Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for determining inquiry answer type bidirectional identification and business, and encipher device applying the method

An encryption device and identity confirmation technology, applied in the direction of secure communication device, data processing application, transmission system, etc., can solve the problem of not being tampered and deceived.

Inactive Publication Date: 2009-07-01
毛华
View PDF1 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In order to solve security problems such as identity confirmation, network transactions, and telephone stock trading, the present invention can provide a method that is not afraid of being monitored, cannot be tampered with and deceived, does not rely on A security solution based on computers so that they are not afraid of viruses, Trojan horses and hackers, and an encryption device for realizing this method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for determining inquiry answer type bidirectional identification and business, and encipher device applying the method
  • Method for determining inquiry answer type bidirectional identification and business, and encipher device applying the method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0083] Using the two-way authentication method of the two parties of the transaction using the encryption device 1, the authentication method includes identity confirmation, and the identity confirmation includes the following steps:

[0084] (a) The customer service provider distributes independent encryption devices to dedicated customers;

[0085] (b) The user connects to the server through the network or telephone and enters the customer account number K;

[0086] (c) The server retrieves the server password Mo and the encryption algorithm Fo indicating the identity of the server according to the client account K;

[0087] (d) The server generates a random number N, calculates the encrypted result Q, Q=Fo(K, Mo, N), and displays N and Q to the user;

[0088] (e) The user inputs his account number K, random number N and encryption result Q on the encryption device;

[0089] (f) The encryption device calls the encryption algorithm fo of the verification server that comes w...

Embodiment 2

[0096] Using the two-way authentication method of the two parties of the transaction using the encryption device 1, the authentication method includes identity confirmation and transaction content confirmation, the identity confirmation is the same as the steps in embodiment 1, and the transaction content confirmation includes the following steps:

[0097] (A) The user enters the account T of the other party online;

[0098] (B) The server generates a random number Y, and calculates Q'=Fo(T, Mo, Y), and displays Y and Q' to the user;

[0099] (C) The user inputs T, Y and Q' on the encryption device;

[0100] (D) The encryption device invokes the encryption algorithm fo, and uses the mo stored on the encryption device to calculate the encryption result q', q'=fo(T, mo, Y);

[0101] (E) The encryption device compares q' and Q', if they are equal, it means that mo=Mo, fo=Fo, and the T value has not been tampered with, the server is not a trap, continue; if they are not equal, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a secure communication device and a method, in particular to a device and a method for sending and receiving a code by adopting a special manner. In the question answering mutual identity and transaction confirmation method and the device adopting the method, the confirmation method comprises identity verification and transaction content confirmation, and has the characteristic of mutual authentication. An encryption device is separated from the outside completely, and has no electronic connecting interface, so that the hacker attack can be avoided, and the device can also be used in the environment of no personal computer. In the device and the method, not only does a server identify a client in a unilateralism manner, but the client also discriminates the validity of the server through checking the validity of a quenstion and answers the quenstion after confirming the validity of the quenstion only, thereby effectively resisting fishing trap. By adopting the method and the encryption device, identity verification and electronic transaction can be performed safely in unsafe environments such as an Internet bar, etc.

Description

technical field [0001] The present invention relates to a secure communication device and method, in particular to a device and method for sending and receiving passwords in a special way. Background technique [0002] At present, service agencies usually use three methods for identity and transaction confirmation: static passwords, dynamic passwords, USB password locks and smart cards and other hardware encryption methods. These three methods have their own advantages and disadvantages: the static password is easy to use but extremely insecure, and it is easy to be monitored and invalidated. At present, the methods of using dynamic passwords usually include dynamic passwords sent by short messages, two-dimensional password retrieval cards printed on paper, and the like. SMS dynamic passwords improve security, but there are also problems such as relying on the operator's network to send SMS, being unavailable in areas where SMS is not smooth, and requiring payment to teleco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/18H04L29/06G06Q30/00
Inventor 毛华
Owner 毛华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products