Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A usbkey security authentication system and security authentication method

A technology for security authentication and secure communication, applied in the USBKey security authentication system and security authentication field, which can solve problems such as security risks and information leakage

Active Publication Date: 2017-12-29
NEUSOFT CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the above problems, the embodiment of the present application provides a USBKey security authentication system and a security authentication method, in order to solve the information leakage existing in the traditional USBKey security authentication process, and the security risks caused by it

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A usbkey security authentication system and security authentication method
  • A usbkey security authentication system and security authentication method
  • A usbkey security authentication system and security authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] see figure 2 , which shows the structure of an embodiment of the USBKey security authentication system of the present application (Embodiment 1). The USBKey security authentication system of this embodiment includes: a client device 21, a USBKey device 22 and a background service device 23, and a secure communication channel 24 is established between the USBKey device 22 and the background service device 23, wherein:

[0062] The client device 21 has a first operating system, and a client application runs in the first operating system of the device. The client application can initiate an authentication request to the USBKey device, and can also receive the authentication result to implement authentication. In an embodiment, the authentication result may be sent by the USBKey device, or may be sent by the background service device, which depends to a certain extent on the currently used authentication mechanism, for example, if a "one-way" authentication mechanism is ad...

Embodiment 2

[0072] see Figure 4 , which shows the composition structure of another embodiment of the USBKey security authentication system of the present application (embodiment 2). The USBKey security authentication system of this embodiment includes: a client device 41, a USBKey device 42 and a background service device 43, and a secure communication channel 44 is established between the USBKey device 42 and the background service device 43, wherein:

[0073] The client device 41 has a first operating system, and a client application runs in the first operating system of the device. The client application can initiate an authentication request to the USBKey device, and can also receive the authentication result to implement authentication, similar to the foregoing embodiments Preferably, the authentication result may come from the USBKey device, or from the background service device.

[0074] The USBKey device 42 has a second operating system, the device may include at least one first...

Embodiment 3

[0083] The above two embodiments both mention the client device and the USBKey device, and these two devices together with other devices constitute the USBKey security authentication system, and the positional relationship between the two devices is not particularly limited here. However, in some cases, clarifying the positional relationship between them may bring more technical effects. see Figure 8 , in this figure, the client device and the USBKey device are integrated into one device, which can appear as a smart device. In this integrated mode, the first operating system where the client device is located is isolated from the second operating system where the USBKey device is located, so that the environment where the client device is located is different from the environment where the USBKey device is located, For the sake of safety, this application sets the environment where the client device is located as a rich execution environment, which is a non-installation envi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present application provide a USBKey security authentication system and method. The system includes: a client device for running a client application, which can initiate an authentication request to the USBKey device and receive an authentication result; the USBKey device includes at least one first authentication processing module, which is used to receive the The authentication request of the module identification information, and the first authentication processing is performed on the identification information, and the processing result is sent to the background service device through a secure communication channel; the background service device includes a second authentication processing module, which receives the first authentication processing module. After processing the result, perform the second authentication processing, and send the processing result to the client device as the final authentication result, or send it to the first authentication processing module of the USBKey device through a secure communication channel, so that the first authentication processing module performs authentication processing to obtain The final authentication result is sent to the client device. The implementation manner of this application can improve authentication security.

Description

technical field [0001] The embodiments of the present application relate to the technical field of information security, and in particular to a USBKey security authentication system and security authentication method. Background technique [0002] With the development of Internet technology and e-commerce, more and more activities involving private data such as personal identity information and business secrets have made the requirements for information security in various fields higher and higher. In order to ensure information security, at present, USBkey technology is widely used in the market for security authentication. For example, the online banking of most financial institutions almost all use USBkey technology to protect the security of customer information and transaction process. Not only that, USBkey is also widely used in other fields. This fully reflects the inherent potential and market prospects of USBkey technology. [0003] see figure 1 , the figure show...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 张秀邦冯希顺闻英友张志坚王军孟庆洋
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products