External authentication key verification method and device
A technology of external authentication and verification methods, applied in the field of information security, can solve problems such as low security, and achieve the effect of improving security and protecting legitimate rights and interests
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] figure 1 A flowchart of an external authentication key verification method provided by the first embodiment of the present invention is shown, and the details are as follows:
[0027] Step S11, receiving the external authentication key to be verified.
[0028] When the verification device is powered on, it will start the external authentication process and receive the external authentication key to be verified input by the user.
[0029] Step S12, read the remaining number of attempts of the external authentication key.
[0030] Specifically, the number of remaining attempts of the external authentication key stored in the memory (such as FLASH or EEPROM) is read, and the remaining number of attempts of the external authentication key has a maximum value and a minimum value, and the maximum value is set as required, usually greater than 1, The minimum value is usually 0.
[0031] Optionally, before the remaining number of attempts to read the external authentication ...
Embodiment 2
[0050] figure 2 A structural diagram of an external authentication key verification device provided by the second embodiment of the present invention is shown. The external authentication key verification device is mainly various information security devices, such as USB shields, smart cards, Bluetooth devices, etc. In the description, only the parts related to the embodiments of the present invention are shown.
[0051] The external authentication key verification device includes: a to-be-verified external authentication key receiving unit 21, an external authentication key remaining attempt count reading unit 22, an external authentication key remaining attempt count decreasing unit 23, a to-be-verified external authentication key verification unit 24. The verification success unit 25 of the external authentication key to be verified, and the verification failure unit 26 of the external verification key to be verified. in:
[0052] The to-be-verified external authentication...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

