Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

USBKey safe protection method

A security protection device, USB interface technology, applied in computer security devices, instruments, user identity/authority verification, etc., can solve the problems of stealing customer accounts, customer losses, etc., to prevent security risks, reduce product costs, and improve safety effect

Inactive Publication Date: 2009-05-27
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, since the USBKey is connected to the user's computer, the user's computer is easily controlled remotely by hackers through a Trojan horse, and most customers do not have the habit of pulling out the USBKey immediately after transferring money through online banking, and it is easy for hackers to remotely use the customer's USBKey without authorization. Thereby stealing the customer's account, causing the customer to suffer losses without knowing it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • USBKey safe protection method
  • USBKey safe protection method
  • USBKey safe protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0026] The present invention adds a physical protection button locally to the user who uses the USBKey for identity authentication and signature. When the user uses the USBKey to operate, the USBKey must be confirmed by using the local physical button before the USBKey can be used normally, thereby effectively preventing the user’s USBKey from being damaged. The problem of remote hijacking by hackers.

[0027] Such as figure 1 as shown, figure 1 It is a structural schematic diagram of a USBKey safety protection device provided by the present invention, and the USBKey safety protection device includes a computer connection interface, a USBKey connection interface and a circuit switch unit. Wherein, the computer connectio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a USBKey safety protection device. The device comprises a computer connecting interface by which the USBKey safety protection device is connected with a computer, a USBKey connecting interface by which the device is connected with a user USBKey, and a circuit switch unit used for switching on the computer connecting interface and the USBKey connecting interface and breaking the connection between the computer connecting interface and the USBKey connecting interface in schedule time. Due to the adoption of the device, a hacker can not hijack the user USBKey for certification and signature operations by remote control of the user computer, thereby reducing the risk of counterfeiting the user identity and embezzling money in the user account.

Description

technical field [0001] The present invention relates to the technical field of online banking security authentication, in particular to a USBKey security protection device, which is applied to the environment where USBKey is used for identity authentication and signature. The device realizes the isolation of USBKey and computer at the hardware layer, preventing unauthorized access to USBKey, Improve the security of USBkey. Background technique [0002] At present, USBKey (also known as U-shield) is widely used in online banking or other environments that require strong identity authentication and transaction signature. The security of systems such as online banking can be improved through USBKey, a hardware certificate mechanism using a USB interface. [0003] However, since the USBKey is connected to the user's computer, the user's computer is easily controlled remotely by hackers through a Trojan horse, and most customers do not have the habit of pulling out the USBKey im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/20G06Q40/00H04L9/32G06F21/34G06Q40/02
Inventor 敦宏程石磊高健
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More