Verifying method and system for intelligent secret key

A technology of smart password key and verification method, which is applied in the direction of user identity/authority verification, etc. It can solve the problems of smart password key no longer safe, key leakage, etc., and achieve the effect of reducing the possibility of cross-selling and improving security

Active Publication Date: 2014-03-12
GUANGDONG CERTIFICATE AUTHORITY
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the verification method of the traditional smart cryptographic key relies too much on the security of the shared key, and the manufacturer and user of the smart cryptographic key may unilaterally disclose the key. Once the key is leaked, the smart cryptographic key will no longer be safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifying method and system for intelligent secret key
  • Verifying method and system for intelligent secret key
  • Verifying method and system for intelligent secret key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] figure 1 A schematic flowchart of Embodiment 1 of the verification method for the smart encryption key of the present invention is shown in . In the first embodiment, the processing procedure of the user terminal is taken as an example for description.

[0036] see figure 1 Shown, a kind of verification method of intelligent password key, comprises the following steps:

[0037] Step S101, sending the key material acquisition instruction to the smart encryption key, and receiving the key material returned by the smart encryption key; the key material includes: the smart encryption key generated according to the key material acquisition instruction The random number, the first digital signature obtained after the smart cryptographic key signs the random number with the private key of the manufacturer. That is, in the embodiment of the present invention, after receiving the key material acquisition instruction sent by the client, the smart encryption key will randomly g...

Embodiment 2

[0048] The present invention also provides a verification method of the smart cryptographic key, which can generate a session key while realizing bidirectional verification of the smart cryptographic key. In the second embodiment, the processing procedure of the client is still taken as an example for description.

[0049] Such as figure 2 As shown, a verification method for an intelligent password key comprises the following steps:

[0050] Step S201. Send the key material acquisition instruction to the smart encryption key, and receive the key material returned by the smart encryption key; the key material includes: the smart encryption key generated according to the key material acquisition instruction random number, the key seed generated by the smart cryptographic key according to the key material acquisition instruction and encrypted with the user’s public key, and the random number and the encrypted key seed encrypted by the smart cryptographic key using the manufactu...

Embodiment 3

[0072] image 3 A schematic flow chart of Embodiment 3 of the verification method for the smart cryptographic key of the present invention is shown in . In the third embodiment, the processing process of the smart password key terminal is taken as an example for illustration.

[0073] Such as image 3 As shown, in the third embodiment, the processing of the smart password key terminal includes the following steps:

[0074] Step 301: After receiving the key material acquisition instruction sent by the client, the smart cryptographic key generates a random number, and signs the random number with the manufacturer's private key to obtain a first digital signature, and then includes the random number, The key material of the first digital signature is returned to the client;

[0075] Step 302, the smart cryptographic key receives the authentication information sent by the client; the authentication information includes: the client uses the manufacturer's public key to verify th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a verifying method and system for an intelligent secret key. The method comprises the following steps of sending a secret key material acquiring command to an intelligent secret key and receiving the secret key material returned by the intelligent secret key; adopting a plant public key to verify a first digital signature, and obtaining a random number by analyzing the secret key material when the verifying is passed; adopting a user private key to sign the random number to obtain a second digital signature, generating verifying information according to the random number and the second digital signature and sending the verifying information to the intelligent secret key; receiving the verifying answering information returned by the intelligent secret key. The verifying method and system for the intelligent secret key realize bidirectional authentication, and the safety of the intelligent secret key is effectively improved; as the bidirectional authentication is realized, the possibility of volume series in the transmission process of the intelligent secret key is greatly reduced.

Description

technical field [0001] The invention relates to the field of network security, in particular to a verification method for an intelligent cipher key and a verification system for an intelligent cipher key. Background technique [0002] With the gradual deepening of the application of the Internet and business systems, the security protection of online information and business systems has become increasingly prominent. In order to ensure the safe operation of network platforms and system platforms, the role of smart password keys is becoming more and more important. [0003] The smart password key is a smart storage identity authentication device based on a USB interface, with a built-in smart card CPU, memory, chip operating system and a secure file system for identity authentication between the server and the user. The security system of the smart password key is mainly to check and process the transmitted information to prevent illegal eavesdropping or intrusion. The secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 张永强王胜男刘磊廖卫民
Owner GUANGDONG CERTIFICATE AUTHORITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products