Safety certifying method and its system for facing signature data

A technology for security authentication and signature data, applied in the field of information security, it can solve the problems of inability to simulate or tamper with the transaction content of the authenticated image, and without authentication image security authentication, and achieve the effect of easy and rapid implementation and application, low cost and low complexity

Inactive Publication Date: 2007-10-10
BEIJING WATCH DATA SYST
View PDF1 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And this physical process cannot be simulated by any computer program, which makes it impossible for malicious programs to simulate or tamper with the transaction content contained in the authentication picture
[0008] But as far as the inventor knows, there is no technology that combines physical authentication and authentication pictures generated by CAPTCHA technology for security authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety certifying method and its system for facing signature data
  • Safety certifying method and its system for facing signature data
  • Safety certifying method and its system for facing signature data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The authentication picture generated by physical authentication and CAPTCHA technology is combined for security authentication, and the picture containing transaction content generated by CAPTCHA technology is required to meet: 1. Whether the picture content passes the verification must be controlled by the user, and the judgment result of whether it passes, It cannot be input on the user's computer; 2. If the picture is forged by the attacker, the user can recognize it immediately; 3. The picture is difficult to tamper with, and if it is tampered with, the user should be able to recognize it immediately.

[0036]Referring to the Chinese invention patent application No. 200610113569.4 "Method for Realizing Data Interaction Between Digital Signature Device and Its Peer Device" previously applied by the applicant, the digital signature device USB Key with buttons and operation control list technology can satisfy The first requirement, because the initiation and confirmatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The security authentication method includes following steps: (1) through client end, user sends data to be signed to server end; (2) server end returns information to be authenticated to client end, and the said information is displayed at client end in logic mode; (3) user recognizes the said information, and validates whether the content of the information to be authenticated is collect; if yes, user initiates physical authentication operation, carries out digital signature on the data at client end, and sends it to server end, otherwise, canceling the authentication operation. Features are: low cost, high security, being suitable to online interactive system such as network shopping, bank service, and reporting tax through network.

Description

technical field [0001] The invention relates to a signature data-oriented security authentication method and system thereof, in particular to a signature data security authentication method and system applied to an online interactive system, and belongs to the technical field of information security. Background technique [0002] In the existing network transaction environment, people often use an independent signature authentication device for transaction security processing, such as a USB Key issued by a bank. However, practice shows that even if independent security devices are used, there are still great security risks in network transactions. The reason is that the client environment used by users in transactions is not safe. The client environment here refers to the application program installed on the user's computer and its related software and hardware operating environment. At present, most of the clients used by users adopt general-purpose operating systems with...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L12/56H04L29/06
Inventor 陈幼雷冯秀涛高翔
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products