Method for carrying out identity recertification on particular operation of information system by using Usb key technology

A special operation and information system technology, applied in digital data authentication, instruments, electronic digital data processing, etc., can solve problems such as large investment in research and development, inability to achieve large-scale promotion, and legal users cannot log in.

Inactive Publication Date: 2012-05-16
ZHENJIANG JINGYING SOFTWARE TECH
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Biometric authentication is based on biometric identification technology, affected by the maturity of the current biometric identification technology, the use of biometric authentication still has great limitations
First of all, the accuracy and stability of biometric identification needs to be improved, especially if the user's body is affected by injuries or stains, it often leads to the failure of normal identification, resulting in the situation that legitimate users cannot log in
Secondly, due to the large investment in research and development and the small output, the cost of the biometric authentication system is very high. At present, it is only suitable for some occasions with very high security requirements, such as banks and troops, and it cannot be widely promoted.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0018] The comprehensive toll collection system of the vehicle management office adopts the C / S development model. When the user performs free operation, the system must perform Usb Key authentication. Only after the authentication is passed, the free operation is allowed.

[0019] The process of this embodiment is:

[0020] When the system administrator authorizes the user, if there is free operation permission, the system prompts to insert a Usb Key, and the system reads the unique serial number of the Usb Key and writes it into the corresponding record of the user. When the user performs free operation, it must Insert the Usb Key for identity authentication, and only after passing can the free operation be performed.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a practical application of a method for carrying out identity recertification on particular operation (such as cost-free operation of a charge system, an information deleting operation of an illegal system) in a software system in a public security traffic industry. The method comprises the following steps: binding one Usb Key with a user which has particular operation authority; then binding the unique serial number of the Usb Key with user information; when the user carries out the particular operation, firstly checking whether the Usb Key is inserted or not, if not, exiting a system; if so, verifying whether the unique serial number of the Usb Key is accurate or not; and carrying out the operation only if the unique serial number of the Usb Key is accurate, thereby avoiding extensive damage caused by the malevolence operation performed by others due to code leakage.

Description

technical field [0001] The present invention relates to the practical application of the identity re-authentication method in the public security traffic management industry during special operations in the software system (such as free operation of the toll system and deletion of information in the illegal system). Bind the unique serial number of the Usb Key with the user information. When the user performs a special operation, first check whether the Usb Key is inserted. If not, the system exits; It can be operated to avoid malicious operations by others due to password leakage, resulting in huge losses. Background technique [0002] In the information system, the means of user identity authentication can be roughly divided into these three types. Proving a person’s identity only by meeting one condition is called single-factor authentication. Since only one condition is used to judge the user’s identity, it is easy to be identified. Counterfeiting, which can prove a per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/34
Inventor 曾凡玉
Owner ZHENJIANG JINGYING SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products