Visible intelligent cipher key
A smart password key and smart card technology, which is applied in digital data authentication, computer security devices, transmission systems, etc., can solve problems such as single function and no display screen, and achieve the effect of satisfying throughput, ensuring security, and strengthening security strength
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Example Embodiment
[0021] Example 1 (visual TOKEN)
[0022] The visible TOKEN of the present invention can generate authentication information according to the internal security algorithm and / or the security algorithm on the external encrypted smart card, and display it on the display screen. Since the authentication information displayed is different each time, the user name and password can be effectively prevented from being directly used after being stolen.
[0023] The enhanced visual TOKEN can generate authentication information after identifying the user's usage rights through fingerprints.
Example Embodiment
[0024] Embodiment 2 (password key with reading function)
[0025] The cryptographic key with reading function of the present invention can realize the encryption and authentication functions of the cryptographic key, and can also read the balance information of the financial card. The password key can store the certificates required by the financial card exchange, and the financial card and the password key can be used in conjunction with the card reader function (such as using a USB interface, which is equivalent to a USB card reader).
[0026] Enhanced with SIM card backup function, you can back up SIM card phone calls, text messages and file information.
Example Embodiment
[0027] Example 3 (Multi-purpose visual password key)
[0028] The multi-purpose visual password key of the present invention can store various user passwords in the internal, unified management, and authorize reading and use through a master password and / or fingerprint. In this way, the visual password key can securely protect all the user's identity information and password information.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap