Computer network safe input authentication system and method

A computer network and secure input technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as inconvenience in use, and achieve the effect of avoiding theft

Active Publication Date: 2007-10-31
LENOVO (BEIJING) CO LTD
View PDF1 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the defect of this method is that on the one hand, the user needs to generate and read the input, which is very inconvenient to use; password entered
But this method only uses the symmetric key security authentication method, and in order to solve the symmetric key exchange problem, a c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer network safe input authentication system and method
  • Computer network safe input authentication system and method
  • Computer network safe input authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The computer network security input system and method of the present invention will be further described in detail below in conjunction with accompanying drawings 1-5.

[0049] The core point of the present invention is to embed a security encryption unit in the terminal computer, which can be activated according to needs. When the security unit is activated, the validity of the communication is first verified by the time stamp, and then all transmitted input data are passed through this The security encryption unit encrypts. At this time, the data (character string) input by the user through the input device, including character information such as user and password, is in an encrypted state inside the personal computer of the terminal and during network transmission. Only when it reaches the application server of the network, such as the server of the network bank, because the network server has the decryption key, through the decryption operation, the original informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer network safety attestation system and method that comprises terminal computer and network server, the input equipment of the terminal computer includes input unit (4) and interface unit (5), said terminal computer also includes control unit (1) and safe unit (2); the safe unit (2) receives the data input from the input unit (4) in safe inputting mode, encrypting data input with symmetry arithmetic by key, temporary key is encrypted and underwritten by the server general key transmitted by the network server with asymmetric arithmetic; said network server includes encrypting and deciphering unit(7); the encrypting and deciphering unit(7) deciphers the data package transmitted from the terminal computer with corresponding asymmetric arithmetic using server private key to obtain the key, validating the validity of temporary key, then the encrypted character string is deciphered with corresponding symmetry arithmetic using the temporary key to obtain data input by user. The inventions can guarantees the input data of computer not be filched, decrypted or forged.

Description

technical field [0001] The invention relates to the field of computer network security authentication, in particular to a computer network security input system and method. Background technique [0002] With the development of the network, users are using more and more applications on the network, such as mail, games, and online banking. For safety, these applications require users to input characters from input devices for network security authentication such as user identity. [0003] During computer use, users often input sensitive information such as user names, passwords, or transaction data through the network. During the operation of the network, a personal computer (PC) as an input terminal device accepts sensitive information such as user names, close friends, or transaction data input by users, and transmits them to the network server without processing or preliminary processing. The real data processing on the network server may also need to exchange data with ot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/28G06F9/455
Inventor 杨文兵毛兴中吕渊
Owner LENOVO (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products