Cipher token safety authentication method adopting picture interference
A token and password technology, applied in user identity/authority verification, data processing applications, instruments, etc., can solve problems such as tampering attacks, no economic value, counterfeiting attacks, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] Inspired by the current verification code patterns popular on the Internet, the present invention solves the above-mentioned security problem by adopting a method of image interference for protective verification.
[0029] The essence of the security hole is that the Trojan horse can operate the token without the user's knowledge, so as to use the token, pretend to be the user to communicate with the remote end or steal user data. Therefore, the key to solving this vulnerability is to enable the cryptographic token to notify the user when it performs a security operation. Ordinary users must pass through the terminal when communicating with the token. If there is a Trojan horse in the terminal, then this channel will not be safe. Therefore, the previous solutions are to take the confirmation method of safe operation outside the terminal, such as directly in the token. A password keyboard is set up on the card for PIN code verification, etc. This problem can be solved b...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 