CN110557407A - Authentication terminal for compiling password based on identity authentication digital signature - Google Patents
Authentication terminal for compiling password based on identity authentication digital signature Download PDFInfo
- Publication number
- CN110557407A CN110557407A CN201910963227.9A CN201910963227A CN110557407A CN 110557407 A CN110557407 A CN 110557407A CN 201910963227 A CN201910963227 A CN 201910963227A CN 110557407 A CN110557407 A CN 110557407A
- Authority
- CN
- China
- Prior art keywords
- key
- circuit board
- main circuit
- shell
- microprocessor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 description 4
- 210000004936 left thumb Anatomy 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000005242 forging Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 230000002401 inhibitory effect Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to an authentication terminal for compiling a password based on identity authentication digital signature, which is characterized in that: the circuit board comprises a shell, wherein a main circuit board is arranged in the shell, and the top end and the bottom end of the main circuit board are combined with an upper shell and a lower shell of the shell; the front surface of the shell is provided with a display screen which is tightly combined with the touch screen, and the touch display screen is connected with the main circuit board; the main circuit board is provided with a power switch, a USB interface, a battery and a memory which are connected with the main circuit board; the main circuit board is provided with a microprocessor which is connected with the main circuit board; the microprocessor is connected with the memory; the microprocessor is provided with a terminal operation interface which comprises a key, a fingerprint key and a dynamic password, and is connected with the microprocessor, and the microprocessor is connected with the touch display screen. The invention has the advantages of convenient carrying, simple operation, safety and reliability, and can be widely applied to identity authentication digital signature and password compilation.
Description
Technical Field
The invention relates to the technical field of authentication terminals, in particular to an authentication terminal for compiling a password based on identity authentication digital signatures.
Background
The authentication terminal is an important authentication client for network identity authentication, which not only identifies the identity of an operator and prevents an attacker from forging unauthorized access of network resources of a legal user, but also ensures that the operator compiles a password for an identity certificate digital signature by means of the authentication terminal, so that the password has resistance to denial and is safely transmitted to the authentication server to remotely and accurately verify the authenticity safety authentication of the identity of the operator. Because the current network identity authentication client cannot identify the identity of an operator, the identity certification authentication client logged in by the operator cannot identify and judge whether the user is logged in by a legal user or whether an attacker forges the login of the legal user. The operator can not compile a password for the digital signature of the identification by means of the authentication client, and the identification logged in by the authentication client is a password or not, so that the system is not resistant to denial and system attack. The authentication server can only verify the validity of the identity certificate of the operator, but cannot verify the authenticity of the identity certificate operator. Network security problems such as network user identity authenticity can not be confirmed, network resources are accessed without authorization and the like are increasingly prominent, network economic development is greatly hindered, and network user identity information, national security and social stability face serious threats. Therefore, an authentication terminal which is convenient to carry, simple to operate, safe and reliable and is used for compiling a password based on an identity authentication digital signature is urgently needed, and the authentication terminal is very important for network security such as identity authenticity confirmation of network users, authorized access of network resources and the like.
Disclosure of Invention
The invention mainly solves the technical problem of providing the authentication terminal which is convenient to carry, simple to operate, safe and reliable and is used for compiling the password based on the identity authentication digital signature, so that unauthorized access to network resources can be prevented, and the resistance to the denial and the system attack resistance of the password can be improved. When the method is applied to network identity authentication, the authenticity of the identity of an operator can be accurately verified, so that the safety and reliability of the network identity authentication can be improved.
