Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for managing USBKey unlocking secret key intensively and safely

A security management and unlocking technology, which is applied in the field of management and unlocking keys, can solve the problems of USBKey security risks and achieve the effect of ensuring security

Active Publication Date: 2012-07-11
上海格尔安信科技有限公司
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] At present, the unlocking key of USB Key is generally relatively fixed. Key manufacturers provide specific unlocking tools and limit the distribution of tools to prevent security problems. Once the tools are leaked, USB Key will have security risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for managing USBKey unlocking secret key intensively and safely
  • Method for managing USBKey unlocking secret key intensively and safely
  • Method for managing USBKey unlocking secret key intensively and safely

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make it easy to understand the technical means, creative features, objectives and effects achieved by the present invention, the present invention will be further explained below in conjunction with specific drawings.

[0026] Such as figure 1 As shown, the method for centralized and safe management of USB Key unlocking keys of the present invention includes the following steps:

[0027] 1) Generate a random number through the encryption machine as the unlocking key;

[0028] 2) Before the USB Key is delivered to the user, write the unlock key generated in step 1) into the USB Key through the Microsoft CSP interface extension;

[0029] 3) The unlocking key generated in step 1) is encrypted with an encryption machine, and together with the unique identifier of the obtained USB Key, it is encrypted and written into the database;

[0030] 4) If the USB Key is locked, the corresponding encrypted unlocking key is found through the unique identification of the USB Key, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention aims at disclosing a method for managing USBKey unlocking secret keys intensively and safely. Before the USBKeys are delivered to a user for use, an exclusive unlocking secret key is generated for each USBKey, and the exclusive unlocking secret keys are ensured to be safely stored at the same time. When unlocking is required, the USBKeys can be unlocked through the unlocking secret keys. When a large amount of USBKey devices are distributed, the safety of the USBKey unlocking secret keys can be ensured, and safe unlocking is provided for locking of follow-up USBKeys in using process, thereby achieving the purpose.

Description

Technical field [0001] The invention relates to a method for managing unlocking keys, in particular to a method for centralized and safe management of USBKey unlocking keys. Background technique [0002] With the development of online banking and online secure transactions, USB Key based on public key cryptography has begun to be used by more and more people. [0003] The security of the public key cryptography technology itself is guaranteed by algorithms, which can ensure security within a certain time range, but the use of USB Key is protected by a password, and the password is generally not too long for the convenience of remembering. It is often 6 to 8, so the ultimate weakness of security lies in the protection of passwords. [0004] For this reason, USB Key generally limits the number of password retries, that is, if the wrong password is entered multiple times, the USB Key will be locked and cannot be used. Only by unlocking the key can it be unlocked and reused. [0005] The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
Inventor 任伟吴一博范峰
Owner 上海格尔安信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products