Unlock instant, AI-driven research and patent intelligence for your innovation.

External authentication key verification method and device

A technology of external authentication and verification methods, applied in the field of information security, can solve problems such as low security, and achieve the effect of improving security and protecting legitimate rights and interests

Active Publication Date: 2019-02-01
SHENZHEN EXCELSECU DATA TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides an external authentication key verification method and device, aiming to solve the problem of low security of the existing external authentication key verification method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • External authentication key verification method and device
  • External authentication key verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] figure 1 A flowchart of an external authentication key verification method provided by the first embodiment of the present invention is shown, and the details are as follows:

[0027] Step S11, receiving the external authentication key to be verified.

[0028] When the verification device is powered on, it will start the external authentication process and receive the external authentication key to be verified input by the user.

[0029] Step S12, read the remaining number of attempts of the external authentication key.

[0030] Specifically, the number of remaining attempts of the external authentication key stored in the memory (such as FLASH or EEPROM) is read, and the remaining number of attempts of the external authentication key has a maximum value and a minimum value, and the maximum value is set as required, usually greater than 1, The minimum value is usually 0.

[0031] Optionally, before the remaining number of attempts to read the external authentication ...

Embodiment 2

[0050] figure 2 A structural diagram of an external authentication key verification device provided by the second embodiment of the present invention is shown. The external authentication key verification device is mainly various information security devices, such as USB shields, smart cards, Bluetooth devices, etc. In the description, only the parts related to the embodiments of the present invention are shown.

[0051] The external authentication key verification device includes: a to-be-verified external authentication key receiving unit 21, an external authentication key remaining attempt count reading unit 22, an external authentication key remaining attempt count decreasing unit 23, a to-be-verified external authentication key verification unit 24. The verification success unit 25 of the external authentication key to be verified, and the verification failure unit 26 of the external verification key to be verified. in:

[0052] The to-be-verified external authentication...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is applicable to the field of information security and provides a verification method and device for an external authentication key. The method comprises the steps of receiving the external authentication key to be verified; reading the remaining number of trial times of the external authentication key; progressively decreasing the firstly read remaining number of trial times of the external authentication key; verifying the external authentication key to be verified; updating the remaining number of trial times of the external authentication key when the external authentication key to be verified is verified successfully; not updating the remaining number of trial times of the external authentication key when the external authentication key to be verified is verified unsuccessfully. By means of the method, the security of the verification process of the external authentication key can be improved.

Description

technical field [0001] The embodiments of the present invention belong to the field of information security, and in particular, relate to a method and device for verifying an external authentication key. Background technique [0002] U-Shield is a tool for electronic signature and digital authentication in online banking. It ensures the confidentiality, authenticity, integrity and non-repudiation of online transactions through operations such as encryption, decryption and digital signature. In the process of using the USB shield, verifying the external authentication key is an important authentication mechanism to ensure that the user who uses the USB shield is the owner of the USB shield. However, in the case that others obtain the USB shield or remotely control the USB shield, in order to obtain the right to use the USB shield, they will attack the external authentication key. [0003] At present, when the USB shield is verifying the external authentication key, if it det...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06Q20/40G06Q20/36
CPCG06F21/602G06Q20/3674G06Q20/401
Inventor 陈柳章
Owner SHENZHEN EXCELSECU DATA TECH