Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Token parameter filling equipment, filling data processing equipment and filling method

A technology for data processing equipment and filling equipment, applied in the field of confidential or secure communication devices and token parameter filling equipment, can solve problems such as no seed key definition, and achieve data security problems, filling data integrity, The effect of improving filling efficiency

Active Publication Date: 2015-05-27
北京集联网络技术有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The key management system in the dynamic token authentication system is clearly defined in the GM / T0021-2012 dynamic password application technical specification of the State Cryptography Administration, but the seed key in the token key management system has not yet been defined. Secure filling into tokenized products for definition

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Token parameter filling equipment, filling data processing equipment and filling method
  • Token parameter filling equipment, filling data processing equipment and filling method
  • Token parameter filling equipment, filling data processing equipment and filling method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] A token parameter filling equipment, the filling equipment includes:

[0064] The dynamic token uses the seed key to generate a dynamic password based on the current time, challenge code or event counter value. The seed key is used to encrypt or digest the input time, challenge code or event counter, and output 6-8 digits to the display screen after a transformation operation (usually a modular operation) as a dynamic password.

[0065] The first receiving module is used to obtain the token serial number and the encrypted seed key from the key management system, and encrypt them into the filling equipment, where the seed key corresponds to the serial number one to one; the dynamic token and the authentication server software system The fixed factors shared between the keys include the key KEY and the variable IV, and the variable IV is used to transform the key KEY or input variable factors. The fixed factor (KEY, IV) is called the dynamic token and the seed key of the auth...

Embodiment 2

[0081] Embodiment 2: A token filling data processing equipment, the token filling data processing equipment includes:

[0082] The receiving filling data module is used to obtain binary-coded filling data from the data line according to the clock line signal provided by the filling equipment and the filling frequency of the filling equipment. The data header and data tail are used for data synchronization;

[0083] Filling data verification module, used to confirm the integrity of the issued filling data after receiving the filling data;

[0084] The filling data storage module is used to store the seed key, UTC time, token product frequency offset, and running preset parameters of the token into the token's corresponding key area, audit area and data area for The token is used for dynamic password calculation and operation;

[0085] Verification code calculation module. After the filling is successful, assign the result code to 00, use SM3 algorithm, and calculate the verification co...

Embodiment 3

[0090] A token parameter filling method, the method includes the following steps:

[0091] Obtain the token serial number and encryption seed key from the key management system, the seed key corresponds to the serial number one to one, and the encryption enters the filling device, including encryption algorithms including SM2, SM1, and SM4;

[0092] Real-time measurement obtains three times of token product frequency deviation, calculates the average deviation, and the frequency deviation accuracy is 0.01PPM;

[0093] Run preset parameters. The preset parameters include: seed key length, expiration time, number of failed power-on passwords, number of automatic unlocking, and algorithm selection; it has been successfully preset according to user needs before production. It can be performed according to user needs. Parameter expansion;

[0094] Obtain the current UTC time; in this embodiment, the preferred method is to obtain the current UTC time through GPS or a time server.

[0095] De...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses token parameter filling equipment and filling data processing equipment and a filling method. The filling method comprises the following steps: sending token serial numbers and seed secret keys into the filling equipment by a secret key-management system, setting an operation preset parameter and performing filling on the token by the filling equipment, expanding preset parameter data according to the different configuration parameter requirements of users, performing decryption on the seed secret keys, obtaining three frequency deviations of a token product through the real-time measurement by adopting crystal measuring equipment, and performing calculation so as to obtain average deviation; then obtaining a current UTC time through a time server or a GPS (Global Position System) by a time obtaining module. The token parameter filling equipment, the filling data processing equipment and the filling method, disclosed by the invention, have the technical benefits that the problem of data security during filling process is solved, complete and reliable filling data is ensured, the filling efficiency is improved, and the product can be filled with the frequency deviation parameter of the dynamic token.

Description

Technical field [0001] The invention relates to a token parameter filling equipment, a filling data processing equipment and a filling method, belonging to the technical field of confidential or safe communication devices and methods. Background technique [0002] As one of the secure identity authentication technologies, dynamic tokens have been accepted by various industries with the development of the mobile Internet. Because it is convenient to use and has nothing to do with the platform, it has become the mainstream of offline identity authentication technology and is widely used in enterprises, online games, finance and other fields. The key parameters used when dynamic tokens generate dynamic passwords include: seed key and time parameters, token frequency offset, and operating preset parameters. These parameters are written through special production and filling equipment during the production of dynamic tokens. Into the token, in the production process, the safety and r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 郑立郭思建刘岸商海峰孙炤磊
Owner 北京集联网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products