Password verification method and system

A password verification and command technology, applied in the field of communication, can solve problems such as the threat of USBKEY security use, achieve the effect of defending against higher-level attacks, improving user experience, and improving response speed

Active Publication Date: 2016-06-01
HENGBAO
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This makes it easier for attackers to obtain the PIN code, which poses a greater threat to the safe use of USBKEY

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password verification method and system
  • Password verification method and system
  • Password verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0064] A kind of password verification system proposed by this application, such as figure 1 As shown, including host computer 11 and USBKEY12, specifically, as image 3 As shown, the host computer 11 includes:

[0065] The input module 31 is used for the user to input the PIN code.

[0066] More specifically, when the PIN code input by the user in the input module 31 personalizes the USBKEY 12, the bank center issues a bound personal identification code to the USBKEY 12.

[0067] The PIN code binding process specifically includes:

[0068] First, the bank host requests USBKEY12 information from the bank center server, and queries the PIN code status of the corresponding USBKEY12 according to the USBKEY12 information returned by the bank center server, and then the bank host...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides a password verification method and system. The method comprises the step that S1, an upper computer generates a PIN value; S2, the upper computer acquires a random number from a USBKEY; S3, an instruction data packet for PIN verification is generated; S4, the USBKEY parses the instruction data packet; and S5, parsed data are determined, and if the determination is successful, the PIN verification passes. According to the password verification method and system provided by the application, the real security of a verification password is ensured by performing asymmetric algorithm encryption on the random number, the length of a user PIN value and the user PIN value, so that the security level of the password is improved, PIN code information leakage is prevented, and higher-level attack to the USBKEY can be defended; and in addition, through grading verification on the random number, the length of the user PIN value and the user PIN value, the determination time is saved, the USBKEY response speed is higher, and the user experience is improved.

Description

technical field [0001] The present application relates to the communication field, in particular to a password verification method and system. Background technique [0002] USBKEY is a product for secure payment based on the network, which can prove the parties' non-repudiation of transaction data, and adopts a digital signature method. [0003] The so-called digital signature (DigitalSignature) is some data attached to the data unit, or a cryptographic transformation of the data unit. This data or transformation allows the recipient of the data unit to confirm the origin and integrity of the data unit and protect the data from forgery. It is a method of signing messages in electronic form so that a signed message can be transmitted over a communication network. [0004] When USBKEY conducts network transactions, the user needs to enter a PIN code. The current client mostly uses plaintext transmission passwords or symmetric key encryption to transmit on the link. This mak...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32G06Q20/38
CPCG06Q20/3825G06Q20/3829H04L9/3239H04L63/0442H04L63/0853
Inventor 崔静燕
Owner HENGBAO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products