Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for updating key and system

A technology for renewing keys and renewing keys, which is applied in the field of information security to achieve the effect of improving security and flexibility

Active Publication Date: 2012-01-11
FEITIAN TECHNOLOGIES
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, the key of the dynamic token is usually fixed, and once the key is accidentally leaked, it will lead to illegal users entering

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for updating key and system
  • Method for updating key and system
  • Method for updating key and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Embodiment 1 of the present invention provides a method for updating a key.

[0031] see figure 1 ,Specific steps are as follows:

[0032] Step 101: the dynamic token generates the current dynamic password;

[0033] Specifically, in this embodiment, when the user applies for a key update service to the terminal, the terminal prompts the user to input a dynamic password;

[0034] Step 102: the terminal obtains the current dynamic password generated by the dynamic token;

[0035] Step 103: The terminal sends the current dynamic password to the background authentication system, and requests the background authentication system to authenticate the current dynamic password;

[0036] Step 104: the background authentication system authenticates the current dynamic password, and if the authentication succeeds, step 105 is executed, and if the authentication fails, the key update operation is exited;

[0037] Step 105: the background authentication system obtains the pre-sto...

Embodiment 2

[0091] Embodiment 2 of the present invention provides another method for updating keys.

[0092] see figure 2 ,Specific steps are as follows:

[0093] Step 201: the dynamic token generates the current dynamic password;

[0094] Specifically, in this embodiment, when the user applies for a key update service to the terminal, the terminal prompts the user to input a dynamic password;

[0095] Step 202: the terminal acquires the current dynamic password generated by the dynamic token;

[0096] Step 203: The terminal sends the current dynamic password to the background authentication system, and requests the background authentication system to authenticate the current dynamic password;

[0097] Step 204: the background authentication system authenticates the current dynamic password, and if the authentication succeeds, step 205 is executed, and if the authentication fails, the key update operation is exited;

[0098] Step 205: the background authentication system returns the ...

Embodiment 3

[0147] Embodiment 3 of the present invention provides yet another method for updating keys.

[0148] see image 3 ,Specific steps are as follows:

[0149] Step 301: the dynamic token generates the current dynamic password;

[0150] Specifically, in this embodiment, when the user applies for a key update service to the terminal, the terminal prompts the user to input a dynamic password;

[0151] Step 302: The terminal obtains the current dynamic password generated by the dynamic token;

[0152] Step 303: The terminal sends the current dynamic password to the background authentication system, and requests the background authentication system to authenticate the current dynamic password;

[0153] Step 304: the background authentication system authenticates the current dynamic password, and if the authentication succeeds, step 305 is executed, and if the authentication fails, the key update operation is exited;

[0154] Step 305: the background authentication system sends a pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for updating a key and system. The method comprises the following steps that: (1) a background authentication system receives the current dynamic password generated by a dynamic token to carry out the authentication of the current dynamic password, if the authentication is successful, then the key updating information is generated, and step (2) is performed; and (2) the background authentication system generates a first updated key according to the key updating information and a first initial key stored in the background authentication system, and the first updated key is copied to a buffer area of the first initial key; the dynamic token obtains the key updating information to carry out the authentication of the key updating information, if the authentication is successful, a second updated key is generated according to the key updating information and a second initial key stored in the dynamic token, and the second updated key is copied to a buffer area of the second initial key; and otherwise, the key updating operation is cancelled. According to the technical scheme of the invention, the risk caused by the accidental exposure of the key can be prevented.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for updating keys. Background technique [0002] A dynamic token is a dedicated device for generating a dynamic password, usually in the form of hardware, with a built-in microprocessor chip for processing data and running a dedicated cryptographic algorithm, and is generated according to factors such as the current time or the number of uses The current dynamic password is displayed on the display. [0003] The current dynamic password generated by the dynamic token needs to pass the verification of the background authentication server system, and the authentication server system uses the same algorithm, key and dynamic factor as the dynamic token. When the dynamic password generated by the dynamic token is consistent with the dynamic password generated by the authentication server system, the legal identity of the user using the dynamic token can be conf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
CPCH04L63/068H04L9/0891H04L29/06H04L63/0853H04L63/06H04L63/083H04L9/0877H04L9/3234
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products