Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Physical certifying method and device

An authentication method and physical technology, applied in the field of physical authentication, can solve the problems of not being able to solve the problem of binding legal users to electronic devices, hidden dangers of authentication methods, and inability to guarantee, so as to achieve the flexibility of physical authentication and facilitate physical authentication. , to achieve the effect of flexibility

Active Publication Date: 2009-07-22
BEIJING WATCH DATA SYST
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These authentication methods can realize the authentication of the legality of the transaction, and can also authenticate the legality of the user's identity to a certain extent, but these authentication methods cannot solve the binding problem between the legal user and the electronic device, that is, they cannot Guarantee that legitimate users are engaging in legitimate transactions
For example, the "Trojan horse" program residing in the user's computer can monitor the running process of the client application program, obtain the legal use password without the legitimate user's knowledge, and can start the electronic device to generate a legal digital signature , to complete the online transaction process, so these authentication methods still have major security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical certifying method and device
  • Physical certifying method and device
  • Physical certifying method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0104] Such as image 3 As shown, it is a schematic flow chart of Embodiment 1. This flow chart demonstrates the process of the user using the present invention to implement security operations. It can be seen from the figure that it mainly includes the following steps:

[0105] S11. The client sends a secure computing command to the physically authenticated device;

[0106] S12. The device for physical authentication searches the operation control list according to the key used by the secure operation instruction;

[0107] S13. The device for physical authentication judges whether there is a corresponding operation control record for the key? If yes, enter step S14, if no, enter step S17;

[0108] S14. The device for physical authentication extracts the physical authentication mode information from the operation control record;

[0109] S15. The device for physical authentication returns the physical authentication information to the client, and the client prompts the user...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method comprises; setting up a key and a corresponding relation between the operation command and the physical authentication; receiving the operation command; enquiring the key used by the operation command; according to the key, establishing a corresponding relation between the operation command and the physical authentication to get the physical authentication mode corresponding to the operation command; according to the physical authentication mode, initiating a physical authentication operation; if the physical authentication is passed, executing the operation command; otherwise, ending the procedure. The apparatus of the physical authentication comprise: an operation corresponding relation module, a processor, a physical authentication module respectively connected to the processor, an operational calculation module and a data memory module.

Description

technical field [0001] The invention relates to the field of computer and communication security, in particular to a physical authentication method and device. Background technique [0002] In any network transaction environment, security issues mainly exist in the source, sink and channel, or in the server, network and client. At present, the security of the server can be guaranteed by means of physical control, security management, high-level hardware platform and operating system, system and network security software and equipment. The security of data transmission on the network can be solved by data encryption and decryption technology based on cryptography methods, and the effect is very good. The client refers to the application program installed on the user's computer and its related software and hardware operating environment. Since the network management system cannot control the user's computer and check it, and the client user in the network environment obtains ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06Q30/00
Inventor 洪占新周大勇
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products