In order to achieve the purpose, the invention adopts the technical scheme that: an authentication terminal for generating a password based on an identity authentication digital signature is provided. The method is characterized in that: comprises a shell; a main circuit board is arranged in the outer shell, and the top end and the bottom end of the main circuit board are combined with the upper shell and the lower shell of the outer shell; the front surface of the shell is provided with a display screen, the shell at the position opposite to the display screen is provided with an opening, and the display screen is tightly combined with the opening of the shell; the touch screen is arranged on the surface of the display screen, the touch screen is tightly combined with the display screen, and the touch display screen is connected with the main circuit board; the power switch is arranged on the right side of the top end of the main circuit board, an opening is formed in the shell at the position opposite to the power switch, the power switch is combined with the opening of the shell, and the power switch is connected with the main circuit board; the middle of the bottom end of the main circuit board is provided with a USB interface, the shell opposite to the USB interface is provided with an opening, the USB interface is tightly combined with the opening of the shell, and the USB interface is connected with the main circuit board; the battery is arranged at the lower end of the main circuit board, a groove is formed in the battery at the lower end of the main circuit board, the battery is combined with the groove at the lower end of the main circuit board, the battery is combined with the rear cover of the shell, and the battery is connected with the main circuit board; the device comprises a main circuit board, a microprocessor, a terminal operation interface, a key and a fingerprint key, wherein the memory is arranged on the upper right of the main circuit board, the microprocessor is arranged on the lower left of the main circuit board, the microprocessor is connected with the memory, the microprocessor is provided with the terminal operation interface, the terminal operation interface is provided with the key and the fingerprint key, the key and the fingerprint key comprise a + plus key, a ' - ' minus key, a near-staggered key, an x-multiplied key, a ' mixed-carry key, a ' → ' receding key, a digital key of 1, a digital key of 2, a digital key of 3, a digital key of 4, a digital key of 5, a digital key of 6, a digital key of 7, a digital key of 8, a digital key of 9 and a fingerprint key, a dynamic password frame above the terminal operation interface key and the fingerprint key is provided with a dynamic password frame, the terminal operation interface key and the fingerprint key comprise dynamic passwords of a dynamic password frame and are connected with a microprocessor, and the microprocessor is connected with the touch display screen; and the key and the fingerprint key of the operation interface of the terminal of the touch display screen are operated to compile a password through identity authentication of the microprocessor and dynamic password digital signature of identity identification.
By adopting the technical scheme, the invention has the following advantages: 1. the invention utilizes the key and the fingerprint key of the terminal operation interface, and the key and the fingerprint key of the terminal operation interface operated by an operator are safely transmitted to the authentication server through the identity authentication of the microprocessor and the digital signature compilation password of the dynamic password of the identity certificate, thereby effectively realizing the aim of compiling the password by authenticating the identity authentication of the terminal and the digital signature. 2. The invention adopts the terminal operation interface key and the fingerprint key for identity authentication, prevents an attacker from forging the unauthorized access of network resources of a legal user to enter a network system to steal important information, data and other data of the network user, ensures that the network data is not leaked, stolen and tampered, ensures that personal data, intellectual property and enterprise data are not operated by other people, and ensures that national sensitive information and confidentiality are not disclosed unauthorized. 3. The invention adopts the key keys of the terminal operation interface and the digital signature of the dynamic password of the identity certificate to compile the password, thereby determining the traceability and the anti-repudiation of the authorized access event of the operator through the network resources, improving the network deterrence and inhibiting the network crime. 4. The invention adopts the key keys of the terminal operation interface and the digital signature of the identification dynamic password to compile the password, prevents various attack methods such as dictionary attack, brute force cracking, keyboard monitoring, wiretapping, snooping, social engineering, garbage search, phishing, Trojan horse virus and the like from attacking the identity information of the network user, protects the legal rights and interests of citizens, legal persons and other organizations, and promotes the healthy development of network technology and informatization. 5. The invention has the advantages of convenient carrying, simple operation, safety and reliability, and can be widely applied to the use of identity authentication digital signature and password compilation.
Drawings
Fig. 1 is a schematic structural view of the present invention.
Detailed Description
For a detailed description of the structural features and operational steps of the present invention, reference will now be made to the following preferred embodiments thereof, taken in conjunction with the accompanying drawings.
As shown in fig. 1, the present invention comprises: the circuit board comprises a shell 1, wherein a main circuit board 2 is arranged in the shell 1, and the top end and the bottom end of the main circuit board 2 are combined with an upper shell and a lower shell of the shell 1; the front surface of the shell 1 is provided with a display screen 3, an opening is formed in the shell 1 at the position opposite to the display screen 3, and the display screen 3 is tightly combined with the opening of the shell 1; the touch screen 4 is arranged on the surface of the display screen 3, the touch screen 4 is tightly combined with the display screen 3, and the touch screen 4 is connected with the display screen 3 and the main circuit board 2; the right side of the top end of the main circuit board 2 is provided with a power switch 5, an opening is formed in the shell 1 at the position opposite to the power switch 5, the power switch 5 is combined with the opening of the shell 1, and the power switch 5 is connected with the main circuit board 2; the middle of the bottom end of the main circuit board 2 is provided with a USB interface 6, the shell 1 at the position opposite to the USB interface 6 is provided with an opening, the USB interface 6 is tightly combined with the opening of the shell 1, and the USB interface 6 is connected with the main circuit board 2; the battery 7 is arranged at the lower end of the main circuit board 2, the battery 7 at the lower end of the main circuit board 2 is provided with a groove, the battery 7 is combined with the groove at the lower end of the main circuit board 2, the battery 7 is combined with the rear cover of the shell 1, and the battery 7 is connected with the main circuit board 2; the memory 8 is arranged on the upper right of the main circuit board 2, the memory 8 is connected with the main circuit board 2, the microprocessor 9 is connected with the memory 8, the microprocessor 9 is provided with a terminal operation interface 10, the terminal operation interface 10 is provided with a key 11 and a fingerprint key 12, the key 11 and the fingerprint key 12 comprise a plus key, a minus key, a round-trip key, an X multiplied key, a round-trip key, a 1 digit key, a 2 digit key, a 3 digit key, a 4 digit key, a 5 digit key, a 6 digit key, a 7 digit key, an 8 digit key, a 9 digit key and a fingerprint key 12, the dynamic password box above the key 11 and the fingerprint key 12 of the terminal operation interface 10 is provided with a dynamic password 13, the key 11 and the fingerprint key 12 of the terminal operation interface 10 comprise dynamic passwords 13 of the dynamic password box and are connected with the microprocessor 9, and the microprocessor 9 is connected with the display screen 3 of the touch 4; and the key 11 and the fingerprint key 12 of the terminal operation interface 10 of the operation touch 4 display screen 3 are used for compiling a password through identity authentication of the microprocessor 9 and digital signature of the dynamic password 13 of the identity certificate.
