
  • the authentication server verifies that the dynamic password is correct.
  • the authentication server parses the Diffie-Hellman public key of the mobile device according to the previously obtained initial code; then, a Diffie-Hellman key can be calculated, which is necessarily the Diffie-Hellman calculated by the mobile device in step 6.
  • the key is consistent; after obtaining the Diffie-Hellman key, the authentication server uses the mobile device described in step 6.
  • the same DH algorithm is prepared to obtain the token seed and its own dynamic password; then the obtained dynamic password is compared with the dynamic password generated by the mobile device, and then the dynamic password generated by the mobile device is verified to be correct.
  • the time displayed on the mobile device may deviate from the time of the authentication server, in a specific implementation process, it may be set within a certain time deviation range, if the dynamic password generated by the authentication server and the dynamic password generated by the mobile device Consistent, it can also be regarded as correct verification; the above-mentioned certain time deviation range can be 1 ⁇ 2 minutes, which can be set by the operator.
  • the corresponding challenge policy may be added to the authentication server according to different dynamic password expression modes generated by the mobile device, thereby further improving the security of the dynamic password verification. for example:
  • Figure 3 shows a signaling interaction diagram of the authentication server generating a challenge policy.
  • Step 1 The mobile device generates a dynamic password. Usually 6 digits, such as: 528639.
  • Step 2 The authentication server generates a challenge policy that prompts the user to enter certain numbers displayed by the mobile device. For example: The current mobile device displays: 528639; The authentication server has a challenge: "Please enter the first 1, 3, 5, 6 digits"; the user only has to correctly enter the "5839" 4 digits to verify that it is correct.
  • Step 3 The user enters the corresponding dynamic password according to the prompt of the authentication server.
  • the fourth step the authentication server combines the previous challenge policy to verify whether the user's dynamic password is correct according to the method described in the first embodiment.
  • Step 5 Display the verification results.
  • FIG. 4 Another signaling interaction diagram of the authentication server generating a challenge policy is shown in Figure 4:
  • Step 1 The mobile device does not generate a 6-bit pure number, but generates a fixed n-line dynamic password based on the token seed and the current time, such as:
  • Step 2 The authentication server generates a challenge strategy and prompts the user to enter the numeric string of the Xth line. For example, "Please enter the dynamic password of line 2".
  • Step 3 The user correctly enters the numeric string of the Xth line according to the prompt of the authentication server. For example, suppose the second step above is "Please enter the dynamic password of line 2", then the user should enter "985570".
  • the fourth step the authentication server combines the previous challenge policy to verify whether the user's dynamic password is correct according to the method described in the first embodiment.
  • Step 5 Display the verification results.
  • FIG. 5 Another signaling interaction diagram of the authentication server generating a challenge policy is shown in FIG. 5:
  • Step 1 The mobile device generates a dynamic matrix password with a fixed n * m based on the token seed and the current time, such as a dynamic matrix password that produces 4 * 4:
  • Step 2 The authentication server generates a challenge strategy, prompting the user to enter a numeric string corresponding to some coordinates. For example, "Please enter the number corresponding to A2, C3, D1".
  • Step 3 The user correctly enters the number corresponding to the coordinates according to the prompt of the authentication server. For example, according to the prompt in step 2, the user should enter "90 89 01".
  • the fourth step the authentication server combines the previous challenge policy to verify whether the dynamic password of the user is correct according to the method described in the first embodiment.
  • Step 5 Display the verification results.
  • the verification of the dynamic password can be realized, thereby improving the security of the identity authentication, and the cartridge is easy to use; meanwhile, due to the initial code, Both the confirmation code and the dynamic password are input into the authentication server through the webpage page, and no direct message interaction occurs between the mobile device and the authentication server, so that no additional traffic charges are incurred, thereby reducing user burden and authentication. cost.
  • Embodiment 2 of the present invention provides a device for dynamic password verification, as shown in FIG. 6 is a schematic structural diagram of the device, where the device includes an initial code generating unit, a dynamic password generating unit and a dynamic password verifying unit, where:
  • the initial code generating unit is disposed in the mobile device, and is configured to generate an initial code by using token software; wherein the initial code is further transmitted to the authentication server through the webpage page input.
  • the manner in which the initial code is specifically generated and input is as described in Embodiment 1 of the above method.
  • the dynamic password generating unit is configured in the mobile device, configured to calculate, according to a DH (Diffie-Hellman) algorithm, a current dynamic password of the mobile device after the initial code verification is passed; wherein, the current dynamic The password is also passed to the authentication server via web page input.
  • DH Dynamic Hossion Initiation Protocol
  • the dynamic password verification unit is disposed in the authentication server, configured to calculate a dynamic password according to the same DH algorithm as the dynamic password generating unit according to the initial code received by the authentication server, and The own dynamic password is compared with the entered dynamic password to verify whether the dynamic password generated by the dynamic password generating unit is correct.
  • the device described above may further include a confirmation code generating unit and a confirmation code verification unit, wherein:
  • the confirmation code generating unit is configured to perform predetermined algorithm processing on the initial code received by the authentication server to generate a confirmation code.
  • the manner in which the identification code is specifically generated is as described in Embodiment 1 of the above method.
  • the confirmation code verification unit is disposed in the mobile device, configured to obtain a confirmation code generated by the confirmation code generation unit, and generated according to the initial code generation unit according to an algorithm identical to the confirmation code generation unit Initial code to calculate its own confirmation code, and compare the self-confirmation code and the confirmation code generated by the confirmation code generation unit to verify the Whether the initial code received by the authentication server is correct.
  • the manner of specific verification is as described in the above method embodiment 1.
  • each unit included is only divided according to functional logic, but is not limited to the above division, as long as the corresponding function can be implemented; in addition, the specific name of each functional unit It is also for convenience of distinguishing from each other and is not intended to limit the scope of protection of the present invention.
  • the storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the specific embodiment of the present invention can improve the security of identity authentication, and the device does not incur additional traffic charges, thereby reducing user burden and authentication cost.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明实施例提供了一种动态口令验证的方法及装置。所述方法利用DH(Diffie-Hellman)密钥交换算法,通过公开交换一些算法参数,安全的在两个实体间共享一个相同的密钥,从而实现对动态口令的验证,这样可以提高身份认证的安全性,而且简单易用;同时移动设备与认证服务器之间也不会产生任何的消息交互,不会造成额外的流量费用,降低了用户负担和认证成本。

