Method for enhancing information safety equipment verification safety

An information security and security technology, applied in the field of improving security in the process of obtaining authorization for information security equipment, can solve the problem of increasing the cost by several times or even dozens of times

Inactive Publication Date: 2008-10-22
BEIJING SENSELOCK SOFTWARE TECH CO LTD
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If modules such as fingerprint verification and iris verification are added to the USB Key, the cost will increase several times or even dozens of times

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for enhancing information safety equipment verification safety
  • Method for enhancing information safety equipment verification safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0032] The information security module described in the present invention is a cryptographic algorithm module in a general information security device, such as using an RSA key for decryption and digital signature. This section is a mature technology in the industry. The communication between the communication module and the computer software is, for example, a USB interface communication module, which is also a mature technology in information security equipment.

[0033] Concrete working method of the present invention is:

[0034] A: The user enters a random character string on the computer;

[0035] B: The computer transmits the character string input by the user to the enhanced verification module of the connected information security device, and displays it on the prompting part;

[0036] C: The user verifies the information on the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a technical method for improving the use safety of information safety equipment. Through adding a special user verification part in the information safety equipment, the technical method can solve the problem that the information safety equipment is used illegally at a background when intercepted by computer software. The technical method overcomes the intrinsic disadvantages of USB Key equipment in defending against background attack and greatly improves the use safety of the USB Key equipment; therefore, the technical method is of great significance to the extensive popularization of USB Key.

Description

technical field [0001] The invention relates to information security equipment and its authorization verification technology, in particular to a technical method capable of improving security in the process of obtaining use authorization for information security equipment. Background technique [0002] E-commerce has changed the operation mode of traditional business, greatly improved business efficiency and reduced transaction costs, but such a new business model is also facing a huge security threat. Therefore, in all e-commerce applications, security is considered as the most important factor. At present, the main safety hazard of e-commerce comes from the client, such as the computer used by the user and the software running on the computer, or the mobile device (such as PDA) and the software running on it. Therefore, e-commerce generally adopts identity authentication means with high security strength to confirm the user's identity in e-commerce and prevent counterfeit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06Q30/00H04L9/32G06F21/12
Inventor 孙吉平韩勇
Owner BEIJING SENSELOCK SOFTWARE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products