Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for authenticating USB (universal serial bus) challenge-response token

A technology of challenge-response token and authentication system, which is applied in the field of USB challenge-response token authentication, and can solve problems such as third-party hacking attacks

Inactive Publication Date: 2012-09-19
林顺来 +1
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a new type of challenge response token with a USB interface without a full-disk input key, and solve the problem of being attacked by a third-party hacker on the basis of the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for authenticating USB (universal serial bus) challenge-response token
  • Method and system for authenticating USB (universal serial bus) challenge-response token
  • Method and system for authenticating USB (universal serial bus) challenge-response token

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The implementation of the technical solutions of the present invention will be specifically described below in conjunction with the accompanying drawings.

[0049] figure 1 The shown USB challenge-response token authentication method and system against network fraud and third-party attack are composed of client USB challenge-response token, authentication webpage (with authentication control) and authentication server.

[0050] Its USB challenge-response token authentication flow includes the following steps.

[0051] Step S101

[0052] Press the token button, and the USB challenge-response token switches to the two-way authentication mode. At this time, the token displays a 2-digit challenge code (05 as shown in the figure) and a 5-digit verification code (HHPUS as shown in the figure).

[0053] Step S102

[0054] Enter the token serial number and the token challenge code (05 in the figure) on the authentication web page.

[0055] Step S103

[0056] The authenticati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system for authenticating a USB (universal serial bus) challenge-response token, wherein the client USB challenge-response token is provided with a USB interface but not provided with full keyboard input keys. When transaction of the USB challenge-response token is authenticated, an authentication webpage calls an authentication control to transmit transaction information including a transfer account number and transfer amount to the token through the USB interface, a cryptographic chip of the token calculates dynamic passwords related to transaction data in a challenge-response mode and returns the dynamic passwords through the USB interface, the authentication webpage transmits the transaction data and the returned dynamic passwords containing the transaction information of a user to an authentication server of the system, the authentication server acquires a token seed key according to a user identifier, the transaction data are calculated in the challenge-response mode to obtain the dynamic passwords related to the transaction data, and the dynamic passwords are compared with the dynamic passwords, which is submitted by the token, containing the transaction information of the user to determine whether the transaction data are tampered or not.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a USB challenge response token authentication method and system capable of resisting network fraud and third-party attacks. Background technique [0002] Confirming the legitimacy of users through the application of strong two-factor password (dynamic password and static password) authentication technology is a fast-growing security technology that uses passwords to implement identity identification in current computer networks. The application number is 2011100120747.7, and the Chinese patent application titled "a dynamic token two-way authentication method and system" discloses a dynamic token authentication method. The authentication method is generated and displayed by a clock-shaped dynamic two-way authentication token. Challenge code and verification code, enter the challenge code and ID number through the authentication webpage, and send back a set of verifica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCG06F21/34
Inventor 林顺来林麟
Owner 林顺来
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products