Unlock instant, AI-driven research and patent intelligence for your innovation.

Cipher token safety authentication method adopting picture interference

A token and password technology, applied in user identity/authority verification, data processing applications, instruments, etc., can solve problems such as tampering attacks, no economic value, counterfeiting attacks, etc.

Active Publication Date: 2010-08-04
WUHAN TIANYU INFORMATION IND
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 2. Vulnerable to counterfeiting attacks
[0012] 3. Vulnerable to local tampering attacks
However, the cost of tokens designed in this way is often several times higher than the cost of traditional tokens, and there is no economic value for large-scale applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher token safety authentication method adopting picture interference
  • Cipher token safety authentication method adopting picture interference
  • Cipher token safety authentication method adopting picture interference

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Inspired by the current verification code patterns popular on the Internet, the present invention solves the above-mentioned security problem by adopting a method of image interference for protective verification.

[0029] The essence of the security hole is that the Trojan horse can operate the token without the user's knowledge, so as to use the token, pretend to be the user to communicate with the remote end or steal user data. Therefore, the key to solving this vulnerability is to enable the cryptographic token to notify the user when it performs a security operation. Ordinary users must pass through the terminal when communicating with the token. If there is a Trojan horse in the terminal, then this channel will not be safe. Therefore, the previous solutions are to take the confirmation method of safe operation outside the terminal, such as directly in the token. A password keyboard is set up on the card for PIN code verification, etc. This problem can be solved b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the safety certification field, in particular to a code token safety certification method adopting picture interference. The invention resolves the safety problems of PIN code steeling, passing-off attack and local tampering attack, etc. by means of the picture built-in random key mapping disc, the picture interference dynamic code and the watermark background, etc. In the invention, based on the mutual confirmation between the code token and the end user, each key step of the code token needs to be manually confirmed by an end user; a safety verification channel is arranged on the terminal and between the code token and a user operator, thereby making safe token operations on an unsafe terminal possible. The operating processes of the method of the invention can be known and recognized by the user operator, thereby effectively eliminating threats of viruses and trojan programs on the safety of terminals.

Description

technical field [0001] The invention belongs to the field of safety authentication, and in particular relates to a method for carrying out safety authentication by adopting image interference in a password token. technical background [0002] With the continuous development of network technology and information technology, information exchange on the network is becoming more and more extensive, and e-commerce and e-government have become increasingly popular. However, with the increasing popularity of the network, the insecure factors on the network are also increasing day by day. In order to ensure the security of data transmitted on the network, in various current network applications, various encryption techniques are widely used to ensure the security of the network. Integrity, confidentiality and credibility of information on the network. [0003] The simple user name and password methods have gradually become unsuitable for network application systems with high securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06Q30/00
Inventor 王同洋吴俊军余鹏飞
Owner WUHAN TIANYU INFORMATION IND