Security authentication method and information security authentication equipment
A technology for information security and authentication equipment, which is applied in the field of information security authentication equipment and security authentication. It can solve the problems of USBKey portability reduction, small character input keyboard size, and inconvenient user input, so as to avoid theft and change and improve security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0049] In the security authentication method and information security authentication device provided by the present invention, a random character sequence trigger unit, a character set, and a display screen are set in the information security authentication device in advance, and the information security authentication device is set in the information security authentication device according to the user's pass. The random character sequence in triggers the user instruction input by the unit in batches, randomly selects a preset number of characters to form a character sequence, and stores the character sequence according to the preset rules. Find the character corresponding to the PIN code in the character sequence, use the position number...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 