Working method for dynamic token

A technology of dynamic tokens and working methods, which is applied in the field of information security and can solve the problems of illegal operations and low application security.

Active Publication Date: 2013-11-13
FEITIAN TECHNOLOGIES
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing technology, as long as you log in to various information system scenarios through a dynamic password, you can operate all items in the information system scenario. Malicious people can illegally operate the information system scenario while the user is away. less secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Working method for dynamic token
  • Working method for dynamic token

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0104] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0105] The embodiment of the present invention provides a working method of a dynamic token, such as Figure 1-Figure 2 shown, including:

[0106] Step 101: The dynamic token is powered on and initialized;

[0107] Initialization in the present embodiment includes system clock setting, IO initialization setting, RTC setting and input variable, system state variable, automatic shutdown variable etc. are initialized;

[0108] Step 102: Turn on the interrupt, and set the to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a working method for a dynamic token and relates to the field of information safety. The working method comprises the steps of judging a wake-up type when the dynamic token is waken up, and if the wake-up type is key wake-up, enabling a system state to be set as a corresponding state according to the type of a pressed key; if the wake-up type is other wake-up, judging a system state type; if the system state type is a login password generating state, generating a login password according to a secret key and current time and outputting the login password, enabling the system state to be set as a login password display state, and enabling the input data lengths to be set as initial values; if the system state type is a first information processing state, generating a first password according to the secret key, the current time and the input first information and outputting the first password, enabling the system state to be set as a first password display state, and enabling the input data lengths to be set as the initial values; if the system state type is a second information processing state, processing input second information, generating a second password according to processing results, the secret key and the current time and outputting the second password, enabling the system state to be set as a second password display state, and enabling the input data lengths to be set as the initial values.

Description

technical field [0001] The invention relates to the field of information security, in particular to a working method of a dynamic token. Background technique [0002] A dynamic token is a terminal used to generate a dynamic password. The dynamic password can confirm the legal identity of the user, thereby ensuring the security of the user's business access on the basis of the user logging in with a legal identity. Dynamic password authentication technology is considered to be one of the most effective ways to solve user identity authentication at present, so it is widely used in various information system scenarios such as banking, securities, third-party payment, and large enterprises. In the existing technology, as long as you log in to various information system scenarios through a dynamic password, you can operate all items in the information system scenario. Malicious people can illegally operate the information system scenario while the user is away. Less security. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products