Title of Invention

THE DYNAMIC IDENTFICATION METHOD WITHOUT INDENTIFICATION CODE

Abstract A fully dynamic authentication method without identifier is disclosed in the present invention. The user's original identification code and authentication code having been encrypted dynamically will be transmitted by the user terminal to the server, and will be decrypted there for identification confirmation. In the authentication method of the invention, the identification code and authentication code are encrypted and decrypted unitedly. The results of each encryption are different from all the others and there is no a static identification code or feature to be identified each time the user's identification is authenticated, therefore the hacker would not be able to trace, record and analyze the user's authentication information. Thus actually the cracking object of the hacker has to be changed from the variation law of a single user to those of all users, which provides higher security.
Full Text FORM-2
THE PATENTS ACT, 1970
COMPLETE SPECIFICATION
[Section 10]
1. "THE DYNAMIC IDENTFICATION METHOD WITHOUT
INDENTIFICATION CODE"
2. (a) CI, MengFu
(b) 39#, Xin Kai Pu Road,
Changsha City, Hunan Province 410009 Republic of China
(c) Republic of China
The following specification particularly describes the nature of the invention and the mannerin which it is to beperformed. GRANTED
ORIGINAL 13 DEC 2004
268/MUMNP/2003
03-03-03
13-12-2004


The present invention involves a fully dynamic authentication without identifier, belongs to the information security field.
Existing Technology Prior to the Invention
For computer network user authentication, now generally the method of the static identification code (user name and series number etc.), combined with the password (the cryptogram set by the user) is used to confirm the user's identification. Whereas the US patent application No: 4720860 is for an apparatus for the electronic generation and comparison of non-predictable codes. The apparatus of the invention comprises a first mechanism for calculating a first non-predictable code according to a predetermined algorithm. Predetermined program and first static variable are stored in volatile memory which causes said program and static variable to be destroyed if an attempt is made to gain access thereto. Since the static identification code and password in this method remain unchanged during their transmit from the user's terminal to the server for identification authentication, they may be intercepted and captured by a certain hacker in the course of information transmit between the user's terminal and the server and may be utilized by the attacker to imitate an authorized user to beat. Aiming at eliminating this defect in the above static authentication, a new user authentication method has developed based on the above authentication method and the modification from static password to dynamic password (i.e. static identification code + dynamic password). Quite a few products based on this new authentication method have been launched to the market, such as the Dynamic ID card of two-factor authentication based on "cryptographic key - time

(event)" provided by the RSA Security Incorporation, which will produce dynamic password automatically on different time for authentication. In fact, any user who uses the dynamic password for authentication will get his dynamic password variation based on a certain rule, and the hacker may makes use of the weakness that the static identification code remains unchanged to follow up and analyze it. He would be able to crack the variation law of the dynamic password and, after capturing enough information, mimic the authorized user to raise attacks.
Purpose of the Invention
The invention is to provide an authentication that the hacker could not trace and analyze.
Technical Scheme of the Invention
In the fully dynamic authentication method without identifier of the invention, the user's original identification code and authentication code having been encrypted dynamically will be transmitted by the user terminal to the server, and will be decrypted there for identification confirmation.
In the authentication method of the invention, the identification code and authentication code are encrypted and decrypted unitedly. The results of each encryption are different from all the others and there is no a static identification code or feature to be identified each time the

user's identification is authenticated, therefore the hacker would not be able to trace, record and analyze the user's authentication information. Thus actually the cracking object of the hacker has to be changed from the variation law of a single user to those of all users, which provides higher security.
Description of Figure
Figure 1 is the schematic diagram of the flow of the above authentication method of the invention.
Embodiment
Shown in Figure 1, the original codes are composed of identification codes I1, I2, ...Ik and authentication codes P1, P2, ...Pk' During authentication, the above original identification codes and authentication codes are encrypted, and a fully dynamic authentication code (M1, M2, ...Mk, Mk+1 Mk+2.... Mk+n) varying in each authentication is produced, and then the dynamic identification code (M1 M2, ...Mk, Mk+1, Mk+2,... Mk+n) is transmitted to the server. The fully dynamic identification code will be decrypted in the server and the original identification code I1, I2, ...Ik and the original

