Physical certifying method and device

An authentication method and physical technology, applied in the field of physical authentication, which can solve the security risks of authentication methods, cannot solve the problem of binding legal users to electronic devices, and cannot guarantee other problems, so as to facilitate physical authentication and realize the flexibility of physical authentication. , to achieve the effect of flexibility

Active Publication Date: 2007-11-21
BEIJING WATCH DATA SYST
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These authentication methods can realize the authentication of the legality of the transaction, and can also authenticate the legality of the user's identity to a certain extent, but these authentication methods cannot solve the binding problem between the legal user and the electronic device, that is, they cannot Guarantee that legitimate users are engaging in legitimate transactions
For

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Physical certifying method and device
  • Physical certifying method and device
  • Physical certifying method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0104] As shown in Figure 3, it is a schematic flow chart of Embodiment 1. This flow chart demonstrates the process of the user using the present invention to implement security operations. As can be seen from the figure, it mainly includes the following steps:

[0105] S11. The client sends a secure computing command to the electronic device;

[0106]S12. The electronic device searches the operation control list according to the key used by the secure computing instruction;

[0107] S13. The electronic device judges whether there is a corresponding operation control record for the key? If yes, enter step S14, if no, enter step S17;

[0108] S14. The electronic device extracts physical authentication mode information from the operation control record;

[0109] S15. The electronic device returns the physical authentication information to the client, and the client prompts the user to perform corresponding physical authentication;

[0110] S16. The electronic device judges wh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method comprises; setting up a key and a corresponding relation between the operation command and the physical authentication; receiving the operation command; enquiring the key used by the operation command; according to the key, establishing a corresponding relation between the operation command and the physical authentication to get the physical authentication mode corresponding to the operation command; according to the physical authentication mode, initiating a physical authentication operation; if the physical authentication is passed, executing the operation command; otherwise, ending the procedure. The apparatus of the physical authentication comprise: an operation corresponding relation module, a processor, a physical authentication module respectively connected to the processor, an operational calculation module and a data memory module.

Description

technical field [0001] The invention relates to the field of computer and communication security, in particular to a physical authentication method and device. Background technique [0002] In any network transaction environment, security issues mainly exist in the source, sink and channel, or in the server, network and client. At present, the security of the server can be guaranteed by means of physical control, security management, high-level hardware platform and operating system, system and network security software and equipment. The security of data transmission on the network can be solved by data encryption and decryption technology based on cryptography methods, and the effect is very good. The client refers to the application program installed on the user's computer and its related software and hardware operating environment. Since the network management system cannot control the user's computer and check it, and the client user in the network environment obtains ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06Q30/00
Inventor 洪占新周大勇
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products