Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for confirming data in CPU (Central Processing Unit) card

A data and technology to be confirmed, applied in the field of information security, can solve problems such as unresolved computer clients, insecurity, etc.

Inactive Publication Date: 2011-05-25
邵通
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It does not solve the problem of how to use bank payment safely after the computer client is insecure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for confirming data in CPU (Central Processing Unit) card
  • Method for confirming data in CPU (Central Processing Unit) card
  • Method for confirming data in CPU (Central Processing Unit) card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] [Example 1] SMS confirmation

[0041] The core of the present invention is the data to be signed or to be used in the CPU card, which is output to the user's trusted device by a credible method, and the user confirms the data to be signed or to be used; after the user confirms, perform the corresponding signature or use the corresponding data . According to the first embodiment of the present invention, a system associated with a method for confirming data in a CPU card is as follows: figure 1 shown. This is an SMS confirmation scheme. In this figure, the data encrypted by the encryption device 42 corresponds to the encryption device 51 of the SMS gateway 5; that is, the encryption device 42 completes the encryption, and the encryption device 51 decrypts it. For example, cryptographic device 51 discloses the public key (E, M), and keeps secret private key (D, M); then cryptographic device 42 encrypts with public key (E, M), and cryptographic device 51 uses secret pri...

Embodiment 2

[0047] [Example 2] wireless confirmation (dedicated, mobile phone plus SD card, mobile phone plus SIM card)

[0048] According to the second embodiment of the present invention, a system associated with a method for confirming data in a CPU card such as figure 2 shown. In this embodiment. The handheld device 6 in this figure can be connected with the computer terminal 3 with a wired connection (such as a USB cable) or a wireless connection (such as bluetooth), and this kind of connection is represented by "wireless or wired connection 5". Connect the CPU card 4 and the handheld device 6 . In addition, if the handheld device 6 is a mobile phone, it is preferable to add an SD card or change a SIM card to add the encryption device 61, and of course the function of the encryption device 61 can also be realized with the mobile phone software.

[0049] After the CPU card 4 is connected with the computer terminal 3, the user inputs or generates transaction key data according to t...

Embodiment 3

[0052] Embodiment 3 graphic confirmation

[0053] According to the third embodiment of the present invention, the core of the present invention is the data to be signed in the CPU card, which is output to the user's trusted device in a credible way, and the user confirms the data to be signed; after the user confirms, the corresponding signature is performed. see figure 1 to illustrate this method.

[0054] After the CPU card 4 is connected with the computer terminal 3, the user inputs or generates transaction key data according to the prompt of the computer terminal 3, such as key data such as the account name, account number, and amount of funds received; the computer terminal 3 transmits these key data to the CPU In card 4; CPU card 4 generates confirmation password (PIN) with random number generator 41, and this confirmation password and key data are generated figure (as JPEG format), and disturb and make it difficult for computer to recognize, and people can recognize ....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention aims to provide a method for confirming critical data in a CPU (Central Processing Unit) card safely. When a computer terminal which is possibly unsafe is used, the method can be used for confirming the critical data in the CPU card. The method can be used for online payment, the modification and the resetting of the critical data in the CPU card. After being combined with a good password protocol, the method can simply and safely realize that online banks, online games and other services can be used safely at a computer terminal which is possibly unsafe.

Description

technical field [0001] The invention belongs to the field of information security. The invention relates to a method for confirming data in a CPU card. Specifically, it relates to a method for confirming and safely using data in a CPU card on a possibly insecure networked computer client. Background technique [0002] Due to its great convenience, online banking has been widely valued by everyone. However, because its security has not been well resolved, it has not been well popularized. To this end, the industry has proposed a large number of patents and many solutions. But all these solutions failed to achieve the perfect unity of security and ease of use. In an article in "Computer World" "SSL is difficult to guarantee the security of e-commerce" (Computer World, May 29, 2006), it describes the current progress of computer Trojans attacking the banking system and various countermeasures. For details, please refer to this article The inventor's patent application docu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06Q20/00G06Q20/34G06Q20/38G06Q20/40
CPCG06Q20/401G07F7/1016G06Q20/3821H04L29/00G06Q20/341G06Q20/4012
Inventor 邵通
Owner 邵通
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products