Description

一种动态口令验证的方法及装置 技术领域
本发明涉及网络通信领域, 尤其涉及一种动态口令验证的方法及装 置。 发明背景
目前, 在网络身份认证技术中最常用的是口令认证, 通常口令认证 可以分为静态口令和动态口令。相对于静态口令来说,动态口令具有 "一 次一密, 一次有效" 的特点, 因此其安全性高出许多。 动态口令的载体 通常可分为硬件实现和软件实现两种。 硬件实现的动态口令具有安全性 高, 使用方便等优点, 但其缺点是成本较高。 相反, 软件实现的动态口 令虽然在安全性、 易用性方面不及硬件实现, 但其成本却低艮多。 由于 个人移动设备(手机、 PDA等)具有用户使用方便, 安全性高等特点, 因此现有大多数软件实现的动态口令都是基于个人移动设备的。
基于个人移动设备的软件动态口令的实现系统通常由令牌软件与认 证服务器组成, 而这类系统最重要的问题是: 如何在令牌软件与认证服 务器之间安全共享令牌种子, 这里的令牌种子是由令牌软件与认证服务 器秘密共享, 是使得令牌软件与认证服务器同步产生相同动态口令的关 键所在。
在现有技术中, 用户可以首先在移动设备中安装令牌软件, 然后再 单独获取到一个包含令牌种子的文件, 导入到令牌软件中; 另一种方法 是在每一个令牌软件下载前都包含一个惟一的令牌种子, 用户在下载后 可以直接安装使用令牌种子; 或者是由移动设备与认证服务器之间通过 一系列实时的消息交互, 以协商获得令牌种子。 从上述现有技术的方案可以看出, 现有技术的安全性得不到保障, 如果在下载过程中黑客获取到该令牌软件, 就可以获得相应的令牌种 子, 那么该用户就毫无秘密可言; 同时, 如果移动设备不支持联网, 那 么其与认证服务器进行实时消息交互就相当困难, 而且移动设备在与认 证服务器之间进行实时消息交互时, 也会产生一系列的流量费用需要用 户 7 担, 这样也增力。了用户的负担和认证成本。 发明内容
本发明实施例提供了一种动态口令验证的方法及装置, 能够提高身 份认证的安全性, 而且筒单易用; 移动设备与认证服务器之间也不会产 生任何的消息交互, 不会造成额外的流量费用, 降低了用户负担和认证 成本。
本发明实施例提供了一种动态口令验证的方法, 所述方法包括: 移动设备利用令牌软件产生初始码, 并将所产生的初始码通过网页 页面输入传递到认证服务器;
当所述初始码验证通过后, 所述移动设备按照 DH ( Diffie-Hellman ) 算法来计算得到当前的动态口令, 并将所述当前的动态口令通过网页页 面输入传递到认证服务器;
所述认证服务器根据所接收到的初始码, 按照与所述移动设备相同 的 DH算法来计算得到自身的动态口令;
所述认证服务器将自身所产生的动态口令与所述移动设备所产生的 动态口令进行比较, 来验证所述移动设备所产生的动态口令是否正确。
本发明具体实施例还提供了一种动态口令验证的装置, 包括: 初始码产生单元, 设置在移动设备中, 用于利用令牌软件产生初始 码; 其中, 所述初始码还通过网页页面输入传递到认证服务器中; 动态口令产生单元, 设置在移动设备中, 用于在所述初始码验证通 过后, 按照 DH ( Diffie-Hellman )算法来计算得到所述移动设备当前的 动态口令; 其中, 所述当前的动态口令还通过网页页面输入传递到认证 服务器中;
动态口令验证单元, 设置在所述认证服务器中, 用于根据所述认证 服务器所接收到的初始码, 按照与所述动态口令产生单元相同的 DH算 法来计算得到自身的动态口令, 并将所述自身的动态口令与所输入的动 态口令进行比较, 来验证所述动态口令产生单元所产生的动态口令是否 正确。
由上述所提供的技术方案可以看出, 首先移动设备利用令牌软件产 生初始码, 并将所产生的初始码通过网页页面输入传递到认证服务器; 当所述初始码验证通过后, 所述移动设备按照 DH ( Diffie-Hellman )算 法来计算得到当前的动态口令, 并将所述当前的动态口令通过网页页面 输入传递到认证服务器; 所述认证服务器根据所接收到的初始码, 按照 与所述移动设备相同的 DH算法来计算得到自身的动态口令; 所述认证 服务器将自身所产生的动态口令与所述移动设备输入的动态口令进行 比较, 来验证所述移动设备所产生的动态口令是否正确。 通过以上技术 方案的实施, 就可以提高身份认证的安全性, 而且筒单易用; 同时, 移 动设备与认证服务器之间也不会产生任何的消息交互, 不会造成额外的 流量费用, 降低了用户负担和认证成本。 附图简要说明
图 1为本发明实施例 1所提供动态口令验证方法的流程示意图; 图 2为本发明实施例 1所举出的移动设备和认证服务器之间验证动 态口令的信令交互示意图; 明所举出的具体实例中认证— m ^¾ ^ A M w ν&Μ—λ- 信令交互示意图
图 4为本发;
个信令交互示意图;
图 5为本发;
个信令交互示意图;
图 6为本发明实施例 2所提供的动态口令验证装置的结构示意图 实施本发明的方式 本发明实施例提供了一种动态口令验证的方法及装置, 利用 DH ( Diffie-Hellman )密钥交换算法, 通过公开交换一些算法参数, 安全的 在两个实体间共享一个相同的密钥, 从而实现对动态口令的验证, 提高 身份认证的安全性, 而且筒单易用; 同时, 由于移动设备与认证服务器 之间不会产生任何直接的消息交互, 这样就不会造成额外的流量费用, 进而降低了用户负担和认证成本。
实施例 1:
为更好的描述本发明实施例, 现结合附图对本发明的具体实施例进 行说明, 如图 1所示为本发明实施例 1所提供动态口令验证方法的流程 示意图, 所述方法包括:
步骤 11: 产生初始码, 并将该初始码传递到认证服务器。
在本步骤中, 首先移动设备利用其下载的令牌软件来产生初始码, 然后将所产生的初始码通过网页页面输入传递到认证服务器中。
上述移动设备利用令牌软件产生的初始码可以是由一串数字和字 母或一串数字或一串字母组成的, 具体可以是移动设备上产生的 DH公 钥, 该 DH公钥可以通过如下方式来获得: 首先移动设备通过令牌软件 产生移动设备私有的 DH私钥, 然后利用该 DH私钥通过 DH算法来计 算对应的 DH公钥。
另外, 在所生成的初始码中还可以包含版本号信息, 该版本号信息 指的是初始化过程中硬编码到移动设备中的版本号。
在具体实现过程中, 还可以对所得到的初始码进行多进制的编码表 示, 例如对初始码进行 32进制的编码表示, 这样是为了有效减少初始 码的输入字符, 方便将所产生的初始码在网页上输入。
