Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A device and method for secure use of network server service not depending on operating system security

An input device and encryption device technology, applied in the field of safe use of network server services, can solve problems such as data not being displayed in time, user confusion, etc.

Inactive Publication Date: 2008-02-20
NANJING E SECURITY TECHNALOGY
View PDF16 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if these data cannot be displayed on the computer in a timely manner when entering the transaction object, bank card number, and transaction price, it will cause great confusion to the user
If it is normally displayed on the screen, the Trojan horse can tamper with the data sent to the network server. At present, there is no single-keyboard code for timely encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A device and method for secure use of network server service not depending on operating system security
  • A device and method for secure use of network server service not depending on operating system security
  • A device and method for secure use of network server service not depending on operating system security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] [Example 1] keyboard string dog

[0043] According to the first embodiment of the present invention, an apparatus and method for realizing safe use of network server services without relying on operating system security are shown in FIG. 2 .

[0044] After the computer normally enters the operating system or the application program 31, when the user enters the key code through the computer keyboard 4, the cryptographic device 6 encrypts the key code according to the obtained key code; then transmits to the system keyboard middleware 32; Send to server 1; Server 1 deciphers this key code, and sends back to system keyboard middleware 32 through network 2; The character of representative is sent to show on display 5 by application program.

[0045] In fact, the application program 31 may be an IE browser, or a client of an online game, or a client of an online bank. When the computer enters the application program 31, it is obvious that the cryptographic device 6 needs t...

Embodiment 2

[0049] [Example 2] USB dog

[0050] According to the second embodiment of the present invention, the implementation of the device and method for realizing safe use of network services without relying on computer security is shown in FIG. 3 . In this way, the encryption device 6 is directly connected to a computer interface (for example, a USB interface, a PS2 interface, and a 1394 interface, etc.).

[0051] After the computer normally enters the operating system or the application program 31, when the user enters the key code through the computer keyboard 4, the cryptographic device 6 encrypts the key code according to the obtained key code; then transmits to the system keyboard middleware 32; Send to server 1; Server 1 deciphers this key code, and sends back to keyboard middleware 32 through network 2; The characters are sent to the display 5 by the application program for display. Since the system keyboard middleware 32 can be attacked by a Trojan horse, it may be tampered...

Embodiment 3

[0054] According to the third embodiment of the present invention, a method for realizing safe use of network services without relying on computer security is shown in FIG. 4 .

[0055] First, the network server and the cryptographic device perform identity authentication; after the authentication is passed, the session key is negotiated, and if the authentication fails, the service will not be provided; when the single-key code is input, it is expanded with a random number; after encryption, it is sent to the middle software of the system keyboard; the system keyboard The intermediate software transmits the single-key code encryption code to the server; the server decrypts the single-key code encryption code and transmits the decrypted key code to the keyboard intermediate software, and records the key code; the system keyboard intermediate software transmits the key code to the application program .

[0056] Embodiment 3 is an information flow chart corresponding to when the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The utility model relates to a specific device and the method for realizing safe use of the network server independent to the safety of the operating system. The utility model has the advantages that utilizing a keyboard, a cryptographic device, a network server and reasonable information flow mode, and combining with good cryptographic protocol can simply and safely realize the device and the method for safely using network server in unsafe computer.

Description

field of invention [0001] The invention relates to a device and method for safely using network server services independent of operating system security. In particular, it relates to a device and method for safely using network server services on possibly insecure computers. Background technique [0002] In a recent article of "Computer World" "SSL is difficult to guarantee the security of e-commerce" (Computer World News, May 29, 2006, No. 20, B24, B25), the latest progress and countermeasures of computer Trojans attacking banking systems are described. method. With the help of SSL Trojan horses or more advanced phishing techniques, hackers can either steal the user's login information, or secretly transfer funds from the account after the user successfully logs in. In both cases, the SSL connection between the computer and the bank was intact and nothing was broken. However, someone has tampered with the SSL endpoint. In other words, before the transaction information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/38G06F21/04G06F21/60G06F21/83G06F21/85
CPCG06F21/85H04L63/083H04L9/00H04L63/0428G06F21/606G06F21/83
Inventor 邵通
Owner NANJING E SECURITY TECHNALOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products