下拉按钮

Information about security and authentication

Background analysis

With the development of Internet technology, network security has become more and more popular in daily life, and network security has gradually become the focus of wide attention of people. The security demands that follow have been put on the agenda.

Six ways to leak Information

Six ways to leak Information

Four major problems of password security

1.Tedious multi-platform authentication
QQ, alipay and bank accounts are logged into accounts on multiple platforms, making it difficult to remember or reuse passwords, making the password security coefficient of accounts low and the risk of forgetting and stealing more and more high.
2. Weak password
For the convenience of using passwords, users often use their own birthday, phone Numbers, words and so on as passwords, these weak passwords are very easy to crack.
3. Hacking
More and more developed network information, personal information will be leaked even if it is careless, hackers, trojans, phishing websites emerge in endlessly, and even information theft by competitors.
4. Company management
When employees enter and leave the company, their rights are transferred.

Solution

In the face of many personal and corporate privacy and property security problems, shenzhen haiyue communication technology co., LTD. Has developed a dynamic password authentication solution.

Knowledge of dynamic cryptography

Noun explanation
  • Static password
    Static password

    The static password involved in this document is the fixed password normally set for the user.

  • Static password
    Dynamic password

    Seamoon's dynamic password authentication solution is a one-time password generated by OATH algorithm and a time-varying dynamic password based on SMS, APP and hardware token.

  • Static password
    OATH algorithm

    OATH algorithm is a recognized security algorithm in the international OTP field. If the OATH algorithm runs for a single time <1ms,it takes a very short time and consumes very little power. The OATH algorithm is used in this solution.

Dynamic cryptographic medium

The dynamic password solutions of Seamoon are all in the form of hardware token and APP.

  • SMS

    SMS
  • APP

    APP
  • Hardware token

    Hardware token
Dynamic password type
  • Usage: when using Seamoon dynamic password card, the password card generates a different, one-time password every 60 seconds.

  • Usage: when using Seamoon dynamic password card, the key automatically triggers a new one-time password.

  • Usage: when using Seamoon dynamic password card, the user triggers a new one-time password according to the login prompt message.

Dynamic password token usage

  • Time

    Time-based dynamic password authentication solutions are divided into long-display time tokens, key-based time tokens and APP-based time-based dynamic tokens.

    Long-display

    Long-time dynamic password token is the client device, the server time synchronization mechanism is used to produce the disposable dynamic password, convenient operation, the user login system when required to enter the dynamic password, simply enter the token display on dynamic password to complete the login (dynamic password every 20s/30s to 60s at a time of change).

    Key-based

    Key-based password token server time synchronization mechanism is used to produce disposable dynamic password OTP, when required to enter the dynamic password user login system, as long as the press of a button on the token, will be randomly generated a serial port to every 20s/30s to 60s is changed), customer input dynamic password to complete the login.

  • Event

    Event-type token use the mechanism of server and token key number event calculation synchronization to produce one-time dynamic password OTP, and adopts the mechanism of synchronous event to generate dynamic password.

  • Challenge response type

    Challenge response type dynamic token use the challenge response and one-time password algorithm is a combination of dynamic password authentication token integration and function of online trading signature, in the process of the realization of the input data, all data input operation through data input device input directly to the electronic signature work, be safe, reliable, and easy to use, easy to operate. The token has the function of starting PIN code protection to protect the user token from being misappropriated, misused and identity fraud. The challenge response token can provide a fully functional, highly secure authentication solution for customers.

btn