Method for realizing follow attack prevention in device with data sign determining function

A data signature and function technology, applied in digital data authentication, electrical components, transmission systems, etc., can solve problems such as follower attacks, and achieve the effect of ensuring transaction security

Active Publication Date: 2015-01-28
HENGBAO
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to propose a method to solve the problem of follow-up attack in the transaction for the device with the function of confirming the data signature, so that the transaction can be carried out safely.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing follow attack prevention in device with data sign determining function
  • Method for realizing follow attack prevention in device with data sign determining function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be described in detail below in conjunction with the accompanying drawings and specific examples.

[0027] figure 2 A flow chart of a method for preventing follower attacks for a device with the function of confirming data signatures for online banking transactions. like figure 2 As shown in , combined with the transaction process, describe in detail where the attacker is attacked in this process, and how the security of the transaction process is reflected after the anti-following attack measures are adopted.

[0028] When anti-following attack measures are not adopted, the online banking transaction process is as follows.

[0029] Step 201): The user inputs information, and the online banking client forms correct transaction data template information.

[0030] Step 202): The online banking client sends the transaction data template information to be signed to the USBKey.

[0031] Step 203): It is judged in the USBKey whether the transa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for realizing follow attack prevention in a device with a data sign determining function. The method comprises the following steps of: inputting transaction information by a user, forming accurate transaction data on an online bank client, and sending the transaction data to be signed to the device with the data sign determining function; abstracting and operating in the device when the transaction data sent by the client are received by the device; judging whether the transaction data to be signed are accordant with a transaction data format or not in the device, displaying the transaction data on a display screen if so, waiting to be checked by the user, prompting the sign overtime information on the display screen of the device if the waiting time is overtime, and refusing to sign; pressing a confirmation button if the transaction data are judged to be correct within the waiting time, i.e. the transaction data are signed successfully, and returning the sign result to the online bank client; and prompting the sign canceling information on the display screen of the device if a deletion button is pressed. By adding restriction during the whole transaction process, the whole process cannot be followed or attacked.

Description

technical field [0001] The invention relates to the field of computer information security, and provides a method for preventing follow-up attacks in a device with the function of confirming data signatures. The most typical device of this type is a new generation of USBKey with LCD buttons. Background technique [0002] With the rapid development of the Internet and its global popularity, it has greatly promoted the development of e-commerce and e-government affairs, and has had a positive and far-reaching impact on people's economic activities. However, e-commerce and e-government affairs activities need to be fundamentally Address issues of true identity, non-repudiation of engaged network activity, and confidentiality of data transmissions. At present, the best solution to these information security problems is PKI digital certificate technology. [0003] USBKey has been widely promoted and applied as a secure medium for protecting private keys. Especially its use in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/34H04L29/06G06F21/44
Inventor 付睿何永福张玙
Owner HENGBAO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products