Verification method and device for external authentication key
A technology of external authentication and verification methods, applied in the field of information security, can solve problems such as low security, and achieve the effect of improving security and protecting legitimate rights and interests
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] figure 1 A flow chart of an external authentication key verification method provided by the first embodiment of the present invention is shown, and the details are as follows:
[0027] Step S11, receiving the external authentication key to be verified.
[0028] When the verification device is powered on, the external authentication process will be started, and the external authentication key to be verified input by the user will be received.
[0029] Step S12, read the remaining number of attempts of the external authentication key.
[0030] Specifically, the remaining number of attempts of the external authentication key stored is read from the memory (such as FLASH or EEPROM). The remaining number of attempts of the external authentication key has a maximum value and a minimum value, and the maximum value is set according to needs, usually greater than 1, The minimum value is usually 0.
[0031] Optionally, before the remaining number of attempts to read the extern...
Embodiment 2
[0050] figure 2 It shows a structural diagram of an external authentication key verification device provided by the second embodiment of the present invention. The external authentication key verification device is mainly various information security devices, such as U-shield, smart card, Bluetooth device, etc., in order to facilitate Note that only the parts related to the embodiments of the present invention are shown.
[0051] The external authentication key verification device includes: an external authentication key receiving unit 21 to be verified, a reading unit 22 for the remaining number of attempts of the external authentication key, a decrementing unit 23 for the remaining number of attempts of the external authentication key, and a verification unit for the external authentication key to be verified. 24. The verification success unit 25 of the external authentication key to be verified, and the verification failure unit 26 of the external authentication key to be ve...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 