Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption device, system and method for encryption, identification using the encryption device

A technology of identity authentication and computer devices, applied in transmission systems, data processing applications, instruments, etc., can solve problems such as loss of funds, inability to determine whether information has been tampered with, loss of customer funds, etc., to improve security and solve transaction hijacking Effect

Active Publication Date: 2008-05-21
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF1 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. The problem of "remote control": "remote control" means that the ordinary USBKey device has been plugged into the client computer, and criminals use the method of remote control of the client computer to call the client's ordinary USBKey device to perform online operations without the client's knowledge. Banking transactions, causing loss of funds to customers
[0004] 2. The problem of "transaction hijacking and transaction tampering": "transaction hijacking and transaction tampering" means that criminals use malicious programs to steal customers' transactions when they use ordinary USBKey devices to conduct online banking transactions without the knowledge of customers. After the information is hijacked and tampered with, the tampered transaction information is digitally signed with an ordinary USBKey device and submitted to the bank's transaction system. Since the customer does not know that his transaction information has been tampered with, the bank's transaction system can only submit it to the client. The communication between the server and the server is guaranteed to be confidential and not tampered with. It is impossible to judge whether the information submitted by the client has been tampered with. Therefore, criminals can use this method to cause financial losses to customers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption device, system and method for encryption, identification using the encryption device
  • Encryption device, system and method for encryption, identification using the encryption device
  • Encryption device, system and method for encryption, identification using the encryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The invention discloses a USBKey device, and a system and method for encrypting and authenticating online bank data by using the USBKey device. On the basis of the prior art USBKey device, the USBKey device is modified, and buttons and a visual screen are added. It is applied to online banking transactions to prevent criminals from remotely controlling and tampering with signature data during online transactions, further improving the security of online banking and reducing the risk of fund theft.

[0051] FIG. 1 depicts a schematic diagram of a USBKey device involved in the present invention.

[0052] The shape and size of the USBKey device involved in the present invention are similar to those of common keys, and are easy to carry and use. Through the USB interface 101, insert the USB socket on the computer to connect with the computer; the indicator light 102 indicates its working status; the button 103 is used for: when the client confirms that the USBKey device is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a USBKey encryption device, a system and a method using the USBKey encryption device for encryption and identification; wherein, the USBKey device comprises: a USB interface used for connection between an USB socket and a computer, an indicator used for indicting work status of the USBKey device and a built-in chip storing unique serial number of the USBKey device when leaving the factory and storing digital certificate and private key used for identifying identification of clients; the private key cannot be imported from the USBKey device. The invention is characterized in that: the USBKey device also comprises a visual screen used for displaying information under signing when digital signature is made for the USBKey device; the USBKey device also comprises one or a plurality of buttons for operations such as confirming or cancelling the information under signing; the visual screen can also be a touch panel.

Description

technical field [0001] The present invention relates to an information encryption device, a system and a method for encrypting and authenticating using the encryption device, in particular to a USBKey device, and a system and method for using the USBKey device to encrypt and authenticate online bank data. Background technique [0002] At present, online banks use ordinary USBKey devices to authenticate customers. The use of ordinary USBKey devices is described in detail in the patent No. 200410028723.9 of the same applicant. With the development of computer technology, the client environment varies greatly. When the client computer is attacked by malicious programs, the following two problems still exist in ordinary USBKey devices: [0003] 1. The problem of "remote control": "remote control" means that the ordinary USBKey device has been plugged into the client computer, and criminals use the method of remote control of the client computer to call the client's ordinary USBK...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q40/00H04L29/06G06Q40/02
Inventor 鲁小涛王怡彭琳熊俊王凯张建平文卫华
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products