步骤 12: 当初始码验证通过后, 按照 DH算法来产生当前的动态口 令, 并将该动态口令传递到认证服务器中。
在本步骤中, 当上述所产生的初始码验证通过后, 所述移动设备就 可以按照 DH ( Diffie-Hellman )算法来计算得到当前的动态口令, 然后 再将所述当前的动态口令通过网页页面输入传递到认证服务器中。
在具体实现过程中, 初始码验证的过程可以为: 首先认证服务器对 所接收到的初始码进行预设的算法处理, 产生确认码; 然后移动设备获 得所述认证服务器产生的确认码, 并按照与所述认证服务器相同的算法 根据其产生的初始码计算得到所述移动设备自身的确认码; 再比较所得 到的自身的确认码和所述认证服务器所产生的确认码, 来验证所述移动 设备输入的初始码是否正确, 例如, 如果移动设备自身的确认码和所述 认证服务器所产生的确认码相同, 则所述移动设备输入的初始码正确, 否则所述移动设备输入的初始码不正确。 上述预设的算法处理可以是由 操作人员预先规定的算法策略, 例如可以设定初始码的前四位为确认 码, 或初始码的后两位为确认码。
另外, 在上述认证服务器产生确认码的过程中, 还可以由认证服务 器产生随机数字串, 再将所产生的随机数字串和所接收到的初始码进行 预设的算法处理后, 得到相应的校验码; 然后将所得到的校验码和所产 生的随机数字串组合后产生确认码。 这样就可以使初始码验证的过程更 加的准确和安全。
或者, 在上述认证服务器产生确认码的过程中, 由认证服务器首先 产生一个随机的 DH私钥, 并根据所产生的 DH私钥按照 DH算法来计 算得到相应的 DH公钥; 再将计算所得到的 DH公钥和所接收到的初始 码进行预设的算法处理后, 得到相应的校验码; 将所得到的校验码和计 算所得到的 DH公钥组合后产生确认码。 这样也可以使初始码验证的过 程更加的准确和安全。
另外, 在具体实现过程中, 移动设备首先通过初始化过程使得令牌 软件和后台服务器获得一致的令牌种子, 移动设备保存该令牌种子, 在 后续动态口令的产生阶段, 直接利用该令牌种子和当前时间值产生动态 口令。 具体地, 移动设备按照 DH算法来计算得到当前的动态口令的过 程可以是: 首先移动设备根据其自身的 DH私钥通过 DH算法来计算得 到其自身的 DH密钥, 然后对所得到的自身的 DH密钥通过哈希算法来 得到相应的令牌种子, 保存该令牌种子; 移动设备再将所得到的令牌种 子和当前时间值通过预设的算法处理后, 得到当前的动态口令。 同样, 该预设的算法处理也可以是由操作人员预先规定的算法策略, 例如将令 牌种子和当前时间值先进行哈希算法处理, 再对哈希结果值取特定值来 得到相应的动态口令。
步骤 13: 认证服务器根据所接收到的初始码来产生自身的动态口 令。
在本步骤中, 所述认证服务器可以根据所接收到的初始码, 按照与 所述移动设备相同的 DH算法来计算得到自身的动态口令。
在具体实现过程中, 认证服务器得到自身动态口令的过程可以是: 认证服务器根据所接收到的初始码解析得到所述移动设备的 DH公钥; 然后根据所得到的 DH公钥计算得到所述移动设备的 DH密钥, 并根据 所获得的 DH密钥按照与所述移动设备相同的算法得到令牌种子, 保存 该令牌种子, 在以后每次生成动态口令的过程中, 都利用该保存的令牌 种子通过与所述移动设备相同的算法来计算得到自身的动态口令。
步骤 14: 比较自身所产生的动态口令和移动设备所产生的动态口 令, 来验证移动设备所产生的动态口令是否正确。
在本步骤中, 所述认证服务器将自身所产生的动态口令与所述移动 设备所产生的动态口令进行比较, 来验证所述移动设备所产生的动态口 令是否正确。 在具体实现过程中, 由于移动设备显示的时间和认证服务 器的时间可能存在一定的偏差, 故可以设定在指定的时间偏差范围内, 若认证服务器产生的动态口令与移动设备所产生的动态口令一致, 则依 然可以判断验证正确, 从而提高验证的科学性。
另外, 在具体实现过程中, 还可以根据移动设备所产生的动态口令 表达方式的不同, 在认证服务器中增加设置相应的挑战策略, 从而进一 步提高动态口令验证的安全性, 具体来说: 若移动设备按照 DH算法来 计算得到以一串数字表示的当前的动态口令; 所述认证服务器产生挑战 策略, 提示移动设备输入所述当前动态口令中的特定数字; 所述移动设 备根据所述挑战策略, 将所述当前动态口令中的特定数字通过网页页面 输入传递到所述认证服务器; 然后认证服务器就可以结合所产生的挑战 策略来验证移动设备所产生的动态口令是否正确。
除了以上所述的表达方式外, 若移动设备按照 DH算法来计算得到 以多串数字表示的当前的动态口令; 所述认证服务器产生挑战策略, 提 示移动设备输入所述当前动态口令中的某一串数字; 所述移动设备根据 所述挑战策略, 将所述当前动态口令中相应串的数字通过网页页面输入 传递到所述认证服务器; 然后认证服务器就可以结合所产生的挑战策略 来验证移动设备所产生的动态口令是否正确。
另外, 除上述表达方式外, 若移动设备按照 DH算法来计算得到以 数字矩阵表示的当前的动态口令; 所述认证服务器产生挑战策略, 提示 移动设备输入所述当前动态口令中某个矩阵坐标所对应的数字串; 所述 移动设备根据所述挑战策略, 将所述当前动态口令中相应矩阵坐标所对 应的数字串通过网页页面输入传递到所述认证服务器; 然后认证服务器 就可以结合所产生的挑战策略来验证移动设备所产生的动态口令是否 正确。
通过以上实施例 1的技术方案, 就可以提高身份认证的安全性, 而 交互, 不会造成额外的流量费用, 从而降低了用户负担和认证成本。
举例来说, 如图 2所示为本实施例 1所举出的移动设备和认证服务 器之间验证动态口令的信令交互示意图, 图 2中:
1、 初始化过程。 首先认证服务器确定使用的 Diffie-Hellman全局公 开量, 并随机选择自身的 Diffie-Hellman 私钥, 再计算得到对应的 Diffie-Hellman公钥; 然后再硬编码 Diffie-Hellman全局公开量、 认证服 务器的 Diffie-Hellman公钥到移动设备中去。 这里为了便于管理, 移动 设备中的认证服务器 Diffie-Hellman公钥, 也对其硬编码一个版本号。
2、 移动设备产生初始码。 在进行初始化操作时, 移动设备会产生 一串由数字、 字母表示的初始码, 其组成如下:
初始码 = 32 进制表示 (版本号 + 移动设备的 Diffie-Hellman公钥)
其中, 版本号指在初始化过程中硬编码到移动设备中的版本号, 移 动设备的 Diffie-Hellman公钥是这样获得: 首先根据 DH算法产生移动 设备私有的 Diffie-Hellman私钥, 然后就可计算其对应的 Diffie-Hellman 公钥。
另外, 在上述第 1步的初始化过程中, 认证服务器也可以不再预先 产生认证服务器私钥和公钥, 也不硬编码认证服务器的公钥到移动设备 中去, 同时也取消硬编码的版本号。 此时, 移动设备产生的初始码的含 义: 表示为: ¾口下:
初始码 = 32进制表示 (移动设备的 Diffie-Hellman公钥 ) 另外, 在得到上述初始码后, 还可以对其进行 32进制编码表示, 这样是为了便于用户在网页上输入。 例如, 假设 32进制的表示关系如 下表 1所示:
Figure imgf000010_0001
表 1
那么, 初始码的 32 进制表示就可以为: (14803)10 = (39D3)16 = (EEJ)32
当然, 也可以使用更高进制的描述, 从而有效地减少初始码需要输 入的字符, 方便操作。
3、 根据移动设备产生的初始码, 通过网页 Web页面输入传递到认 证服务器。 在具体实现过程中, 可以由用户来手动输入, 也可以指定相 应的装置来按照策略输入。
4、 为了校验所输入的初始码是正确的, 认证服务器可以产生一个 确认码, 回显给移动设备, 该确认码的定义可以用如下表示:
确认码 = 算法处理(初始码)
具体是根据用户输入的初始码, 经过预设的算法处理后得到的一个 筒短的数字串。 这里, 预设的算法处理可以是由操作人员预先规定的算 法策略, 例如可以设定初始码的前四位为确认码, 或初始码的后两位为 确认码, 为了考虑确认码输入的方便性, 确认码一般可以设定成 4位的 数字串。
另外, 为了进一步增进安全性, 可对上述确认码的生成过程进行相 应的改进, 具体来说, 可以修改确认码的定义为:
确认码 =认证服务器随机数字串 +校验码
上述的校验码 = 算法处理(用户输入的初始码 +认证 服务器随机数字串 )
上述认证服务器随机数字串是一个 6位以上的数字串, 它的作用是 用来在生成令牌种子过程中增加来自认证服务器的随机性; 而校验码的 作用是验证用户输入初始码、 认证服务器随机数字串的正确性, 它一般 是 2到 4位数字串。
或者, 还可以修改确认码的定义为:
确认码 = 32进制表示(认证服务器 Diffie-Hellman公钥 + 校验 码)
校验码 = 算法处理(用户输入的初始码 +认证服务器 Diffie-Hellman公钥)
上述认证服务器 Diffie-Hellman公钥是: 认证服务器首先产生一随 机的 Diffie-Hellman私钥, 再按照 Diffie-Hellman算法计算得到相应的 DH公钥。
同样, 上述校验码的作用是验证用户输入初始码、 认证服务器随机 数字串的正确性, 它一般是 2到 4位数字串。
5、 将所产生的确认码输入传递到移动设备中去。
6、 验证确认码, 并产生动态口令。 与认证服务器相同的 DH算法, 并根据之前的初始码计算移动设备自身 的确认码;再将它与认证服务器所产生的确认码进行比较;如果不一致, 则验证失败, 提示所输入的初始码错误, 并退出流程, 如果一致, 则验 证成功, 那么移动设备就可以按照 Diffie-Hellman算法来计算相应的令 牌种子, 并产生当前的动态口令。
具体计算动态口令的过程可以为:
首先计算移动设备的 DH密钥, 具体来说, Diffie-Hellman密钥 = Diffie-Hellman算法 (移动设备的 Diffie-Hellman私钥 + 已预先硬编码的 认证服务器 Diffie-Hellman 公钥), 即, Diffie-Hellman 密钥是采用 Diffie-Hellman算法对移动设备的 Diffie-Hellman私钥以及已预先硬编码 的认证服务器 Diffie-Hellman公钥进行处理后所得的结果, 换言之, 以 移动设备的 Diffie-Hellman 私钥以及已预先硬编码的认证服务器 Diffie-Hellman公钥作为两个输入量, 利用 Diffie-Hellman算法对这两个 输入量进行计算, 所得结果是 Diffie-Hellman密钥。
然后, 令牌种子 =哈希算法( Diffie-Hellman密钥), 即令牌种子 是采用哈希算法对 Diffie-Hellman密钥进行处理后所得的结果;
上述的哈希算法可以选取 MD5、 SHA256等标准哈希算法来进行计 算。
另外, 若在步骤 4中, 认证服务器产生随机数字串, 则移动设备首 服务器随机数字串,验证通过后,该令牌种子的生成算法将改变为如下: 令牌种子 =哈希算法( Diffie-Hellman密钥 + 认证服务器随机数 字串), 即令牌种子是采用哈希算法对 Diffie-Hellman密钥以及认证服务 器随机数字串进行处理后所得的结果。
另外, 若在步骤 4中, 若认证服务器产生认证服务器 DH公钥, 则 移动设备首先通过验证校验码确保移动设备与认证服务器交换正确的 初始码、 认证服务器 Diffie-Hellman公钥, 则验证通过后, 令牌种子的 生成算法将改变为如下:
Diffie-Hellman 密钥 = Diffie-Hellman 算法(移动设备的 Diffie-Hellman 私钥 + 认证服务器 Diffie-Hellman 公钥), 即 Diffie-Hellman 密钥是采用 Diffie-Hellman 算法对移动设备的 Diffie-Hellman私钥以及认证服务器的 Diffie-Hellman公钥组成的符号串 进行处理后所得的结果。
令牌种子 =哈希算法( Diffie-Hellman密钥)。
在通过上述各种方式得到令牌种子后, 就可以计算移动设备当前的 动态口令, 一般可以是 6到 8位的纯数字, 具体来说就是:
动态口令 = 算法处理(令牌种子 + 当前时间值), 即动态口令是 对令牌种子以及当前时间值进行算法处理所得的结果。
具体可以将令牌种子与时间值进行预设的算法处理, 以得到一串纯 数字。 该预设的算法处理也可以是由操作人员预先规定的算法策略, 例 如将令牌种子和当前时间值先进行哈希算法处理, 再对哈希结果值取特 定值来得到相应的动态口令。
7、 将移动设备产生的动态口令, 再通过 Web页面输入传递到认证 服务器。
8、 认证服务器验证动态口令是否正确。
