Working method of dynamic token

A technology of dynamic tokens and working methods, applied in the field of information security, can solve the problems of easy loss, cracking, and misappropriation of dynamic tokens, and achieve the effects of preventing misappropriation, preventing losses, and reducing the probability of successful group lifting.

Active Publication Date: 2012-07-25
FEITIAN TECHNOLOGIES
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of realizing the present invention, the inventor found that since the current dynamic token display passwords are all 6 or 8 digi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Working method of dynamic token
  • Working method of dynamic token
  • Working method of dynamic token

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0051] Example one

[0052] In order to effectively prevent the possibility of dynamic token being stolen, dynamic token loss, seed file loss, and group lifting, an embodiment of the present invention provides a dynamic token working method, wherein the dynamic token is usually Sleep state, wake up when a button is pressed, set the button flag, when the power button is continuously pressed for more than a preset time, or when there is no key input within a predetermined time, it will re-enter the dormant state, and the status indicator will be restored at the same time The default value, save the current available password retries and the current state of the lock flag.

[0053] When it is detected that the button flag is set and the dynamic token has not been initialized, the dynamic token detects whether the LCD screen and the keyboard are available according to the type of the pressed button;

[0054] When it is detected that the button flag is set and the dynamic token has been ...

Example Embodiment

[0094] Example two

[0095] In order to effectively prevent the theft of dynamic tokens, loss of dynamic tokens, loss of seed files, and the possibility of group lifting, the embodiment of the present invention uses the power key and the delete key to share a key, and the number keys 1-9 are used as the first number key group. The number key 0 as an example of the second number key group provides a specific implementation method of the dynamic token provided in the first embodiment, wherein the dynamic token is usually in a sleep state, and when a button is pressed Wake up when down, and set the button flag. When the power button is continuously pressed for longer than the preset time, or there is no button input within the predetermined time, it will re-enter the dormant state. At the same time, the status indicator will be restored to the default value and the current available will be saved. The number of password retries and the current status of the lock flag. See figure 1 ...

Example Embodiment

[0179] Example three

[0180] In order to effectively prevent the possibility of dynamic token being stolen, dynamic token loss, seed file loss, and group lifting, the embodiment of the present invention provides another dynamic token working method, wherein the dynamic token is usually In the dormant state, wake up when a button is pressed, set the button flag, when the power button is continuously pressed for longer than the preset time, or when there is no key input within a predetermined time, it will re-enter the dormant state, and the state will be marked Restore to the default value, save the current available password retries and the current state of the lock flag.

[0181] When it is detected that the button flag is set and the dynamic token has not been initialized, the dynamic token detects whether the LCD screen and the keyboard are available according to the type of the pressed button;

[0182] When it is detected that the button flag is set and the dynamic token has be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a working method of a dynamic token. The working method comprises the following steps: judging the type of the pressed key when an effective key is detected by the dynamic token, detecting whether a current starting-up mark is set when the pressed key is a power key, restoring if yes, otherwise, setting the key and checking whether a lock mark is set, logging in a decoding code input interface if yes, otherwise, logging in an information interface; deleting the data of the bottom end of a block buffer cache when the pressed key is a deletion key; storing corresponding data to the block buffer cache when the pressed key is a number key, and the dynamic token is unarranged at the information interface; judging whether the pressed time of the pressed key is longer than a predetermined time when the dynamic token is arranged at the information interface, logging in a power-on password correcting interface if yes, storing the corresponding data to the block buffer cache if not; judging whether the data in the block buffer cache is true or qualified when the pressed key is the enter key and the dynamic token is unarranged at the information interface, generating a dynamic password and displaying corresponding content when the dynamic token is arranged at the information interface.

Description

Technical field [0001] The invention relates to the field of information security, in particular to a working method of a dynamic token. Background technique [0002] In the prior art, a dynamic token (One-time Password, OTP) is a safe and convenient account anti-theft technology. According to a special algorithm, an unpredictable random number combination is generated. Each password can only be used once. During authentication, in addition to the account number and static password, a dynamic password must be entered. Only through system verification can you log in or trade normally, thereby effectively ensuring the legitimacy and uniqueness of the user's identity. The biggest advantage of dynamic tokens is that the passwords used by users are different each time, making it impossible for criminals to impersonate legitimate users. Dynamic password authentication technology is considered to be one of the most effective ways to solve user identity authentication at present. It can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L9/32H04L9/3228G06F21/575G06F2221/2137G06F21/31H04L67/5682H04L67/568H04L63/0838
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products