Security authentication method and information security authentication equipment

A technology for information security and authentication equipment, applied in the field of security authentication and information security authentication equipment, can solve the problems of reduced USBKey portability, small character input keyboard size, increased USBKey size, etc., so as to avoid stealing and modification and improve security. Effect

Active Publication Date: 2010-04-14
BEIJING SENSESHIELD TECH
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the method of this external PIN code character input keyboard can increase the size of USBKey greatly, makes the portability of USB Key greatly reduce, also increased t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method and information security authentication equipment
  • Security authentication method and information security authentication equipment
  • Security authentication method and information security authentication equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0050] In the security authentication method and information security authentication device provided by the present invention, a random character sequence trigger unit, a character set, and a display screen are set in the information security authentication device in advance, and the information security authentication device is set in the information security authentication device according to the user's pass. The random character sequence in triggers the user instruction input by the unit in batches, randomly selects a preset number of characters to form a character sequence, and stores the character sequence according to the preset rules. The user starts from the batch display according to the preset PIN code order Find the character co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security authentication method. The method comprises the following steps: randomly selecting a preset number of characters from a stored character set to form batch character sequences by information security authentication equipment according to user commands which are input in the information security authentication equipment in batches by a user through a random character sequence triggering unit, and storing the character sequences; looking up characters corresponding to PIN codes from the character sequences displayed in batches on a random character sequence display unit set in the information security authentication equipment by the user according to a preset PIN order; using position sequence numbers of the batch character sequences of the characters corresponding to the PIN codes as authentication conversion codes and transmitting the authentication conversion codes to the information security authentication equipment through a computer; and carryingout inverse operation by the information security authentication equipment so as to acquire the characters corresponding to the authentication conversion codes and carry out authentication. The invention also discloses the information security authentication equipment. By applying the invention, under the condition of not increasing a complicated input keyboard on the information security authentication equipment, the security of the authentication is guaranteed.

Description

technical field [0001] The invention relates to information security technology, in particular to a security authentication method and information security authentication equipment. Background technique [0002] Emerging e-commerce connects e-commerce operators on the network side and clients on the wireless side through the Internet, changing the operation mode of traditional commerce, greatly improving business efficiency and reducing transaction costs, but at the same time, due to the inherent Security issues, the e-commerce model is also facing more and more network security threats, once the e-commerce operation network has security problems, it will cause immeasurable losses to users and e-commerce operators. Therefore, in e-commerce applications, network security has always been considered as the most important issue. [0003] At present, e-commerce operators on the network side generally have high security due to their relatively strong material and technical streng...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 孙吉平韩勇
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products