CrazyEngineers
  • How does the security Device which generate unique number everytime work??

    Updated: Oct 22, 2024
    Views: 1.0K
    Guys,

    I have seen a security device which provides connection for someother system in a secured way.

    The secured was is Provide userID and Password.

    Along with the process we have to enter a number which keeps on changing for authentication purpose.

    How does this system work??

    The userID and Password are saved in database!!

    But how this number system work for a login??

    Please explain 😀
    0
    Replies
Howdy guest!
Dear guest, you must be logged-in to participate on CrazyEngineers. We would love to have you as a member of our community. Consider creating an account or login.
Replies
  • Saandeep Sreerambatla

    MemberOct 25, 2009

    Re: How does the security Device which generates unique number everytime work??

    I have searched some articles and found the same answer.

    It generates a random number , this is the key to login.

    It expires after certain period of time.

    I thought for a conclusion saying all the numbers will be in the database associated with one account.

    If thats the case then any number should work since it will be in database.

    Or else,

    Do they have any program which generates a new key depending upon the date and time and time zone where the user is actually located in?

    So I came to a conclusion like they install a program in the device and at their back end where it runs according to the timing?

    So do they have different programs for different users is my next doubt , If yes do they change some * or + operations or much more ??
    Are you sure? This action cannot be undone.
    Cancel
  • durga ch

    MemberOct 25, 2009

    may be its a numberial combination of user ID ans password?

    and may be after few permutations and combinations the passowrds might repeat! who knows??

    any examples of the security system you are talking about?
    Are you sure? This action cannot be undone.
    Cancel
  • Saandeep Sreerambatla

    MemberOct 25, 2009

    Consider the HSBC internet security device.

    The person holding it has a userid and password and security login.

    I saw few devices in our previous organization with the same behaviour for VPN login.

    They use the userID and Password and the security number.
    Are you sure? This action cannot be undone.
    Cancel
  • durga ch

    MemberOct 25, 2009

    I think, random generation in case of VPN is combination of numbers and alphabets .
    There can be a standard key generation mechanism like in case of Wireless access, WPA, WEP functions are used for generation of random passkets.
    Are you sure? This action cannot be undone.
    Cancel
  • Saandeep Sreerambatla

    MemberOct 26, 2009

    Can you be a bit elaborate ?

    Or else can you provide me some links regarding this??

    I didnt understood it clearly 😔
    Are you sure? This action cannot be undone.
    Cancel
  • durga ch

    MemberOct 26, 2009

    I see,

    IN WEP( wired equivalent Privacy)( this is now obsolete- just an example though)
    you have three parameters to generate a authentication key
    1. Initialisation vector
    2.key
    3. a normal text pass phrase ( mostly entered by users as users)

    Intialisation vector and key give rise to a code and this code is later applied to your code passkey to give rise to a new encrypted key which can be used by your computer and accessing routers.

    See the example below. That was the router login page of my netgear router and ofcourse I have manually encrypted the password as x x x x 😁

    [​IMG]

    as can be seen,
    I select the security option and then security encryption strenght ( 64 bits - 1.WEP 40 key and 2.24 IV key)
    I again enter my passphrase ( 3.the normal text) and click generate.

    Then a complete encryption key is generated.

    This is one example I can give you. This method is any ways obsolete now as the 24 bit key will keep repeating after few packets and thus can be hacked easily.

    You can refer to WPA here:#-Link-Snipped-#
    Are you sure? This action cannot be undone.
    Cancel
  • vik001ind

    MemberOct 28, 2009

    this might help
    #-Link-Snipped-#

    and this
    #-Link-Snipped-#
    Are you sure? This action cannot be undone.
    Cancel
Home Channels Search Login Register