Method for authenticating validity of self-contained software of equipment system

A legality certification and legality verification technology, applied in the field of software legality certification

Inactive Publication Date: 2010-03-03
ZHEJIANG WELLCOM TECH
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to prevent tampering during the transaction process, the applicant writes the data signature software into the USBKEY when it leaves

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authenticating validity of self-contained software of equipment system
  • Method for authenticating validity of self-contained software of equipment system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0035] The present invention will be further described below with reference to specific embodiments, but the present invention is not limited to these specific embodiments. Those skilled in the art should realize that the present invention covers all alternatives, modifications and equivalents that may be included within the scope of the claims.

[0036] When leaving the factory, the software (or components) used for online banking transaction signature authentication is stored inside the device. By binding the software (or components) with the device, and using the method of sharing the key, the system software is used to verify the validity of the system software. authentication to ensure that the data received by the device comes from legitimate system software.

[0037] First of all, when the device leaves the factory, the system software has been stored in the secure storage space of the device, and the system software has a fingerprint algorithm and an obfuscation key sh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for authenticating the validity of self-contained software of an equipment system; fingerprinting and a confusion key shared by system software and equipment are mounted into an operating system simultaneously; and when a user inputs information to confirm a trade, a USBKey obtains the fingerprint data of the user, generates a random number, uses the fingerprintingto encrypt the fingerprint data and the random number, and transmits to the system software. The system software obtains the fingerprint data after using a confusion arithmetic to decrypt, uses the fingerprinting to calculate the fingerprint characteristics of the user, and compares the fingerprint characteristics with the fingerprint characteristics obtained through USBKey calculation. If the comparison results are same, then authentication on the validity of the system software is passed and the trade is confirmed. Based on the thought of 'reliable equipment', the method for authenticatingthe validity of the self-contained software of the equipment system implements bidirectional authentication between important components and the system equipment in the software system; and the systemequipment can not work normally after the validity of the software system is confirmed to stop 'trojan' programs to fake as legal programs to visit equipment or steal and alter the input data of theuser.

Description

technical field [0001] The invention relates to the technical field of software legality authentication, in particular to a method for legality authentication of software carried by a device system. Background technique [0002] With the rapid development of network technology, online transactions are gradually accepted by the public due to their convenience and low cost of use, and the number of users of online transactions is gradually increasing. However, the security of online transactions has gradually become the focus of attention of users. There are more and more reports of online transaction security incidents caused by "Trojan horse" or "broiler" programs, and a large number of users are increasingly worried about online transactions. [0003] The existing client identity authentication system for online transactions is based on U-shield as the technical core. For example, ICBC’s online banking, in terms of transaction security, ICBC uses U-shield to protect every t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q30/00G06F21/22G06F21/44
Inventor 岑旭聚张伟峰邹建军陆捷
Owner ZHEJIANG WELLCOM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products