The operation process of the authentication terminal for compiling the password based on the identity authentication digital signature is as follows: for example, the key set by the operator authentication terminal is 1 bit offset 6 and the left thumb fingerprint, and the authentication server sends 303557 the dynamic password frame identity authentication dynamic password to the terminal operation interface. An operator operates a digital key, a key which is approximately equal to 'staggered', a digital key of 6 and a fingerprint key operated by the left thumb on an operation interface 1 of the touch display screen terminal to check identity authentication with the 1 staggered 6 key and the fingerprint data of the left thumb stored in the memory through the microprocessor; the identity authentication check is mistakenly stopped, the microprocessor successfully authenticates the identity authentication and transmits the 1 st digit 3 digital signature of the identity dynamic password 303557 to the 6 th digit and the 6 th digit 7 digital signature of the identity dynamic password 303557 to the first digit compiling password 703553 to the authentication server through the digital key of 1 operated by an operator, the key approximately matching with' misplacement and the digital key of 6, thereby effectively realizing the aim of compiling the password by authenticating the identity authentication digital signature of the authentication terminal.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent structures or equivalent operation flows made by using the contents of the present specification and the drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (2)
1. An authentication terminal for compiling a password based on identity authentication digital signature is characterized in that: comprises a shell; a main circuit board is arranged in the shell, and the top end and the bottom end of the main circuit board are combined with the upper shell and the lower shell of the shell; the front surface of the shell is provided with a display screen, the shell at the position opposite to the display screen is provided with an opening, and the display screen is tightly combined with the opening of the shell; the touch screen is arranged on the surface of the display screen, the touch screen is tightly combined with the display screen, and the touch display screen is connected with the main circuit board; the power switch is arranged on the right side of the top end of the main circuit board, an opening is formed in the shell at the position opposite to the power switch, the power switch is combined with the opening of the shell, and the power switch is connected with the main circuit board; the middle of the bottom end of the main circuit board is provided with a USB interface, the shell opposite to the USB interface is provided with an opening, the USB interface is tightly combined with the opening of the shell, and the USB interface is connected with the main circuit board; the battery is arranged at the lower end of the main circuit board, a groove is formed in the battery at the lower end of the main circuit board, the battery is combined with the groove at the lower end of the main circuit board, the battery is combined with the rear cover of the shell, and the battery is connected with the main circuit board; the device comprises a main circuit board, a microprocessor, a terminal operation interface, a key and a fingerprint key, wherein the memory is arranged on the upper right of the main circuit board, the microprocessor is arranged on the lower left of the main circuit board, the microprocessor is connected with the memory, the microprocessor is provided with the terminal operation interface, the terminal operation interface is provided with the key and the fingerprint key, the key and the fingerprint key comprise a + plus key, a ' - ' minus key, a near-staggered key, an x-multiplied key, a ' mixed-carry key, a ' → ' receding key, a digital key of 1, a digital key of 2, a digital key of 3, a digital key of 4, a digital key of 5, a digital key of 6, a digital key of 7, a digital key of 8, a digital key of 9 and a fingerprint key, a dynamic password frame above the terminal operation interface key and the fingerprint key is provided with a dynamic password frame, the terminal operation interface key and the fingerprint key comprise dynamic passwords of a dynamic password frame and are connected with a microprocessor, and the microprocessor is connected with the touch display screen.
