Unlock instant, AI-driven research and patent intelligence for your innovation.

Safe input method applied to identity authentication

A safe input and safe technology, applied in the field of computer security, to achieve the effect of solving the problem of denial

Active Publication Date: 2012-09-12
SHENZHEN Y& D ELECTRONICS CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003]One purpose of the present invention is to provide a method for identity authentication to solve defects such as the inability to perform identity authentication in the terminal input and the inability to solve the non-repudiation of the terminal input person. Safe Input Method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe input method applied to identity authentication
  • Safe input method applied to identity authentication
  • Safe input method applied to identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0048] The invention provides a safe input method, the core idea of ​​which is as follows: figure 1As shown, starting from data input, the user-specific secure font is first stored in the user's private secure computing box, and the secure font is stored in ciphertext. When the application client needs to input data, start the secure input method. After verification, the application client loads the secure font library from the secure computing box to the operating system. After the user completes the data input, the application client sends the requested data input by the user. After signing and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safe input method applied to identity authentication and an input terminal. The safe input method comprises the following steps of: S1, starting the safe input method by an application program client and inputting request data representing login information by a user; S2, detecting whether the user inputting the request data is an authorized entry user or not, if the useris the authorized entry user, loading a safe word bank from a safe computation box to the application program client; S3, performing signing and encryption on the request data which is input by the user by using the application program client and transmitting the request data to a safe input method gateway; and S4, after the safe input method gateway receives the signed and encrypted request data, performing signature check-out and decryption on the request data and then transmitting the request data which is subjected to the signature check-out and decryption to an application program serverby using the safe input method gateway and responding to the request of the application program client by using the application program server. In the safe input method provided by the invention, theidentity of an inputter is effectively determined from an information source, so that the aims of identify authentication and non-repudiation can be fulfilled.

Description

technical field [0001] The invention relates to the field of computer safety, in particular to a safe input method and an input terminal applied in identity authentication. Background technique [0002] Today, with the rapid development of the network, a large number of services based on the network are also flourishing. The reason why network services such as e-commerce, e-banking, and e-money can appear and develop rapidly is based on information security. Identity authentication is the first line of defense for information security. If a user wants to enter a system with a security mechanism to obtain information, he must first prove his legal identity to the system before he can be authorized to access system resources. This process is identity authentication. It can be seen that identity authentication plays an extremely important role in the security system and is the most basic security service. Therefore, in real life, it is also the place most attacked by hackers, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/04G06F21/31
Inventor 戚建淮唐威曾广良陈健田佳李勇新
Owner SHENZHEN Y& D ELECTRONICS CO LTD