Data authentication method and system using same

A data authentication and authentication device technology, applied in the field of information security, can solve problems such as loss or embezzlement of certificates, potential safety hazards, transaction tampering, etc., and achieve the effects of ensuring non-tampering, improving security, and ensuring confidentiality

Inactive Publication Date: 2011-11-09
SHENZHEN DECARD SMART CARD TECH
View PDF14 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] There are some potential safety hazards and inconveniences in the above-mentioned existing technologies. When the mobile phone dynamic authentication technology is lost or the network is not smooth, it will affect the user's use; in the system using dynamic tokens for authentication, dynamic tokens have a fatal It cannot resist Trojan tampering attack, and the server needs to store the seed of the dynamic token, which has a huge security risk
Digital certificate is the safest way in theory, but there are still situations where certificates are lost or stolen. In order to solve this problem, patent 200410028723.9 describes a USBKEY device. USBKEY is an int

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data authentication method and system using same
  • Data authentication method and system using same
  • Data authentication method and system using same

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0042] In order to further illustrate the technical means adopted by the present invention and its effects, the following describes in detail the preferred embodiments of the present invention and the accompanying drawings.

[0043] Such as figure 1 As shown, the present invention provides a data authentication method, which includes the following steps:

[0044] Step 1. The authentication device is electrically connected to the networked computer and the smart card through the USB interface and the smart card interface respectively, and the networked computer is electrically connected to the server that needs to realize the service request, and then the relevant information is input in the networked computer to send the service to the server. Request, the smart card stores user information and private keys, and the authentication device is provided with a keyboard and a display screen.

[0045] Step 2. The server side processes and generates data information according to the receive...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data authentication method and a system using the same. The system comprises a smart card, an authentication device, a networked computer and a server, wherein the authentication device comprises an interface circuit, a keyboard, a display screen and a smart card interface; the display screen is used for displaying information necessary for logon or a transaction; the keyboard is used for inputting a user password and operation of a signature; the interface circuit is a USB (Universal Serial Bus) interface; the smart card is used for storing user information and a private key; the authentication device is correspondingly electrically connected with the networked computer and the smart card through the USB interface and the smart card interface respectively; the networked computer is in communication connection with the server through a network; and the server is an authentication server or a transaction server.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a data authentication method and a system using the method. Background technique [0002] With the rapid development of the Internet and the great convenience it provides, people increasingly rely on the Internet for various activities, such as online banking, online shopping, online payment, etc.; while the Internet provides convenience for people, because of its Openness has also brought great security risks to people. Correspondingly, network information security has attracted more and more attention. The premise of network security is to accurately identify legitimate users and implement access control. [0003] User identity authentication and transaction authentication are an important part of the security system in network applications, and the access authorization of legitimate users is realized through identity authentication. At present, the identity auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 孙永战
Owner SHENZHEN DECARD SMART CARD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products