首先, 认证服务器根据之前获得的初始码, 解析得到移动设备的 Diffie-Hellman公钥; 然后就可以计算得到一 Diffie-Hellman密钥, 该密 钥必然与在步骤 6中移动设备计算得到的 Diffie-Hellman密钥一致; 在 得到 Diffie-Hellman密钥后, 认证服务器使用步骤 6中描述的与移动设 备相同的 DH算法来得到令牌种子和自身的动态口令; 然后将所得到的 自身的动态口令与移动设备产生的动态口令进行比较, 就可以校验移动 设备所产生的动态口令是否正确。
另外, 由于移动设备上显示的时间与认证服务器的时间可能存在偏 差, 因此在具体实现过程中, 可以设定在一定的时间偏差范围内, 若认 证服务器产生的动态口令与移动设备产生的动态口令一致, 也可以视为 验证正确; 上述一定的时间偏差范围可以是 1 ~ 2分钟, 具体可以由操 作人员来设定。
另外, 在本实施例 1所举出的例子中, 还可以根据移动设备所产生 的动态口令表达方式的不同, 在认证服务器中增加设置相应的挑战策 略, 从而进一步提高动态口令验证的安全性, 举例来说:
如图 3所示为认证服务器产生挑战策略的一个信令交互示意图, 图
3中:
第一步: 移动设备产生动态口令。 一般为 6位数字, 如: 528639。 第二步: 认证服务器产生挑战策略, 提示用户输入移动设备显示的 某些数字。 例如: 当前移动设备显示的是: 528639; 认证服务器产生挑 战: "请输入第 1 , 3 , 5 , 6 个数字"; 用户只有正确输入 "5839" 这 4 个数字才有可能验证正确。
第三步: 用户根据认证服务器的提示, 输入相应的动态口令。
第四步: 认证服务器结合之前的挑战策略, 按照本实施例 1所述的 方法来验证用户的动态口令是否正确。
第五步: 显示验证结果。
如图 4所示为认证服务器产生挑战策略的另一个信令交互示意图, 图 4中:
第一步: 移动设备不是产生 6位的纯数字, 而是根据令牌种子和当 前时间, 产生固定 n行的动态口令, 如:
1、 298570
2、 985570
3、 255378 4、 018373
第二步: 认证服务器产生挑战策略, 提示用户输入第 X行的数字 串。 如 "请输入第 2行的动态口令"。
第三步:用户根据认证服务器的提示,正确输入第 X行的数字串。 例如, 假设上述第二步提示是 "请输入第 2行的动态口令", 那么用户 应该输入 "985570"。
第四步: 认证服务器结合之前的挑战策略, 按照本实施例 1所述 的方法来验证用户的动态口令是否正确。
第五步: 显示验证结果。
如图 5所示为认证服务器产生挑战策略的另一个信令交互示意图, 图 5中:
第一步: 移动设备根据令牌种子和当前时间, 产生固定 n * m的动 态矩阵口令, 如产生 4 * 4的动态矩阵口令:
1 2 3 4
A 12 90 85 70
B 95 15 25 29
C 52 22 89 78
D 01 08 37 32
第二步: 认证服务器产生挑战策略, 提示用户输入某几个坐标 所对应的数字串。 如 "请输入 A2, C3 , D1所对应的数字"。
第三步: 用户根据认证服务器的提示, 正确输入坐标所对应的 数字。 例如, 依步骤二的提示, 用户应该输入 "90 89 01"。
第四步: 认证服务器结合之前的挑战策略, 按照本实施例 1 所 述的方法来验证用户的动态口令是否正确。
第五步: 显示验证结果。
通过以上挑战策略的设置, 就可以进一步提高动态口令验证的安全 性。
通过以上所举出的具体实例的技术方案, 就可以实现对动态口令的 验证, 从而提高身份认证的安全性, 而且筒单易用; 同时, 由于初始码、 确认码和动态口令都是通过网页页面输入到认证服务器中的, 移动设备 与认证服务器之间不会产生任何直接的消息交互, 这样就不会造成额外 的流量费用, 进而降低了用户负担和认证成本。
实施例 2:
本发明实施例 2提供了一种动态口令验证的装置, 如图 6所示为所 述装置的结构示意图, 所述装置包括初始码产生单元, 动态口令产生单 元和动态口令验证单元, 其中:
所述初始码产生单元设置在移动设备中, 用于利用令牌软件产生初 始码; 其中, 所述初始码还通过网页页面输入传递到认证服务器中。 具 体产生初始码并输入的方式见以上方法实施例 1中所述。
所述动态口令产生单元设置在移动设备中, 用于在所述初始码验证 通过后, 按照 DH ( Diffie-Hellman ) 算法来计算得到所述移动设备当前 的动态口令; 其中, 所述当前的动态口令还通过网页页面输入传递到认 证服务器中。 具体产生动态口令并输入的方式见以上方法实施例 1中所 述。
所述动态口令验证单元设置在所述认证服务器中, 用于根据所述认 证服务器所接收到的初始码, 按照与所述动态口令产生单元相同的 DH 算法来计算得到自身的动态口令, 并将所述自身的动态口令与所输入的 动态口令进行比较, 来验证所述动态口令产生单元所产生的动态口令是 否正确。
另外, 以上所述的装置中还可包括确认码产生单元和确认码验证单 元, 其中:
所述确认码产生单元设置在所述认证服务器中, 用于对所述认证服 务器所接收到的初始码进行预设的算法处理, 产生确认码。 具体产生确 认码的方式见以上方法实施例 1中所述。
所述确认码验证单元设置在所述移动设备中, 用于获得所述确认码 产生单元所产生的确认码, 并按照与所述确认码产生单元相同的算法根 据所述初始码产生单元产生的初始码来计算得到自身的确认码, 并比较 所述自身的确认码和所述确认码产生单元所产生的确认码, 来验证所述 认证服务器所接收到的初始码是否正确。 具体进行验证的方式见以上方 法实施例 1中所述。
值得注意的是, 上述装置实施例中, 所包括的各个单元只是按照功 能逻辑进行划分的, 但并不局限于上述的划分, 只要能够实现相应的功 能即可; 另外, 各功能单元的具体名称也只是为了便于相互区分, 并不 用于限制本发明的保护范围。
另外, 本领域普通技术人员可以理解实现上述方法实施例 1中的全 部或部分步骤是可以通过程序来指令相关的硬件完成, 相应的程序可以 存储于一种计算机可读存储介质中, 上述提到的存储介质可以是只读存 储器, 磁盘或光盘等。
综上所述, 本发明具体实施例可以提高身份认证的安全性, 而且筒 不会造成额外的流量费用, 从而降低了用户负担和认证成本。
以上所述, 仅为本发明较佳的具体实施方式, 但本发明的保护范围 并不局限于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范 围内, 可轻易想到的变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本发明的保护范围应该以权利要求书的保护范围为准。

