Method and system for updating certification key

An authentication key and consistent technology, applied in the field of information security, can solve the problems of high cost, insecure authentication key, troublesome authentication key management, etc., and achieve the effect of avoiding insecurity and inconvenience

Active Publication Date: 2007-07-25
FEITIAN TECHNOLOGIES
View PDF0 Cites 96 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The method and system for remotely updating the authentication key proposed by the present invention solve the insecurity of transmitting the authentication key in plain text through the network, as well as the problems of management trouble and high cost caused by transmitting the authentication key in cipher text

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for updating certification key
  • Method and system for updating certification key
  • Method and system for updating certification key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] As shown in Figure 1, a method for updating an authentication key proposed by an embodiment of the present invention specifically includes the following steps:

[0058] Step 101: the server obtains a random number ChallengeRand and the hardware serial number HSN of the information security device from the client, and generates a random seed SEED.

[0059] The random number ChallengeRand is pre-generated inside the information security device connected to the client computer and stored in the information security device.

[0060] Step 102: The server side performs operations on the random seed SEED and the random number ChallengeRand to generate verification data.

[0061] Operations include combination, and, or, not, exclusive or, addition, subtraction, and multiplication.

[0062] Step 103: The server side reads the original authentication key AKEY from the server database according to the obtained hardware serial number of the information security device, and encrypt...

Embodiment 2

[0073] As shown in Figure 2, the embodiment of the present invention also proposes a method for updating the authentication key, which specifically includes the following steps:

[0074] Step 201: the server acquires the hardware serial number HSN of the information security device from the client, and generates a random seed SEED.

[0075] Step 202: the server transmits the random seed SEED to the client through the network.

[0076] Step 203: the information security device acquires a random seed SEED from the client.

[0077] Step 204: In the information security device and the server, perform the same encryption operation on the random seed SEED and the original authentication key to generate a new authentication key NEW_AKEY, and use the new authentication key NEW_AKEY to update the database in the information security device and the server The authentication key in .

[0078] The method of generating and updating the authentication key NEW_AKEY in the information secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is to solve issues: not security of transferring authentication cipher key through network by using plaintext; and managing bother, and high cost by using cryptograph format to transfer authentication cipher (AC). The disclosed method for updating AC remotely includes steps: server end calculates random seed and random number to generate verification data; server end carries out encryption operation for original AC and verification data, and transfers random seed and result of encryption operation to client end; information security equipment validates correctness of random seed; carrying out same encryption operation for random seed and original AC inside the information security equipment, and at server end so as to generate new AC, which is in use for updating AC inside the information security equipment, and database in server. The invention also discloses system for updating AC.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for updating an authentication key. Background technique [0002] In recent years, with the rapid development of Internet technology and e-commerce, more and more business activities have been transferred to the Internet, such as online government office, online banking, online shopping, etc. At the same time, more and more business activities involving Personal privacy and business secret information need to be transmitted through the network. However, malicious threats such as viruses, hackers, and phishing scams have brought great challenges to the security of online transactions, making network security issues very important. [0003] With the continuous improvement of people's security awareness, various encryption algorithms have emerged as the times require. The commonly used encryption algorithms mainly include hash algorithm, symmetric encryption ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/16
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products