Synchronization method and system for information security equipment

A technology of information security and equipment, applied in the field of information security, can solve problems such as low synchronization success rate and poor security, and achieve the effect of solving synchronization failure, improving convenience, improving success rate and synchronization security

Active Publication Date: 2017-03-22
FEITIAN TECHNOLOGIES
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The invention provides a method and system for synchronizing information security equipment to solve the defects of low synchronization success rate and poor security in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Synchronization method and system for information security equipment
  • Synchronization method and system for information security equipment
  • Synchronization method and system for information security equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0065] The information security device synchronization method in the embodiment of the present invention is applied to a system including an information security device, a host and an authentication server, such as figure 1 As shown, the information security device includes a smart key module and a dynamic token module, a client is installed in the host, and a user can log in to the client in the host. The dynamic token module can generate and display the dyna...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a synchronization method and system for information security equipment. The system comprises the information security equipment, a host and an authentication server. The information security equipment comprises a smart secret key module and a dynamic token module. The dynamic token module in the information security equipment generates a first temporary secret key according to a seed secret key, generates a first synchronous code and a second synchronous code according to the first temporary secret key and sends the first synchronous code and the second synchronous code to the authentication server through a client in the host. The authentication server authenticates the received first synchronous code and the second synchronous code and executes synchronous operations after authentication succeeds. Security risks caused by the fact that the synchronous codes are tampered or counterfeited in the transmission process can be effectively avoided, users do not need to input the synchronous codes by hand, use convenience is improved, meanwhile, the problem that synchronization fails due to input errors of the users is solved, and the success rate and security of synchronization are improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system for synchronizing information security equipment. Background technique [0002] Information security equipment can be used to generate dynamic passwords, which are widely used in fields such as online banking, telecom operators, and e-government affairs. The dynamic password generated by the information security device can be used for identity authentication, which can effectively improve the security of identity authentication. [0003] When the information security equipment works in the environment of magnetic field, high temperature, high pressure, vibration or water immersion, etc., the information security equipment is prone to clock pulse deviation, and then loses the time synchronization with the authentication server. [0004] In the prior art, the information security device generates a synchronization code after being out of synchronization, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products