Claims

权利要求书
1、 一种动态口令验证的方法, 其特征在于, 所述方法包括: 移动设备利用令牌软件产生初始码, 并将所产生的初始码通过网页 页面输入传递到认证服务器;
当所述初始码验证通过后, 所述移动设备按照 Diffie-Hellman算法 来计算得到当前的动态口令, 并将所述当前的动态口令通过网页页面输 入传递到认证服务器;
所述认证服务器根据所接收到的初始码, 按照与所述移动设备相同 的 Diffie-Hellman算法来计算得到自身的动态口令;
所述认证服务器将自身所产生的动态口令与所述移动设备所产生 的动态口令进行比较, 来验证所述移动设备所产生的动态口令是否正 确。
2、 如权利要求 1 所述的方法, 其特征在于, 所述初始码验证的过 程, 具体包括:
所述认证服务器对所接收到的初始码进行预设的算法处理, 产生确 认码; 证服务器相同的算法根据其产生的初始码计算得到所述移动设备自身 的确认码;
所述移动设备比较所得到的自身的确认码和所述认证服务器所产 生的确认码, 来验证所述移动设备输入的初始码是否正确。
3、 如权利要求 1所述的方法, 其特征在于, 所述产生确认码包括: 由认证服务器产生随机数字串, 再将所产生的随机数字串和所接收 到的初始码进行预设的算法处理后, 得到相应的校验码, 然后将所得到 的校验码和所产生的随机数字串组合后产生确认码;
或者, 由认证服务器首先产生一个随机的 DH私钥, 并根据所产生 的 DH私钥按照 DH算法来计算得到相应的 DH公钥, 再将计算所得到 的 DH公钥和所接收到的初始码进行预设的算法处理后, 得到相应的校 验码, 将所得到的校验码和计算所得到的 DH公钥组合后产生确认码。
4、 如权利要求 1 所述的方法, 其特征在于, 所述将所产生的初始 码通过网页页面输入传递到认证服务器包括:
将所产生的初始码经过多进制编码处理, 然后再通过网页页面输入 传递到认证服务器。
5、 如权利要求 4所述的方法, 其特征在于, 所述多进制编码包括 32进制编码或者与 32进制相比的更高进制编码。
6、 如权利要求 1 所述的方法, 其特征在于, 所述移动设备按照 Diffie-Hellman算法来计算得到当前的动态口令, 具体包括:
所述移动设备根据其自身的 Diffie-Hellman私钥通过 Diffie-Hellman 算法来计算得到其自身的 Diffie-Hellman密钥;
对所得到的自身的 Diffie-Hellman密钥通过哈希算法来得到令牌种 子;
将所得到的令牌种子和当前时间值通过预设的算法处理后, 得到当 前的动态口令。
7、 如权利要求 6 所述的方法, 其特征在于, 所述认证服务器根据 所接收到的初始码, 按照与所述移动设备相同的 Diffie-Hellman算法来 计算得到自身的动态口令, 具体包括:
所述认证服务器根据所接收到的初始码解析得到所述移动设备的 Diffie-Hellman公钥;
根据所得到的 Diffie-Hellman 公钥计算得到所述移动设备的 Diffie-Hellman密钥, 并根据所获得的 Diffie-Hellman密钥按照与所述移 动设备相同的 Diffie-Hellman算法来计算得到自身的动态口令。
8、 如权利要求 6 所述的方法, 其特征在于, 所述根据所获得的 Diffie-Hellman密钥按照与所述移动设备相同的 Diffie-Hellman算法来计 算得到自身的动态口令包括:
根据所获得的 Diffie-Hellman密钥按照哈希算法得到令牌种子, 保 存该令牌种子;
在每次生成动态口令的过程中, 利用该保存的令牌种子通过与所述 移动设备相同的 Diffie-Hellman算法来计算得到自身的动态口令。
9、 如权利要求 6所述的方法, 其特征在于, 在所述验证所述移动 设备所产生的动态口令是否正确的过程中, 所述方法还包括:
若在指定的时间偏差范围内, 所述认证服务器产生的动态口令与所 述移动设备所产生的动态口令一致, 则判断验证正确。
10、 如权利要求 2所述的方法, 其特征在于, 所述认证服务器对所 接收到的初始码进行预设的算法处理, 产生确认码, 具体包括:
所述认证服务器产生随机数字串, 将所产生的随机数字串和所接收 到的初始码进行预设的算法处理后, 得到相应的校验码;
将所得到的校验码和所产生的随机数字串组合后产生确认码。
11、 如权利要求 2所述的方法, 其特征在于, 所述认证服务器对所 接收到的初始码进行预设的算法处理, 产生确认码, 具体包括:
所述认证服务器产生一个随机的 Diffie-Hellman私钥, 根据所产生 的 Diffie-Hellman 私钥按照 Diffie-Hellman 算法来计算得到相应的 Diffie-Hellman公钥;
将计算所得到的 Diffie-Hellman公钥和所接收到的初始码进行预设 的算法处理后, 得到相应的校验码;
将所得到的校验码和计算所得到的 Diffie-Hellman公钥组合后产生 确认码。
12、 如权利要求 1 所述的方法, 其特征在于, 所述移动设备按照 Diffie-Hellman算法来计算得到当前的动态口令,并将所述当前的动态口 令通过网页页面输入传递到认证服务器, 具体包括:
所述移动设备按照 Diffie-Hellman算法来计算得到以一串数字表示 的当前的动态口令; 所述认证服务器产生挑战策略, 提示移动设备输入 所述当前动态口令中的特定数字; 所述移动设备根据所述挑战策略, 将 所述当前动态口令中的特定数字通过网页页面输入传递到所述认证服 务器;
或, 所述移动设备按照 Diffie-Hellman算法来计算得到以多串数字 表示的当前的动态口令; 所述认证服务器产生挑战策略, 提示移动设备 输入所述当前动态口令中的某一串数字; 所述移动设备根据所述挑战策 略, 将所述当前动态口令中相应串的数字通过网页页面输入传递到所述 认证服务器;
或, 所述移动设备按照 Diffie-Hellman算法来计算得到以数字矩阵 表示的当前的动态口令; 所述认证服务器产生挑战策略, 提示移动设备 输入所述当前动态口令中某个矩阵坐标所对应的数字串; 所述移动设备 根据所述挑战策略, 将所述当前动态口令中相应矩阵坐标所对应的数字 串通过网页页面输入传递到所述认证服务器。
13、 一种动态口令验证的装置, 其特征在于, 包括:
初始码产生单元, 设置在移动设备中, 用于利用令牌软件产生初始 码; 其中, 所述初始码还通过网页页面输入传递到认证服务器中; 动态口令产生单元, 设置在移动设备中, 用于在所述初始码验证通 过后, 按照 Diffie-Hellman算法来计算得到所述移动设备当前的动态口 令; 其中, 所述当前的动态口令还通过网页页面输入传递到认证服务器 中;
动态口令验证单元, 设置在所述认证服务器中, 用于根据所述认证 服务器所接收到的初始码, 按照与所述动态口令产生单元相同的 DH算 法来计算得到自身的动态口令, 并将所述自身的动态口令与所输入的动 态口令进行比较, 来验证所述动态口令产生单元所产生的动态口令是否 正确。
14、 如权利要求 13所述的装置, 其特征在于, 所述装置还包括: 确认码产生单元, 设置在所述认证服务器中, 用于对所述认证服务 器所接收到的初始码进行预设的算法处理, 产生确认码;
确认码验证单元, 设置在所述移动设备中, 用于获得所述确认码产 生单元所产生的确认码, 并按照与所述确认码产生单元相同的算法根据 所述初始码产生单元产生的初始码来计算得到自身的确认码, 并比较所 述自身的确认码和所述确认码产生单元所产生的确认码, 来验证所述认 证服务器所接收到的初始码是否正确。
PCT/CN2010/075009 2009-08-26 2010-07-06 一种动态口令验证的方法及装置 WO2011023039A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
BR112012004151-7A BR112012004151B1 (pt) 2009-08-26 2010-07-06 método e dispositivo para verificar senha dinâmica
RU2012110323/08A RU2506637C2 (ru) 2009-08-26 2010-07-06 Способ и устройство верификации динамического пароля
MX2012002367A MX2012002367A (es) 2009-08-26 2010-07-06 Metodo y dispositivo para verificar una contraseña dinamica.
US13/399,052 US8850540B2 (en) 2009-08-26 2012-02-17 Method and device for verifying dynamic password

