Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for activating token equipment

A token and device technology, applied in the field of information security, can solve the problem of low key security, and achieve the effect of improving security and ensuring the security of use

Active Publication Date: 2013-10-09
FEITIAN TECHNOLOGIES
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At the beginning of the token device, users can use it directly after getting most of the token device without activation, and the security of the key is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for activating token equipment
  • Method for activating token equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] The method for activating a token device proposed in Embodiment 1 includes steps A1-A5 performed by the token device and steps B1-B6 performed by the token server. The specific process is as follows figure 1 Shown:

[0032] Step A1: Turn on the token device and wait for the user to input the activation code;

[0033] Specifically, the token device is turned on to check whether it has been activated, and if so, it will display the token normal working interface and enter the normal work flow; otherwise, it will display the activation interface, wait for the user to input the activation code, and continue to step A2.

[0034] Step A2: The token device receives the activation code input by the user, obtains the second random number and the third response code according to the activation code, reads the original key of the token from the first storage area, and obtains the original key of the token according to the original key of the token. key and the second random numbe...

Embodiment 2

[0066] The method for activating a token device proposed in Embodiment 2 includes steps A1-A5 performed by the token device and steps B1-B6 performed by the token server. The specific process is as follows figure 2 Shown:

[0067] Step A1: Turn on the token device and generate the first random number;

[0068] In this embodiment, preferably, the token device uses a random number generator to generate a first random number with a length of 6 bits.

[0069] Further, the token device can also change the device serial number according to preset rules to generate the first random number.

[0070] Step A2: The token device reads the original key of the token from the first storage area, calculates and generates the second response code according to the original key of the token and the first random number, and uses the first random number + the second response code as an activation request The code is saved to the token display buffer area, and the activation request code is disp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for activating token equipment and belongs to the information safety field. The method comprises the steps of starting the token equipment, obtaining a second random number and a third answer-back code according to an activation code input by a user, reading a token original secret key from a first storage area, and calculating according to the token original secret key and the second random number and generating a fourth answer-back code; comparing whether the third answer-back code is uniform with the fourth answer-back code, calculating according to the token original secret key and the activation code to generate a second secret key, using the second secret key to upgrade the token original secret key, the token equipment prompting that activation is successful, obtaining a time premium according to a token internally-arranged clock as a time factor, using the second secret key to calculate the time factor so as to generate order value, storing the order value to a token display cache area, and displaying the order value, so that the activation process is over, otherwise, activation failing, so that the activation process is over. The method can improve the safety of secret keys of the token equipment and utilization safety of the token equipment.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to an activation method of a token device. Background technique [0002] The token device is a dedicated device for generating dynamic passwords, usually in the form of hardware, with a built-in microprocessor chip for processing data and running dedicated cryptographic algorithms, and generates passwords based on factors such as the current time or the number of uses The current dynamic password is displayed on the display. [0003] At the beginning of the token device, users can use it directly after getting most of the token device without activation, and the security of the key is not high. Therefore, inventing a token device activation process to improve key security and ensure the security of the token server and the token device has become a technical problem urgently to be solved by those skilled in the art. Contents of the invention [0004] In order to s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products