USB (universal serial bus)-key and application method thereof

A terminal and chip technology, applied in user identity/authority verification and key distribution, can solve problems such as hidden security risks and inability to resist illegal user dictionary attacks, and achieve the effect of improving security and preventing dictionary attacks.

Active Publication Date: 2013-01-30
NATIONZ TECH INC
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is to say, the existing USB-key cannot resist the dictionary attack of illegal users
[0006] It can be seen that the existing USB-key still has certain potential safety hazards when it is used, so it needs to be improved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • USB (universal serial bus)-key and application method thereof
  • USB (universal serial bus)-key and application method thereof
  • USB (universal serial bus)-key and application method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described in detail below through specific embodiments in conjunction with the accompanying drawings.

[0045] In the prior art, the main reason for the potential safety hazards in using the USB-key is that the existing USB-key can be used on any computer. Therefore, illegal users can use the USB-key to crack the user's PIN code in an exhaustive manner. In order to solve the potential safety hazards in the use of USB-key in the prior art, when the USB-key is plugged into the terminal for use, the mutual authentication between the USB-key and the terminal is performed first, and if the authentication passes, the USB-key It can be used on the terminal. If the authentication fails, the USB-key cannot be used on the terminal. In this way, the illegal user has no chance to crack the user's PIN code through dictionary attack.

[0046]Furthermore, if the USB-key is bound to a terminal trusted by the user, the bound USB-key can only be use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a USB (universal serial bus)-key and an application method thereof. The application method includes the following steps: performing mutual authentication between a USB-key and a terminal connected with the same; judging whether the authentication between the USB-key and the terminal succeeds or not; judging the terminal to be a trustable terminal on success so that the USB-key can work normally on the terminal; and judging the terminal to be an non-trustable terminal on failure so that the USB-key cannot be identified by the terminal. With the USB-key, an illegal user cannot use the USB-key on the non-trustable terminal if the USB-key of a user is lost, so that the illegal user has no chance to input a PIN (personal identification number) code on a present terminal, dictionary attack to the PIN code of the user from the illegal user can be prevented, and usage security of the USB-key for the user is improved.

Description

technical field [0001] The present invention relates to the application field of the USB-key, in particular, to a method for using the USB-key and the USB-key. Background technique [0002] USB-key is a hardware device with a USB interface, and its shape is the same as our common U disk. Different from the U disk, the USB-key has built-in CPU, memory, and chip operating system (COS), which can store the user's key or digital certificate, and use the built-in cryptographic algorithm of the USB-key to realize the authentication of the user's identity. [0003] Each USB KEY is protected by a hardware PIN code, and the PIN code and the USB-key constitute two necessary factors for the user to use the USB-key. Only when the user obtains the USB-key and the user PIN code at the same time, can he log in to the system through a terminal such as a PC, and then use the USB-key to perform corresponding operations. [0004] In general, even if the user's PIN code is leaked, as long as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 陈山
Owner NATIONZ TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products