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2009100916214A CN101662465B (zh) 2009-08-26 2009-08-26 一种动态口令验证的方法及装置
CN200910091621.4 2009-08-26

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/399,052 Continuation US8850540B2 (en) 2009-08-26 2012-02-17 Method and device for verifying dynamic password

Publications (1)

Publication Number Publication Date
WO2011023039A1 true WO2011023039A1 (zh) 2011-03-03

Family

ID=41790252

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/075009 WO2011023039A1 (zh) 2009-08-26 2010-07-06 一种动态口令验证的方法及装置

Country Status (7)

Country Link
US (1) US8850540B2 (zh)
CN (1) CN101662465B (zh)
BR (1) BR112012004151B1 (zh)
HK (1) HK1144504A1 (zh)
MX (1) MX2012002367A (zh)
RU (1) RU2506637C2 (zh)
WO (1) WO2011023039A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111711628A (zh) * 2020-06-16 2020-09-25 北京字节跳动网络技术有限公司 网络通信身份认证方法、装置、系统、设备及存储介质

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662465B (zh) 2009-08-26 2013-03-27 深圳市腾讯计算机系统有限公司 一种动态口令验证的方法及装置
CN102185838B (zh) * 2011-04-21 2014-06-25 杭州驭强科技有限公司 基于时间因子的主动式动态密码生成和认证系统及方法
US9071424B1 (en) * 2013-03-29 2015-06-30 Emc Corporation Token-based key generation
CN104134021B (zh) 2013-06-20 2016-03-02 腾讯科技(深圳)有限公司 软件的防篡改验证方法及装置
CN104468099A (zh) * 2013-09-12 2015-03-25 全联斯泰克科技有限公司 基于cpk的动态口令生成和验证方法及装置
CN103618717B (zh) * 2013-11-28 2017-12-05 北京奇虎科技有限公司 多账户客户信息的动态认证方法、装置和系统
US9813406B2 (en) * 2014-02-20 2017-11-07 Empire Technology Development Llc Device authentication in ad-hoc networks
US9332008B2 (en) * 2014-03-28 2016-05-03 Netiq Corporation Time-based one time password (TOTP) for network authentication
US9764712B2 (en) 2014-04-09 2017-09-19 Empire Technology Development Llc Sensor data anomaly detector
US9432339B1 (en) 2014-09-29 2016-08-30 Emc Corporation Automated token renewal using OTP-based authentication codes
CN105744049A (zh) * 2014-12-09 2016-07-06 联芯科技有限公司 一种移动终端管理模式管理方法及系统
CN104579686B (zh) * 2015-01-15 2018-10-30 上海动联信息技术股份有限公司 一种用于手机令牌的种子匹配方法
EP3262861B1 (en) * 2015-02-27 2021-06-02 Telefonaktiebolaget LM Ericsson (publ) Security arrangements in communication between a communication device and a network device
US10360558B2 (en) 2015-03-17 2019-07-23 Ca, Inc. Simplified two factor authentication for mobile payments
US10050942B2 (en) * 2015-03-17 2018-08-14 Ca, Inc. System and method of mobile authentication
US10089631B2 (en) 2015-03-18 2018-10-02 Ca, Inc. System and method of neutralizing mobile payment
US10387884B2 (en) 2015-03-18 2019-08-20 Ca, Inc. System for preventing mobile payment
US9842205B2 (en) 2015-03-30 2017-12-12 At&T Intellectual Property I, L.P. Time-varying passwords for user authentication
US9742761B2 (en) * 2015-11-10 2017-08-22 International Business Machines Corporation Dynamic authentication for a computing system
US9800580B2 (en) * 2015-11-16 2017-10-24 Mastercard International Incorporated Systems and methods for authenticating an online user using a secure authorization server
CN107113177B (zh) * 2015-12-10 2019-06-21 深圳市大疆创新科技有限公司 数据连接、传送、接收、交互的方法及系统,及存储器、飞行器
US9626506B1 (en) * 2015-12-17 2017-04-18 International Business Machines Corporation Dynamic password generation
US10216943B2 (en) 2015-12-17 2019-02-26 International Business Machines Corporation Dynamic security questions in electronic account management
US9876783B2 (en) * 2015-12-22 2018-01-23 International Business Machines Corporation Distributed password verification
US11064358B2 (en) * 2016-05-24 2021-07-13 Feitian Technologies Co., Ltd. One-time-password authentication method and device
CN107453871B (zh) * 2016-05-30 2020-07-03 阿里巴巴集团控股有限公司 口令生成方法、口令验证方法、支付方法及装置
CN106559212B (zh) * 2016-11-08 2018-04-06 北京海泰方圆科技股份有限公司 数据处理方法和装置
WO2018108062A1 (zh) * 2016-12-15 2018-06-21 腾讯科技(深圳)有限公司 身份验证方法、装置及存储介质
CN106603574B (zh) * 2017-01-23 2018-05-08 北京海泰方圆科技股份有限公司 动态口令生成和认证方法及装置
US10972273B2 (en) * 2017-06-14 2021-04-06 Ebay Inc. Securing authorization tokens using client instance specific secrets
US10789179B1 (en) * 2017-10-06 2020-09-29 EMC IP Holding Company LLC Decentralized access management in information processing system utilizing persistent memory
CN108040090A (zh) * 2017-11-27 2018-05-15 上海上实龙创智慧能源科技股份有限公司 一种多Web的系统整合方法
US11012435B2 (en) 2017-12-19 2021-05-18 International Business Machines Corporation Multi factor authentication
US11122033B2 (en) * 2017-12-19 2021-09-14 International Business Machines Corporation Multi factor authentication
CN109146470B (zh) * 2018-08-24 2023-02-28 北京小米移动软件有限公司 生成付款码的方法及装置
CN111723362B (zh) * 2019-03-22 2023-09-08 倪晓 一种权限密码生成方法、系统、装置及终端设备
CN110400405B (zh) * 2019-07-29 2021-10-26 北京小米移动软件有限公司 一种控制门禁的方法、装置及介质
WO2021032304A1 (en) * 2019-08-22 2021-02-25 Huawei Technologies Co., Ltd. Gateway devices and methods for performing a site-to-site communication
US11240661B2 (en) * 2019-09-03 2022-02-01 Cisco Technology, Inc. Secure simultaneous authentication of equals anti-clogging mechanism
WO2021081421A1 (en) * 2019-10-23 2021-04-29 Allclear Id, Inc. Method and system for completing cross-channel transactions
CN112333154A (zh) * 2020-10-16 2021-02-05 四川九八村信息科技有限公司 一种基于动态密码进行权限控制方法及其血浆采集机
US11569999B1 (en) 2021-07-09 2023-01-31 Micro Focus Llc Dynamic tokenization table exchange
CN116827560B (zh) * 2023-08-31 2023-11-17 北京云驰未来科技有限公司 一种基于异步口令的动态密码认证方法及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070136581A1 (en) * 2005-02-15 2007-06-14 Sig-Tec Secure authentication facility
CN101051908A (zh) * 2007-05-21 2007-10-10 北京飞天诚信科技有限公司 动态密码认证系统及方法
CN101500011A (zh) * 2009-03-13 2009-08-05 北京华大智宝电子系统有限公司 实现动态口令安全保护的方法及系统
CN101662465A (zh) * 2009-08-26 2010-03-03 深圳市腾讯计算机系统有限公司 一种动态口令验证的方法及装置

