Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication system and method based on USB hardware token

A hardware token and authentication system technology, applied in the field of authentication systems, can solve problems such as sabotage operations, and achieve the effects of preventing random sabotage, wide application range, and strong practicability

Inactive Publication Date: 2009-03-25
SHANDA INTERACTIVE ENTERTAINMENT
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The disadvantage of this authentication method is that the user can perform multiple operations after one authentication, but if the user installs a Trojan horse by a hacker, the hacker can control the user's computer through the Trojan horse to perform sabotage operations.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system and method based on USB hardware token
  • Authentication system and method based on USB hardware token
  • Authentication system and method based on USB hardware token

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The present invention can carry out the authentication of key operations through the combination of software and hardware. The new login system allows users to log in successfully as long as they enter the correct user name and password when logging in. However, if the user wants to perform key operations such as transactions, the software system activates the indicator light on the authentication device during the operation to prompt the user to confirm. After the user presses the confirmation button, the authentication device will return the result to the software after calculation by the algorithm. System certification, the transaction can only proceed after the software system certification is passed.

[0018] Such as figure 1 As shown, the authentication system of the present invention includes an application system server, an application system terminal, an authentication server, and an authentication device. When the user performs a key operation, the applicati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication system based on a USB hardware token, which comprises an application system server, an application system terminal, an authentication server and an authentication device; the authentication device is a hardware token provided with a USB interface; and the hardware token is provided with an indication light and a confirm button. When a user runs a critical operation, the application system server activates the indication light on the hardware token and prompts the user to confirm; when the user presses the confirm button on the hardware token, the hardware token calculates a result by using an algorithm and transfers the result to the authentication server for authentication; and the application system server determines whether the critical operation of the user is successful according to the result of authentication. Besides, the invention further discloses an authentication method based on the USB hardware token. The system can ensure that the user can effectively participate in the authentication process of the system, so as to ensure that a key point deal is admitted by the user and improve the security of the authentication system.

Description

technical field [0001] The invention relates to an authentication system for protecting key points, in particular to an authentication system based on a USB hardware token; moreover, the invention also relates to an authentication method based on a USB hardware token. Background technique [0002] At present, the commonly used identity authentication process generally adopts the method of first authenticating the identity and then performing the operation. For example, when a user logs into the game, the system will prompt the user to enter the user name and password (password). Once the login is successful, all other operations no longer require identity authentication. [0003] The disadvantage of this authentication method is that the user can perform multiple operations after one authentication, but if the user is installed with a Trojan horse by a hacker, the hacker can control the user's computer through the Trojan horse to perform sabotage operations. [0004] There...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/00G07F19/00G06F21/85
Inventor 朱继盛王宝骥蒋勇杜江杰肖强
Owner SHANDA INTERACTIVE ENTERTAINMENT