USBKey safe protection method

A security protection device, USB interface technology, applied in computer security devices, instruments, user identity/authority verification, etc., can solve the problems of stealing customer accounts, customer losses, etc., to prevent security risks, reduce product costs, and improve safety effect

Inactive Publication Date: 2009-05-27
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, since the USBKey is connected to the user's computer, the user's computer is easily controlled remotely by hackers through a Trojan horse, and most customers do not have the habit of pulling out the USBKey immediately

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • USBKey safe protection method
  • USBKey safe protection method
  • USBKey safe protection method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0025] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to specific embodiments and drawings.

[0026] The present invention adds a physical protection button locally to the user who uses the USBKey for identity authentication and signature. When the user uses the USBKey to perform operations, the local physical button must be used for confirmation before the USBKey can be used normally, thereby effectively avoiding the user’s USBKey being damaged. The problem of remote hijacking by hackers.

[0027] Such as figure 1 As shown, figure 1 It is a schematic diagram of the structure of the USBKey safety protection device provided by the present invention. The USBKey safety protection device includes a computer connection interface, a USBKey connection interface and a circuit switch unit. The computer connection interface is used to connect the USBKey sa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a USBKey safety protection device. The device comprises a computer connecting interface by which the USBKey safety protection device is connected with a computer, a USBKey connecting interface by which the device is connected with a user USBKey, and a circuit switch unit used for switching on the computer connecting interface and the USBKey connecting interface and breaking the connection between the computer connecting interface and the USBKey connecting interface in schedule time. Due to the adoption of the device, a hacker can not hijack the user USBKey for certification and signature operations by remote control of the user computer, thereby reducing the risk of counterfeiting the user identity and embezzling money in the user account.

Description

technical field [0001] The present invention relates to the technical field of online banking security authentication, in particular to a USBKey security protection device, which is applied to the environment where USBKey is used for identity authentication and signature. The device realizes the isolation of USBKey and computer at the hardware layer, preventing unauthorized access to USBKey, Improve the security of USBkey. Background technique [0002] At present, USBKey (also known as U-shield) is widely used in online banking or other environments that require strong identity authentication and transaction signature. The security of systems such as online banking can be improved through USBKey, a hardware certificate mechanism using a USB interface. [0003] However, since the USBKey is connected to the user's computer, the user's computer is easily controlled remotely by hackers through a Trojan horse, and most customers do not have the habit of pulling out the USBKey im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/20G06Q40/00H04L9/32G06F21/34G06Q40/02
Inventor 敦宏程石磊高健
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products