A secure storage device account input and authentication method

A technology of secure storage and authentication methods, applied in the field of secure mobile storage devices, can solve the problems of counterfeiting, inconvenience, and inability to be used by many people, and achieve the effects of improving security, ensuring security, and facilitating self-management.

Active Publication Date: 2016-05-18
AEROSPACE INFORMATION
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the traditional USBKEY only stores a user's private key and digital certificate, which is protected by a PIN code. The network background server obtains the user's private key and digital certificate for verification. Each person corresponds to a user's private key and digital certificate. Your own personal identification password (PIN), in the case of having a USBKEY, you can guess the identity of a legitimate user by guessing the PIN code, so it cannot be used by multiple people, and at most bind multiple accounts of the same person, which is suitable for multiple people to use (such as: family ) brings a lot of inconvenience
[0003] On the other hand, the traditional USBKey account input is only for a single person, it is not necessary at all, and it is not suitable for the user's own management; the same account verification cannot meet the needs of multiple people

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure storage device account input and authentication method
  • A secure storage device account input and authentication method
  • A secure storage device account input and authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0025] First, the hardware basis of the device of the specific embodiment of the present invention is described:

[0026] figure 1 It is a schematic diagram of the logical structure of the high-speed fingerprint KEY disk based on the national secret algorithm of the present invention. Such as figure 1 As shown, the fingerprint KEY disk includes: security chip 1 of model "SSX45" (SSX45 security chip), flash memory (NANDFLASH) storage chip 2, fingerprint sensor 3 and peripheral chipset 4. SSX45 security chip 1, as the main control chip, is connected with NANDFLASH memory chip 2, fingerprint sensor 3 and peripheral chipset 4 respectively to control the work of the entire Key disk. SSX45 security chip is connected with PC through USB bus.

[0027] The core component of the high-speed fingerprint KEY disk based on the domestic cryptographic algo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an account input and an authentication method of a safe storing device. The account input and the authentication method of the safe storing device comprise that a user account is set in the interior of a safe storing device operating system, a corresponding personal identification number (PIN) and corresponding user fingerprint information are input and recorded, wherein the corresponding user fingerprint information is collected by a fingerprint sensor (3) of the safe storing device; a network background server is connected and the combination of the user account, corresponding PIN codes and user fingerprint information is transmitted and saved in a data bank of the network background server through a interior safe chip (1) of the safe storing device and a operating system; in the authentication, the network background server obtains the combination of the user account, the corresponding PIN codes and the user fingerprint information to compare with the saved data in the data bank of the network background server, wherein the combination of the user account, the corresponding PIN codes and the user fingerprint information is transmitted and saved by the safe storing device; when the combination of the user account, the corresponding PIN codes and the user fingerprint information is accord with the data bank of the network background server, the authentication is passed and security data in the safe storing device is read to conduct account authentication by utilizing the user fingerprint information as a secret key; when the combination of the user account, the corresponding PIN codes and the user fingerprint information is not accord with the data bank of the network background server, the authentication fails. The account input and the authentication method of the safe storing device are suitable for multi-user and user management.

Description

technical field [0001] The invention relates to a safe mobile storage device, in particular to a safe storage device account input and authentication method. Background technique [0002] The safe storage device internally stores the user's private key and digital certificate for remote authentication. The commonly used safe storage device, such as: key U disk (USBKey), is a hardware device with a USB interface. The USBKey has a built-in single-chip microcomputer or smart card chip, has a certain storage space, can store the user's private key and digital certificate, and uses the built-in public key algorithm of the USBKey to realize the authentication of the user's identity. Since the user's private key is stored in the password lock, theoretically it cannot be read by any means, thus ensuring the security of user authentication. However, the traditional USBKEY only stores a user's private key and digital certificate, which is protected by a PIN code. The network backgrou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 王永宝苏斌
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products