Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information security equipment and its management method, management device and management system

A technology for information security and equipment management, applied in the field of information security, can solve problems such as time-consuming and labor-intensive, funds cannot be circulated in information security equipment, and the original version cannot be rolled back

Active Publication Date: 2019-05-21
GOLDPAC GRP LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Usually, in order to ensure the safety of funds, multiple information security devices belonging to the same user are independent of each other and have no relationship with each other, and the user's funds cannot be conveniently circulated among multiple information security devices. In financial business, users often have to travel back and forth between multiple issuers of information security equipment, which is time-consuming and labor-intensive
[0003] When there is a new version of the application program of a certain information security device, in order to obtain an updated, safer or more convenient experience as possible, other devices used with the information security device usually need to be updated accordingly. Support the smooth application of new programs for information security equipment, resulting in chained update requirements; once the updated equipment is used abnormally, the most common solution at present is to only replace the old version, but cannot return to the original version
[0004] What's more serious is that after the information security device is lost, the user needs to apply for a new information security device to make the lost old information security device invalid, so as to avoid the risk of the lost old information security device being stolen, which is harmful to people's life. Daily life brings great inconvenience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security equipment and its management method, management device and management system
  • Information security equipment and its management method, management device and management system
  • Information security equipment and its management method, management device and management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] In order to enable those skilled in the art to better understand the technical solution of the present invention, the information security equipment management method, information security equipment management device, information security equipment and information security equipment management system of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods describe.

[0086] This embodiment provides an information security device and a management method for multiple information security devices. Through the information security device management method, multiple information security devices are managed through information sharing, which can easily realize the integration of personal funds. Function, but also has high security and convenience.

[0087] Such as figure 1 As shown, the information security device 1 includes a control unit 11, a device communication unit 12, a device...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, and specifically relates to an information security equipment management method, an information security equipment management device, information security equipment and an information security equipment management system. The information security equipment management method is used for managing information sharing among multiple pieces of information security equipment, wherein the sharing operation includes at least one of the following steps: querying the security information of at least one piece of information security equipment, synchronizing application or data between at least two pieces of information security equipment, and assigning application permissions for the at least two pieces of information security equipment with the same application and configuring application permission transfer between the information security equipment. By using the information security equipment management method, a safe and convenient information security equipment management mode for integrating personal fund is achieved without relying on the service background of the information security equipment.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an information security equipment management method, an information security equipment management device, an information security equipment, and an information security equipment management system. Background technique [0002] With the development of information technology and the rise of network transactions, many people have multiple information security devices in their daily life, such as smart cards (IC cards) with payment functions, dynamic password cards, dynamic tokens, USBKEY, bank Card or access control card with authentication function, electronic key, etc. Usually, in order to ensure the safety of funds, multiple information security devices belonging to the same user are independent of each other and have no relationship with each other, and the user's funds cannot be conveniently circulated among multiple information security devices. In f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 任鸣杨宁
Owner GOLDPAC GRP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products