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5319735A (en) * 1991-12-17 1994-06-07 Bolt Beranek And Newman Inc. Embedded signalling
US5394508A (en) * 1992-01-17 1995-02-28 Massachusetts Institute Of Technology Method and apparatus for encoding decoding and compression of audio-type data
US6401204B1 (en) * 1996-06-05 2002-06-04 Siemens Aktiengesellschaft Process for cryptographic code management between a first computer unit and a second computer unit
US7120797B2 (en) * 2002-04-24 2006-10-10 Microsoft Corporation Methods for authenticating potential members invited to join a group
US20030204732A1 (en) * 2002-04-30 2003-10-30 Yves Audebert System and method for storage and retrieval of a cryptographic secret from a plurality of network enabled clients
US7600118B2 (en) 2002-09-27 2009-10-06 Intel Corporation Method and apparatus for augmenting authentication in a cryptographic system
US8924728B2 (en) * 2004-11-30 2014-12-30 Intel Corporation Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information
US20060149676A1 (en) * 2004-12-30 2006-07-06 Sprunk Eric J Method and apparatus for providing a secure move of a decrpytion content key
NO20050152D0 (no) * 2005-01-11 2005-01-11 Dnb Nor Bank Asa Fremgangsmate ved frembringelse av sikkerhetskode og programmbar anordning for denne
US9143323B2 (en) * 2005-04-04 2015-09-22 Blackberry Limited Securing a link between two devices
US9137012B2 (en) * 2006-02-03 2015-09-15 Emc Corporation Wireless authentication methods and apparatus
EP1997270B1 (en) * 2006-03-09 2014-12-03 Vasco Data Security International GmbH Method and system for authenticating a user
BRPI0712283A2 (pt) 2006-06-19 2012-01-10 Interdigital Tech Corp método e dispositivo para a proteção de segurança da identidade original de um usuário em uma mensagem inicial de sinalização
CN101459513B (zh) * 2007-12-10 2011-09-21 联想(北京)有限公司 一种计算机和用于认证的安全信息的发送方法
CN101304315B (zh) * 2008-06-30 2010-11-03 北京飞天诚信科技有限公司 基于口令卡提高身份认证安全性的方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070136581A1 (en) * 2005-02-15 2007-06-14 Sig-Tec Secure authentication facility
CN101051908A (zh) * 2007-05-21 2007-10-10 北京飞天诚信科技有限公司 动态密码认证系统及方法
CN101500011A (zh) * 2009-03-13 2009-08-05 北京华大智宝电子系统有限公司 实现动态口令安全保护的方法及系统
CN101662465A (zh) * 2009-08-26 2010-03-03 深圳市腾讯计算机系统有限公司 一种动态口令验证的方法及装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111711628A (zh) * 2020-06-16 2020-09-25 北京字节跳动网络技术有限公司 网络通信身份认证方法、装置、系统、设备及存储介质

Also Published As

Publication number Publication date
RU2506637C2 (ru) 2014-02-10
HK1144504A1 (en) 2011-02-18
MX2012002367A (es) 2012-03-29
CN101662465A (zh) 2010-03-03
BR112012004151B1 (pt) 2021-05-04
CN101662465B (zh) 2013-03-27
RU2012110323A (ru) 2013-10-10
US20120151566A1 (en) 2012-06-14
US8850540B2 (en) 2014-09-30
BR112012004151A2 (pt) 2017-05-30

Similar Documents

Publication Publication Date Title
WO2011023039A1 (zh) 一种动态口令验证的方法及装置
AU2019240671B2 (en) Methods for secure cryptogram generation
CN109951489B (zh) 一种数字身份认证方法、设备、装置、系统及存储介质
US9853816B2 (en) Credential validation
US9887838B2 (en) Method and device for secure communications over a network using a hardware security engine
WO2018046009A1 (zh) 一种区块链身份系统
CN106533687B (zh) 一种身份认证方法和设备
US20160080157A1 (en) Network authentication method for secure electronic transactions
US9185111B2 (en) Cryptographic authentication techniques for mobile devices
US10924289B2 (en) Public-private key pair account login and key manager
US20110238989A1 (en) Method and system for secure communication using hash-based message authentication codes
CN112671720B (zh) 一种云平台资源访问控制的令牌构造方法、装置及设备
JPWO2019239591A1 (ja) 認証システム、認証方法、アプリケーション提供装置、認証装置、及び認証用プログラム
WO2012037886A1 (zh) 安全访问受保护资源的方法及系统
SG175860A1 (en) Methods of robust multi-factor authentication and authorization and systems thereof
KR20120091618A (ko) 연쇄 해시에 의한 전자서명 시스템 및 방법
CN111245594B (zh) 一种基于同态运算的协同签名方法及系统
WO2017029708A1 (ja) 個人認証システム
CN112150151B (zh) 安全支付方法、装置、电子设备及存储介质
US9820147B2 (en) Authentification method for a communication network
TWI437868B (zh) A method, system and device for dynamic password verification
CN112235105B (zh) 一种抗中间人攻击的动态口令认证方法
CN116707818A (zh) 一种基于可信计算模块的线上快速身份认证系统及方法
KR101737925B1 (ko) 도전-응답 기반의 사용자 인증 방법 및 시스템
CN116528230A (zh) 验证码处理方法、移动终端及可信服务系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10811199

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: MX/A/2012/002367

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: 1201000722

Country of ref document: TH

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2356/CHENP/2012

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2012110323

Country of ref document: RU

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC OF 290812

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112012004151

Country of ref document: BR

122 Ep: pct application non-entry in european phase

Ref document number: 10811199

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 112012004151

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20120224