Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Setting method, setting system, terminal and authentication server for dynamic token key factor

A technology for verifying servers and dynamic tokens, applied in the field of information security, can solve problems such as illegal copying, explosive cracking, and heavy user input workload, and achieve the effects of improving security, ensuring legality, and increasing the difficulty of cracking

Inactive Publication Date: 2012-02-29
北京明华联盟科技有限公司
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is set by the issuer or the user, basically through the key input of the dynamic token terminal device. If the input security parameter is too short, such as 8 numbers, it is easy to be cracked by the internal staff of the manufacturer, and the issuer can be obtained. The security parameters input by the manufacturer or the user, plus the security parameters set by the manufacturer, can also illegally copy the dynamic token terminal device
If the input security parameters are very long, although it can increase the difficulty of being cracked by brute force, the workload of user input will be relatively large, and the user experience will deteriorate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Setting method, setting system, terminal and authentication server for dynamic token key factor
  • Setting method, setting system, terminal and authentication server for dynamic token key factor
  • Setting method, setting system, terminal and authentication server for dynamic token key factor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] refer to figure 1 , for the first embodiment of the technical solution of the present invention, a method for setting a dynamic token key factor is proposed to make the security parameter setting process of the dynamic token more secure, and the method includes the steps of:

[0052] S10, the dynamic token generates key data, and generates a key factor according to the key data;

[0053] S11. The dynamic token displays the key data through a display device;

[0054] S12. The verification server scans the display device of the dynamic token to obtain key data;

[0055] S13. The verification server generates a key factor according to the key data.

[0056] In this embodiment, the verification server corresponds to the dynamic token and can verify the dynamic password generated by the dynamic token.

[0057] As described in step S10, first, the dynamic token generates key data. The key data can be used to generate a key factor, and the key factor can be used to generat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a setting method, a setting system, a terminal and an authentication server for dynamic token key factors. The method can comprise the following steps that a dynamic token generates key data and key factors are obtained according to the key data; the dynamic token displays the key data through a display device; the authentication server scans the display device of the dynamic token to obtain the key data; and the authentication server obtains the key factors according to the key data. In the invention, the key factors or key factor parameters set on the dynamic token are transmitted to the authentication server by a scanning mode and the limitation of a manual input mode on the digit number of the key factors or the key factor parameters is eliminated, so that the key factors or the key factor parameters with a larger digit number can be set, the difficulty in cracking the key factors is improved, and the safety of the dynamic token is improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method, system, terminal and verification server for setting a dynamic token key factor. Background technique [0002] With the development of information security technology, dynamic tokens have been more and more widely used in the fields of financial securities, e-commerce and enterprise software. However, in the existing dynamic tokens, the security parameters are generally set by the manufacturer of the dynamic token terminal equipment when leaving the factory, and both the manufacturer and the issuer will know the security parameters, so it is easy to damage the user's dynamic token terminal due to leakage. The equipment was copied illegally, resulting in losses. [0003] Currently, it is more commonly used to divide the setting of the security parameters into two parts, one part of the security parameters is set by the manufacturer, and the other part is set by the i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 陈柳章
Owner 北京明华联盟科技有限公司
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More