Authorization method and system

An authentication method and an authentication system technology, which are applied in the field of authorization authentication methods and systems, and can solve the problems of USBKey being easily transferred and signed.

Active Publication Date: 2012-06-20
FEITIAN TECHNOLOGIES
View PDF5 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an authorization authentication method and system in order to solve the problem that the USB Key is easy to be transferred and the signature needs to repeatedly verify the PIN code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authorization method and system
  • Authorization method and system
  • Authorization method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0101] This embodiment provides a method of authorization authentication, which is performed when the signature Key is inserted into the computer, and the signature Key is associated with the signature Key one-to-many, such as figure 1 As shown, the process of establishing an association between the authorization Key and the signature Key in the method includes S101-S107;

[0102] S101: The first computer receives the association request, and judges whether there is an authorization key connected to the first computer, if yes, execute S102, otherwise end;

[0103] S102: the first computer obtains the serial number from the signature Key;

[0104] Specifically, in this embodiment, the length of the serial number is 12 bits agreed in advance, and the serial number is used as the ID of the external authentication key;

[0105] S103: The first computer sets the external authentication key of the signature key, if the setting is successful, execute step 104, otherwise end;

[010...

Embodiment 2

[0147] An authorization authentication method provided by Embodiment 2 of the present invention includes an association process and an authentication process. The specific implementation technical solution is: the authorization key and the signature key are transmitted through the computer, and after the PIN verification of the authorization key is passed, the authorization key and the signature key Perform one-to-many association. After association, when using the signature key to operate, the signature key needs to be authenticated by the authorization key in advance. After the authentication is passed, the signature key can be used for operation.

[0148] The first computer in this embodiment includes a terminal and associated programs installed inside it. see figure 2 , the association process specifically includes:

[0149] S201: The first computer receives the association request, and judges whether there is an authorization key and a signature key connected to the fir...

Embodiment 3

[0210] Embodiment 3 of the present invention provides an authorization authentication system, such as Figure 5 As shown, including: authorization Key3, computer 2 and signature Key1;

[0211] Authorization Key1 specifically includes:

[0212] The first receiving module 11 is used to receive the serial number and the external authentication key of the signature Key sent by the computer during association, and receive the first encrypted data, the serial number and the second random number of the signature Key sent by the computer during authentication;

[0213] The first generating module 12 is used to generate an encrypted public key and an encrypted private key according to the RSA encryption algorithm (), and is also used to generate the first random number and / or random string;

[0214] The first storage module 13 is used to store the encrypted public key and the encrypted private key, the serial number of the signature Key received during association, the external authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authorization method and system. The method comprises the following steps: setting an external authentication secret key in a signature Key and an authorization Key, wherein the external authentication secret key is in one-to-one relationship with a serial number of the signature Key; the authorization Key sends an encrypted public key to the signature Key through a first computer to save; after receiving an identity authentication request, a second computer obtains a second random number and the serial number from the signature Key and sends the same to the authorization Key; the authorization Key searches the external authentication secret key by using the serial number, and uses the external authentication secret key and an encrypted private key to sign the second random number to generate to-be-verified data to send to the signature Key through the second computer; and the signature Key verifies the received to-be-verified data by using the encrypted public key and the external authentication secret key. The method provided by the invention realize the one-to-one or one-to-many relevance of the authorization Key and the signature Key, after the identity is authenticated, the signature Key and the authorization Key can sign the data of each transaction so as to guarantee the authenticity and validity of the transaction between bank and enterprise.

Description

technical field [0001] The invention relates to the field of information security, in particular to an authorization authentication method and system realized by a signature Key and an authorization Key. Background technique [0002] At present, with the rapid development of computer technology, online banking (referred to as online banking) is becoming more and more popular, and more and more people are beginning to use this convenient and fast online banking service, such as personal online banking, corporate online banking, mobile banking, etc. These The applications of online banking interact with the background server of online banking through the Internet. Another mode of online banking is bank-enterprise direct connection. This mode realizes the secure link between the enterprise system (financial system / enterprise management system SAP / enterprise resource planning system ERP) and the banking system at the network level, which can effectively avoid Internet access. a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/06
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products