Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, equipment and system for obtaining dynamic passwords to generate keys

A dynamic password and key generation technology, which is applied in the field of data security, can solve the hidden dangers of leakage of private keys and encrypted data files, the inability to guarantee information security, and the inconvenience of production of dynamic password cards, so as to ensure privacy and security performance, improving distribution and management efficiency, and avoiding leakage

Active Publication Date: 2010-06-30
BEIJING WATCH DATA SYST +1
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the process of distributing the private key to the dynamic password card, writing the private key into the dynamic password card and transmitting the corresponding encrypted data file to the authentication server is all done manually, there is a high risk of private key and Security risks of encrypted data file leakage, unable to guarantee the security of information
At the same time, manufacturers also need to organize corresponding manpower and material resources to distribute and manage private keys, which brings great inconvenience and tediousness to the production of dynamic password cards.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, equipment and system for obtaining dynamic passwords to generate keys
  • Method, equipment and system for obtaining dynamic passwords to generate keys
  • Method, equipment and system for obtaining dynamic passwords to generate keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0032] The method for obtaining the dynamic password generation key provided by Embodiment 1 of the present invention, such as figure 1 As shown, the method includes:

[0033] Step 11: Generate the public key and private key of the dynamic password card;

[0034] Step 12: Send the public key of the dynamic password card to the authentication server and receive the digital certificate of the authentication server sent by the authentication server, the authenticatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, equipment and a system for obtaining dynamic passwords to generate keys, which relates to the field of data security. The invention can ensure the privacy and the security of the information, can improve the distribution and management efficiency of key generation by dynamic passwords, and can bring the convenience for manufacturers to produce dynamic password cards. The method for obtaining dynamic passwords to generate keys provided by the embodiment of the invention comprises the following steps: generating public keys and private keys of the dynamic password cards; sending the public keys of the dynamic password cards to a certification server supporting a digital certificate issuing system; receiving digital certificates of the certification server sent by the certification server; using the private keys of the dynamic password cards to obtain the dynamic passwords from the certification server for generating the keys, and carrying out digital signature by the certification server on the keys generated through the dynamic passwords; verifying the digital signature of the keys generated through the dynamic passwords according to the obtained digital certificates of the certification server, and storing the dynamic passwords to generate the keys when the verification succeeds. The invention is applicable to occasions adopting telecommunication intelligent cards for certification of the dynamic passwords.

Description

technical field [0001] The invention relates to the field of data security, in particular to a method, device and system for obtaining a key for generating a dynamic password. Background technique [0002] Conventional "password" code authentication is an early identity authentication product of computer systems. Due to the static characteristics and reusability of this "password", there are security defects such as easy to steal, easy to guess, and easy to crack. It is a weak identity authentication system. , can only be used in information systems with lower security level requirements. In order to meet the requirements of information systems with higher security levels, dynamic password authentication, as a strong identity authentication system, is one of the hotspots in the current industry research. [0003] A dynamic password (Dynamic Password), also known as a one-time password (One-time Password), is a changing password, and its change comes from the change of the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L29/06
Inventor 朱红岩郑小武陈灵灿刘敏
Owner BEIJING WATCH DATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products