Remote unlocking method and system

A remote unlocking and algorithm technology, applied in the field of information security, can solve problems such as time-consuming, troublesome, and economic loss of users, and achieve the effects of reducing trouble, improving security, and saving time

Active Publication Date: 2008-04-23
FEITIAN TECHNOLOGIES
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The unlocking method in the above prior art requires the user to go to a special counter, which is troublesome and time-consum

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote unlocking method and system
  • Remote unlocking method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0089] Example 1

[0090] In this embodiment, the same generation elements are preset in the server and the information security device. Referring to FIG. 1, the embodiment of the present invention provides a remote unlocking method, which specifically includes the following steps:

[0091] Step 101: The user provides authentication information to the server.

[0092] When purchasing information security equipment, users are required to provide their own valid certificates. The valid certificate information will be stored on the server as authentication information for later unlocking. For example, users provide their own ID cards when purchasing information security equipment. Its ID number will be stored on the server.

[0093] The authentication information provided by the user may also include the hardware identification of the information security device. After receiving the authentication information, the server can find the random password algorithm corresponding to the inf...

Example Embodiment

[0123] Example 2

[0124] Referring to Figure 2, an embodiment of the present invention provides a remote unlocking system, including an information security device 200, a client 300, and a server 400.

[0125] The information security device 200 includes a generation module 201, a communication module 202, a comparison module 203, and a control module 204:

[0126] The generating module 201 is configured to generate an identification code according to a preset random password algorithm under the control of the control module 204, and send the identification code to the comparison module 203;

[0127] The communication module 202 is configured to receive the identification code input by the user through the client 300 under the control of the control module 204, and send the received identification code to the comparison module 203;

[0128] The comparison module 203 is configured to, under the control of the control module 204, compare whether the identification code sent by the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a remote unlocking method and a system, in which, the method includes: an information safety device generates an identification code according to a preset random password algorithm and receives a heading code of a user input by a user terminal, which is one that after a service end verifies the user is a legal one according to the authentication information provided by the user, it applies a same method to generate the identification code by the information safety device and returns it to the user, the identification code and the heading code are compared, if they are consistent, then the user is allowed to enter into the operation system in the device to alter its state, otherwise, the user is forbidden to enter into the operation system to alter the state of the device. The system includes: an information safety device, a client end and a service end.

Description

technical field [0001] The invention relates to the field of information security, in particular to a remote unlocking method and system. Background technique [0002] With the development of computer technology, people pay more and more attention to information security. In recent years, information security equipment is a small hardware device with processor and memory, which can be connected to the computer through the data communication interface of the computer. It is connected to the computer through the USB (Universal Serial Bus, Universal Serial Bus) interface, which is usually called USB KEY or USB Token (identity authentication device). In addition, the information security device can also use the ISO14443 communication interface, that is, the non-contact communication interface , the interface is a contactless smart card communication standard formulated by ISO (International Standardize Organization, International Organization for Standardization). Information s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L29/06
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products