Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile authentication system based on intelligent mobile phone

A smart phone and authentication system technology, applied in the field of information security, can solve problems such as unimaginable consequences, impossibility of long-term use, and potential safety hazards, and achieve the effects of good scalability, cost savings, and high security

Inactive Publication Date: 2008-11-12
SUN YAT SEN UNIV
View PDF0 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the limitation of USB Key's own conditions, the operation speed of the single-chip microcomputer is slow, and it takes a long time to generate some long key pairs. In many cases, it is impossible to achieve one-time encryption.
This is a security risk
[0005] 2) The key length is limited
The built-in storage space in the USB Key is generally only a few tens of bytes, which can only save a small amount of key information, and it is impossible to use a very long key or digital certificate. In cryptography, the longer the key length, the safer it is. However, because the USB Key cannot support a longer key, it has a security risk
[0006] 3) The plaintext length is limited
[0007] 4) Poor scalability
Due to the limitations of USB Key hardware conditions, a USB Key generally only has one encryption algorithm embedded, and when some better encryption algorithms appear, it cannot be expanded
[0008] 5) Security issues
Therefore, it is possible for hackers to control the USB Key through remote operation to perform some unauthorized operations
[0009] 6) It is impossible to know the plaintext information in the process of encryption / decryption, etc.
USB Key generally only has a very small screen (many have almost none), and it is impossible to display some important information in the process of encryption, decryption, etc.
In online transactions, if some plaintext information cannot be known, and if the plaintext is tampered with or wrong before encryption, the consequences will be disastrous

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile authentication system based on intelligent mobile phone
  • Mobile authentication system based on intelligent mobile phone
  • Mobile authentication system based on intelligent mobile phone

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be further elaborated below in conjunction with the accompanying drawings.

[0039] The purpose of this invention is to design and implement an authentication system MobileKey based on smart phones. The system overcomes the shortcomings of USB Key such as slow computing power, relatively low security, and inability to expand, and proposes a new technology called Mobile Key. Mobile Key is not only much stronger in computing power than USB Key, but also greatly improved in security. The important thing is to support the processing of large files. Mobile Key can be used in file encryption, decryption, digital signature, authentication, information disguise, information hiding and other fields.

[0040] The Mobile Key system works like a print service in Windows. A smart phone is equivalent to a printer, and a Mobile Key application client is similar to a user who needs to use a printer. These clients must register with the Mobile Key service pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system combined with smartphones of carrying out digital signature and certification, file encryption and decryption by utilizing mobile key technology, which saves user keys or certificates on the smartphones and also carries out the processes of signature / certification, encryption / decryption on the smartphones. The invention mainly uses a smartphone of Windows mobile operating system, a desktop computer software module and a smartphone software module. Firstly, a mobile key client is designed and realized on the desktop computer, including file encryption and decryption files, office signature, and certification Plug-ins. Then, a security system of mathematical manipulation of digital signature, certification, file encryption / decryption, etc. is designed and realized on the smartphone. Beside the inherent advantages of a USB key of convenient use, high security, etc., the invention also has multiple advantages that the USB Key does not have, such as, rapid arithmetic speed, long key support, supporting the processing of overlarge files, good sharing performance, high security and better expandability.

Description

technical field [0001] The present invention relates to the field of information security, and specifically relates to a technology that can adopt various information security algorithms and combine smart phones to perform signature, authentication, and encryption / decryption. technical background [0002] With the continuous development of the Internet, more and more people have begun to try online transactions. However, malicious threats such as viruses, hackers, phishing and phishing scams have brought great challenges to the security of online transactions. According to a survey conducted by a research agency, the total direct losses suffered by banks and consumers in the United States last year due to cyber fraud incidents amounted to US$2.4 billion, and each victim paid an average of US$1,200. According to Hong Kong Ming Pao News, the direct losses caused by cyber fraud in Hong Kong last year amounted to 1.4 million Hong Kong dollars. The endless network crimes have c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04Q7/32H04L9/32
Inventor 孙伟戴路周慊
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products