authentication code P1, P2, ...PK will come out again for the corresponding authentication.
The above encryption course may be set to be carried out by the encryption software or hardware in the user's terminal and any encryption technology may be adopted without any limitation to the encryption method. For instance, the dynamic encryption result may be got by varying encryption method in each authentication or by constant encryption method but varying cryptographic key in each authentication, or even by dynamic encryption method. On the other hand, the fully dynamic authentication code without identifier may be decrypted by the same encryption algorithm system in the server as used in the user's terminal, or by corresponding public cryptographic key in the server while the encryption is done by the private cryptographic key.

The invention is not limited to the above embodiment. The core of the invention is: both the identification code and the authentication code are transformed into the fully dynamic identification code (both the original identification code and the authentication code do not exist any longer), which is transmitted to the server for authentication. Therefore, those authentication methods only by the remained dynamic identification code without authentication code shall belong to the protective scope of the invention.

I Claim:
1. A method for generating a fully dynamic
authentication code comprising the steps of:
providing a user's original identification code and authentication code;
encrypting the user's original identification code and authentication code dynamically in the user terminal to produce a fully dynamic authentication code;
transmitting the fully dynamic authentication code to a server, and the fully dynamic authentication code without identifier will be decrypted in the server for identification confirmation.
2. The method of claim 1 further comprising the step
of using the same dynamic encryption algorithm
system in both a user's terminal and a server for
encryption and decryption.
Dated this 28th day of February 2003.
Dr. Rajeshkumar H. Acharya Advocate & Patent Agent For and on Behalf of Applicant

Documents:

268-mumnp-2003-abstract(13-12-2004).doc

268-mumnp-2003-abstract(13-12-2004).pdf

268-mumnp-2003-claim(granted)-(13-12-2004).doc

268-mumnp-2003-claim(granted)-(13-12-2004).pdf

268-mumnp-2003-correspondence(13-12-2004).pdf

268-mumnp-2003-correspondence(ipo)-(09-12-2003).pdf

268-mumnp-2003-drawing(13-12-2004).pdf

268-mumnp-2003-form 1(03-03-2003).pdf

268-mumnp-2003-form 1(23-04-2003).pdf

268-mumnp-2003-form 19(23-06-2003).pdf

268-mumnp-2003-form 1a(29-10-2004).pdf

268-mumnp-2003-form 2(granted)-(13-12-2004).doc

268-mumnp-2003-form 2(granted)-(13-12-2004).pdf

268-mumnp-2003-form 26(28-02-2003).pdf

268-mumnp-2003-form 3(23-04-2003).pdf

268-mumnp-2003-form 5(23-04-2003).pdf

268-mumnp-2003-form-pct-isa-210(13-12-2004).pdf

abstract1.jpg


Patent Number 209883
Indian Patent Application Number 268/MUMNP/2003
PG Journal Number 41/2007
Publication Date 12-Oct-2007
Grant Date 10-Sep-2007
Date of Filing 03-Mar-2003
Name of Patentee CI, MENGFU
Applicant Address 39#, XIN KAI PU ROAD CHANGSHA CITY, HUNAN PROVINCE 410009 RUPUBLIC OF CHINA
Inventors:
# Inventor's Name Inventor's Address
1 CI MENGFU 39#, XIN KAI PU ROAD CHANGSHA CITY, HUNAN PROVINCE-410009. RUPUBLIC OF CHINA
PCT International Classification Number H04L 9/00
PCT International Application Number PCT/CN01/01401
PCT International Filing date 2001-09-17
PCT Conventions:
# PCT Application Number Date of Convention Priority Country
1 00 1 24551.1 2000-09-20 China