Unlock instant, AI-driven research and patent intelligence for your innovation.

USB key authentication method and system

An authentication method and authentication system technology, applied in the field of USB key authentication method and system, can solve the problems of low security and achieve the effect of improving security

Active Publication Date: 2013-12-25
SANGFOR TECH INC
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the inventor has discovered through research that at least the following problems exist in the traditional technology: in the USBkey authentication method in the traditional technology, the authentication terminal must have a USBkey driver, and For an authentication terminal that only has a USB interface but does not have a USBkey driver, it can only be authenticated through an unencrypted certificate file, resulting in low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • USB key authentication method and system
  • USB key authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In one embodiment, such as figure 1 As shown, a USBkey authentication method, the method completely depends on the computer program, and the computer program can run on the USBkey authentication system based on von Leumann system. The USBkey authentication system can be based on a computer system, including an authentication terminal, a proxy server and an authentication server. Among them, compared with the traditional technology, there is no need to install a USBkey driver on the authentication terminal.

[0036] The method includes the following steps:

[0037] Step S102, the authentication terminal obtains the inserted USB device, maps the inserted USB device to the proxy server, obtains the user ID corresponding to the authentication terminal, and sends the user ID to the proxy server.

[0038] When a USB device containing an encrypted certificate is inserted into the authentication terminal, a USBkey insertion event can be triggered. The authentication terminal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A USB key authentication method comprises the steps that an authentication terminal acquires inserted USB equipment, the inserted USB equipment is mapped to a proxy server, user identification corresponding to the authentication terminal is obtained, the user identification is sent to the proxy server, the proxy server acquires the related information of encryption certificates corresponding to the mapped USB equipment by calling the drive program of the USB key and sends the related information of the encryption certificates and the user identification to an authentication server, the authentication server judges whether the related information of the encryption certificates matches the user identification or not, and if the related information of the encryption certificates matches the user identification, and the authentication terminal corresponding to the user identification is acquired, and is informed of the success of authentication. In addition, the invention further provides a USB key authentication system, the USB key authentication method and system can be run on the authentication terminal without a USB key drive, and therefore safety is improved.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a USB key authentication method and system. Background technique [0002] Remote identity authentication in traditional technology usually adopts USB key authentication method. For example, in daily online banking, when users log in to online banking, they need to insert a USB key into the authentication terminal first, and the driver on the authentication terminal reads out the USB key from the inserted USB key. The certificate information used to represent the identity of the user, and then the certificate information and the input user ID are uploaded to the authentication server for authentication. [0003] However, the inventor has found through research that at least the following problems exist in the traditional technology: in the USBkey authentication method in the traditional technology, the driver of the USBkey must be provided on the authentication terminal, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06G06F21/34
Inventor 林海长卢艺林彦
Owner SANGFOR TECH INC