期刊文献+

密码认证专利技术现状与发展趋势分析 被引量:3

Analysis of Current Status and Trends of Patent Technology of Password Authentication
下载PDF
导出
摘要 密码认证技术是解决网络安全的核心技术,密码认证技术常采用静态密码认证方式和动态密码认证方式。本文从专利技术的角度对密码认证技术进行了技术概述和分类,梳理了密码认证的专利技术发展路线,具体从专利申请量、主要申请人、重点技术分支发展几个方面展开论述。本文重点分析了静态密码和动态密码的优势及其应用环境,并着重分析了动态密码认证技术的不同认证机制,为以后密码认证技术的应用提供了有力的支撑。 Password authentication technology is the core technology to solve network security. Password authentication technology often uses static and dynamic password authentication. This paper summarizes and classifies the technology of password authentication from the point of view of patented technology,sorts out the patented technology development path of password authentication,and discusses in detail the number of patent applications,the main applicants and the development of key technology branches. This article focuses on the advantages of static and dynamic passwords and their application environment,and emphatically analyzes the different authentication mechanisms of dynamic password authentication technology,which provides a strong support for the future application of password authentication technology.
作者 王淑婷 郭珩
出处 《中国发明与专利》 2017年第S1期74-79,共6页 China Invention & Patent
关键词 网络安全 密码认证 动态密码 network security password authentication dynamic password
  • 相关文献

参考文献6

二级参考文献34

  • 1张利华.一种增强的智能卡口令认证方案[J].计算机工程与应用,2004,40(31):137-138. 被引量:2
  • 2苏晓琴,郭光灿.量子通信与量子计算[J].量子电子学报,2004,21(6):706-718. 被引量:63
  • 3L Lamport.Password Authentication with Insecure Communication[J]. Communications of the ACM, 1981 ;24( 11 ) :770.
  • 4R L Rivest,A Shamir,L Adleman.A method for obtaining digital signature and public-key cryptosystem[J].Communications of the ACM, 1978 ;21 (2) : 120-126.
  • 5S P Shieh,W H Yang,H M Sun.An Authentication Protocol Without Trusted Third Party[J].IEEE Communications Letters, 1997; 1(3).
  • 6G B Purdy.A High Security Log-in Procedure[J].Communicatiom of the ACM, 1974 ; 17 (8) :442-445.
  • 7L H Huang,D Huang,C S Laih.Password Authentication Based On Public-Key Distribution Cryptosystem[C].In:Proceedings Fifth International Conference on Data Engineering,1989:332-338.
  • 8T Hwang,Y Chen,C S Laih.Non-Interactive Password Authentications Without Password Tables[C].In:IEEE Region 10 Conference on Computer and Communication Systems,1990.
  • 9Event-synchronous Tokens Versus Time-dependent Tokens[EB/OL].http://www.securecomputing.com/index.cfm?skey=969,2002-02.
  • 10A Comparison of Two Different Approaches to Using Dynamic Passwords[EB/OL].http://www.quizid.com/media/dynamic_passwords.pdf,2002-10.

共引文献40

同被引文献18

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部