Encryption card certification and authority method adopting USB intelligent secret key and encryption card

An intelligent key, authentication and authorization technology, applied in the field of encryption cards, can solve the problems of unprotected keys in confidential cards, slow serial transmission of data, and influence of authentication speed, so as to achieve rapid completion of authentication and backup, and improve security strength and safety. Sex-enhancing effect

Inactive Publication Date: 2011-10-12
DAWNING CLOUD COMPUTING TECH CO LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the IC (logic) card is difficult to copy, the serial port transmits data relatively slowly, so the authentication speed is also affected by it
As for the IC card for data storage, it is easy to be copied. Once copied by others, the secret key in the card has no protection at all.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption card certification and authority method adopting USB intelligent secret key and encryption card
  • Encryption card certification and authority method adopting USB intelligent secret key and encryption card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Specific implementation plan

[0034] Aiming at the current problems of encryption card authentication, management and data protection, the present invention provides a safe, efficient and easily expandable solution.

[0035] Authorization:

[0036] (1). We issue a certificate (or key pair, not counting) for each USB smart cryptographic key to identify the user. Due to the physical characteristics of the USB smart cryptographic key, the private key of the certificate (or key pair) cannot be copied and exported, fundamentally eliminating the possibility of media being copied. Even if the USB smart password key is lost, it is still protected by the PIN code of the USB smart password key, and the private key cannot be used without knowing the PIN code.

[0037] (2) All data in the encryption card is encrypted and saved (this key is referred to as the protection key in this article); (3) The encryption card authorizes the USB smart password key, and the protection key of the encry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encryption card certification and authority method adopting a USB intelligent secret key and an encryption card. The certification and authority method comprises two main flows, namely certification and authority, and a USB intelligent secret key is added to the encryption card. According to the encryption card certification and authority method, the safety intensity of data (especially PK) in the encryption card is obviously improved, and the secret key of the USB intelligent secret key can not be exported and copied, thereby improving the safety coefficient of an authentication medium, and avoiding the authentication medium from being copied. According to the PIN code and secret key mechanism of the USB intelligent secret key, the safety of the exported data of the encryption card is obviously improved. High transmission speed of USB (especially USB 2.0 and 3.0) ensures that authority and backup can be quickly finished.

Description

Technical field [0001] The invention relates to the field of computer security hardware of an encryption card and a USB smart cryptographic key, and in particular to an encryption card authentication and authorization method using a USB smart key and an encryption card. Background technique [0002] As people pay more and more attention to computer security, more and more computers and servers install encryption cards to protect data security, and the role of encryption cards is becoming more and more important. [0003] At the same time, new challenges are presented to the authentication, management and information protection of the encryption card. Simple password protection and backup can no longer meet the security requirements. [0004] Current common practice: [0005] (1) Use IC (logic) card for authentication and data storage through serial port. Since the IC (logic) card only has the storage function, it is easy to be copied, and it is completely dependent on the protection ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30G06F21/00G06F21/44
Inventor 孙国忠郭旭黄亮戴荣吴伟
Owner DAWNING CLOUD COMPUTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products