Supercharge Your Innovation With Domain-Expert AI Agents!

Usb key authentication method and system

An authentication method and authentication system technology, applied in the field of USBkey authentication method and system, can solve the problem of low security and achieve the effect of improving security

Active Publication Date: 2017-09-19
SANGFOR TECH INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the inventor has found through research that at least the following problems exist in the traditional technology: in the USB key authentication method in the traditional technology, the driver program of the USB key must be provided on the authentication terminal, and for the device that only has a USB interface but does not have a USB key The authentication terminal of the driver can only be authenticated through the unencrypted certificate file, resulting in low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Usb key authentication method and system
  • Usb key authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In one embodiment, such as figure 1 As shown, a USB key authentication method, the method completely depends on the computer program, and the computer program can run on the USB key authentication system based on von Leumann system. The USB key authentication system can be based on a computer system, including an authentication terminal, a proxy server, and an authentication server. Among them, compared with the traditional technology, there is no need to install a USB key driver on the authentication terminal.

[0036] The method includes the following steps:

[0037] Step S102, the authentication terminal obtains the inserted USB device, maps the inserted USB device to the proxy server, obtains the user ID corresponding to the authentication terminal, and sends the user ID to the proxy server.

[0038] When a USB device containing an encrypted certificate is inserted into the authentication terminal, a USB key insertion event can be triggered. The authentication ter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A USB key authentication method, comprising: an authentication terminal obtains an inserted USB device, maps the inserted USB device to a proxy server, obtains a user identification corresponding to the authentication terminal, and sends the user identification to the Proxy server; the proxy server obtains the relevant information of the encryption certificate corresponding to the mapped USB device by calling the driver of the USB key, and sends the relevant information of the encryption certificate and the user identification to the authentication server ; The authentication server judges whether the relevant information of the encryption certificate matches the user ID, and if so, obtains the authentication terminal corresponding to the user ID, and notifies it that the authentication is successful. In addition, a USB key authentication system is also provided. The above USB key authentication method and system can be run on authentication terminals without USB key drivers installed, thereby improving security.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a USB key authentication method and system. Background technique [0002] Remote identity authentication in traditional technologies usually adopts the USB key authentication method. For example, in daily online banking, when users log in to online banking, they need to insert a USB key into the authentication terminal first, and the driver on the authentication terminal is automatically activated from the inserted USB key. Read out the certificate information used to represent the identity of the user, and then upload the certificate information and the input user ID to the authentication server for authentication. [0003] However, the inventor has found through research that at least the following problems exist in the traditional technology: in the USB key authentication method in the traditional technology, the driver program of the USB key must be provided on the authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06G06F21/34
Inventor 林海长卢艺林彦
Owner SANGFOR TECH INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More