Method for determining inquiry answer type bidirectional identification and business

An identity verification, question-and-answer technology, applied to transmission systems, instruments, electrical components, etc.

Inactive Publication Date: 2011-08-03
毛华
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In order to solve security problems such as identity confirmation, network transactions, and telephone stock trading, the present invention can provide a method that is not afraid of being monitored, cannot be tampered with and deceived, does not rely on A security solution based on computers so that they are not afraid of viruses, Trojan horses and hackers, and an encryption device for realizing this method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for determining inquiry answer type bidirectional identification and business
  • Method for determining inquiry answer type bidirectional identification and business
  • Method for determining inquiry answer type bidirectional identification and business

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] The encryption device 1 includes a keyboard 3, a display screen 2, a microcontroller MCU, and a power supply. The keyboard 3, the display screen 2, and the power supply are respectively connected to the microcontroller MCU, and the microcontroller MCU has a built-in memory and arithmetic unit.

[0083] The two-way authentication method for both parties in a transaction using the encryption device 1 described above, the authentication method includes identity confirmation, and identity confirmation includes the following steps:

[0084] (a) Customer service providers distribute independent encryption devices to dedicated customers;

[0085] (b) The user connects to the server via the Internet or telephone and enters the customer account K;

[0086] (c) The server retrieves the server password Mo and the encryption algorithm Fo indicating the identity of the server according to the customer account K;

[0087] (d) The server generates a random number N, calculates the encryption re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a secure communication device and a method, in particular to a device and a method for sending and receiving a code by adopting a special manner. In the question answering mutual identity and transaction confirmation method and the device adopting the method, the confirmation method comprises identity verification and transaction content confirmation, and has the characteristic of mutual authentication. An encryption device is separated from the outside completely, and has no electronic connecting interface, so that the hacker attack can be avoided, and the device canalso be used in the environment of no personal computer. In the device and the method, not only does a server identify a client in a unilateralism manner, but the client also discriminates the validity of the server through checking the validity of a quenstion and answers the quenstion after confirming the validity of the quenstion only, thereby effectively resisting fishing trap. By adopting themethod and the encryption device, identity verification and electronic transaction can be performed safely in unsafe environments such as an Internet bar, etc.

Description

technical field [0001] The present invention relates to a secure communication device and method, in particular to a device and method for sending and receiving passwords in a special way. Background technique [0002] At present, service agencies usually use three methods for identity and transaction confirmation: static passwords, dynamic passwords, USB password locks and smart cards and other hardware encryption methods. These three methods have their own advantages and disadvantages: the static password is easy to use but extremely insecure, and it is easy to be monitored and invalidated. At present, the methods of using dynamic passwords usually include dynamic passwords sent by short messages, two-dimensional password retrieval cards printed on paper, and the like. SMS dynamic passwords improve security, but there are also problems such as relying on the operator's network to send SMS, being unavailable in areas where SMS is not smooth, and requiring payment to telec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/18H04L29/06G06Q30/00
Inventor 毛华
Owner 毛华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products