Unlock instant, AI-driven research and patent intelligence for your innovation.

Verification method and device for external authentication key

A technology of external authentication and verification methods, applied in the field of information security, can solve problems such as low security, and achieve the effect of improving security and protecting legitimate rights and interests

Active Publication Date: 2016-06-22
SHENZHEN EXCELSECU DATA TECH
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides an external authentication key verification method and device, aiming to solve the problem of low security of the existing external authentication key verification method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and device for external authentication key
  • Verification method and device for external authentication key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] figure 1 A flow chart of an external authentication key verification method provided by the first embodiment of the present invention is shown, and the details are as follows:

[0027] Step S11, receiving the external authentication key to be verified.

[0028] When the verification device is powered on, the external authentication process will be started, and the external authentication key to be verified input by the user will be received.

[0029] Step S12, read the remaining number of attempts of the external authentication key.

[0030] Specifically, the remaining number of attempts of the external authentication key stored is read from the memory (such as FLASH or EEPROM). The remaining number of attempts of the external authentication key has a maximum value and a minimum value, and the maximum value is set according to needs, usually greater than 1, The minimum value is usually 0.

[0031] Optionally, before the remaining number of attempts to read the extern...

Embodiment 2

[0050] figure 2 It shows a structural diagram of an external authentication key verification device provided by the second embodiment of the present invention. The external authentication key verification device is mainly various information security devices, such as U-shield, smart card, Bluetooth device, etc., in order to facilitate Note that only the parts related to the embodiments of the present invention are shown.

[0051] The external authentication key verification device includes: an external authentication key receiving unit 21 to be verified, a reading unit 22 for the remaining number of attempts of the external authentication key, a decrementing unit 23 for the remaining number of attempts of the external authentication key, and a verification unit for the external authentication key to be verified. 24. The verification success unit 25 of the external authentication key to be verified, and the verification failure unit 26 of the external authentication key to be ve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is applicable to the field of information security and provides a verification method and device for an external authentication key. The method comprises the steps of receiving the external authentication key to be verified; reading the remaining number of trial times of the external authentication key; progressively decreasing the firstly read remaining number of trial times of the external authentication key; verifying the external authentication key to be verified; updating the remaining number of trial times of the external authentication key when the external authentication key to be verified is verified successfully; not updating the remaining number of trial times of the external authentication key when the external authentication key to be verified is verified unsuccessfully. By means of the method, the security of the verification process of the external authentication key can be improved.

Description

technical field [0001] Embodiments of the present invention belong to the field of information security, and in particular relate to a method and device for verifying an external authentication key. Background technique [0002] U-shield is a tool for electronic signature and digital authentication of online banking. It ensures the confidentiality, authenticity, integrity and non-repudiation of online transactions through operations such as encryption, decryption and digital signature. During the use of the USB-Shield, verifying the external authentication key is an important authentication mechanism to ensure that the user using the USB-Shield is the owner of the USB-Shield. However, in the case that others get the U-shield or remotely control the U-shield, in order to obtain the right to use the U-shield, they will attack the external authentication key. [0003] At present, when the USB-Shield verifies the external authentication key, if it judges that the external authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06Q20/40G06Q20/36
CPCG06F21/602G06Q20/3674G06Q20/401
Inventor 陈柳章
Owner SHENZHEN EXCELSECU DATA TECH