2. The authentication terminal for compiling the password based on the identity authentication digital signature as claimed in claim 1, wherein the key and the fingerprint key of the operation interface of the terminal for operating the touch display screen are used for compiling the password by the microprocessor identity authentication and the identity authentication dynamic password digital signature.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910963227.9A CN110557407A (en) | 2019-10-11 | 2019-10-11 | Authentication terminal for compiling password based on identity authentication digital signature |
CN202010247242.6A CN111163112A (en) | 2019-10-11 | 2020-03-31 | Authentication terminal for compiling password based on identity authentication digital signature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910963227.9A CN110557407A (en) | 2019-10-11 | 2019-10-11 | Authentication terminal for compiling password based on identity authentication digital signature |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110557407A true CN110557407A (en) | 2019-12-10 |
Family
ID=68742673
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910963227.9A Pending CN110557407A (en) | 2019-10-11 | 2019-10-11 | Authentication terminal for compiling password based on identity authentication digital signature |
CN202010247242.6A Pending CN111163112A (en) | 2019-10-11 | 2020-03-31 | Authentication terminal for compiling password based on identity authentication digital signature |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010247242.6A Pending CN111163112A (en) | 2019-10-11 | 2020-03-31 | Authentication terminal for compiling password based on identity authentication digital signature |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN110557407A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111200616A (en) * | 2020-02-28 | 2020-05-26 | 北京帕斯沃得科技有限公司 | Password compiling method based on authentication terminal |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100505927C (en) * | 2004-10-22 | 2009-06-24 | 北京握奇数据系统有限公司 | Dynamic password identification method |
CN203180939U (en) * | 2013-03-28 | 2013-09-04 | 北京帕斯沃得科技有限公司 | Dynamic password input rule calculating and digital certificate token apparatus |
CN204143370U (en) * | 2014-10-24 | 2015-02-04 | 西北民族大学 | A kind of financial sector keyboard special |
CN104702410A (en) * | 2015-02-11 | 2015-06-10 | 中国建设银行股份有限公司 | Dynamic password authentication device, system and method |
CN106911722B (en) * | 2017-04-25 | 2020-03-31 | 北京帕斯沃得科技有限公司 | Intelligent password signature identity authentication bidirectional authentication method and system |
CN106921501B (en) * | 2017-05-04 | 2020-01-31 | 北京帕斯沃得科技有限公司 | intelligent password signature identity authentication method and system |
-
2019
- 2019-10-11 CN CN201910963227.9A patent/CN110557407A/en active Pending
-
2020
- 2020-03-31 CN CN202010247242.6A patent/CN111163112A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111200616A (en) * | 2020-02-28 | 2020-05-26 | 北京帕斯沃得科技有限公司 | Password compiling method based on authentication terminal |
Also Published As
Publication number | Publication date |
---|---|
CN111163112A (en) | 2020-05-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10187211B2 (en) | Verification of password using a keyboard with a secure password entry mode | |
O'Gorman | Comparing passwords, tokens, and biometrics for user authentication | |
Schneier | Cryptographic design vulnerabilities | |
US8365262B2 (en) | Method for automatically generating and filling in login information and system for the same | |
US8261089B2 (en) | Method and system for authenticating a user by means of a mobile device | |
CN105162764A (en) | Dual authentication method, system and device for SSH safe login | |
CN110650021A (en) | Authentication terminal network real-name authentication method and system | |
CN101420302A (en) | Safe identification method and device | |
Manzoor et al. | Secure login using multi-tier authentication schemes in fog computing | |
US20010048359A1 (en) | Restriction method for utilization of computer file with use of biometrical information, method of logging in computer system and recording medium | |
Kumar | A New Secure Remote User Authentication Scheme with Smart Cards. | |
CN102609656A (en) | USB (universal serial bus) key safety enhancing method and USB key safety enhancing system based on image identification | |
Stokkenes et al. | Biometric authentication protocols on smartphones: An overview | |
CN104753886B (en) | It is a kind of to the locking method of remote user, unlocking method and device | |
US20090019289A1 (en) | Negative authentication system for a networked computer system | |
CN110557407A (en) | Authentication terminal for compiling password based on identity authentication digital signature | |
US20080263364A1 (en) | System and method for providing access to a computer resource | |
CN105071993A (en) | Encryption state detection method and system | |
Brintha et al. | Securing banking credentials from SQL injection attacks using AES algorithm | |
CN211127846U (en) | Authentication terminal for compiling password based on identity authentication digital signature | |
CN100477594C (en) | Internet clearance safety authentication method | |
TWI473507B (en) | QR code interactive OTP password authentication method | |
Sandhu et al. | Identification and authentication | |
Schneier | Security pitfalls in cryptographic design | |
Dixit | and Ketan Kotecha Department of Computer Science and Engineering, Symbiosis Institute of Technology, Pune, India {ashish. dixit. btech2019, arnav. gupta. btech2019 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20191210 |