Authentication system and method based on USB hardware token
A hardware token and authentication system technology, applied in the field of authentication systems, can solve problems such as sabotage operations, and achieve the effects of preventing random sabotage, wide application range, and strong practicability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] The present invention can carry out the authentication of key operations through the combination of software and hardware. The new login system allows users to log in successfully as long as they enter the correct user name and password when logging in. However, if the user wants to perform key operations such as transactions, the software system activates the indicator light on the authentication device during the operation to prompt the user to confirm. After the user presses the confirmation button, the authentication device will return the result to the software after calculation by the algorithm. System certification, the transaction can only proceed after the software system certification is passed.
[0018] Such as figure 1 As shown, the authentication system of the present invention includes an application system server, an application system terminal, an authentication server, and an authentication device. When the user performs a key operation, the applicati...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 