Information processing method, system and device for enhancing access security

A device and dynamic device technology, applied in the field of information security, can solve the problem of no multi-dynamic device verification shared code, etc., to prevent man-in-the-middle attacks and integrity damage, ensure consistency, and improve the effect of security level

Inactive Publication Date: 2016-07-06
BEIJING DONGSHI TECH CO LTD
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In the existing methods, there is no access verification technology based on multiple dynamic device verification shared codes, dynamic key ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing method, system and device for enhancing access security
  • Information processing method, system and device for enhancing access security
  • Information processing method, system and device for enhancing access security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0157] Such as figure 1 As shown, it is a schematic structural diagram of an information processing system provided by an embodiment of the present invention, including a device application relationship client 11, an independent security unit 12, a device application relationship verification server 13, an application providing server 14, and an application client 15, wherein:

[0158] Device application relationship client 11 refers to the general term for all software collections that run on the user end device to provide user applications with the service of initiating device access credentials, local information security encryption and decryption services, verification and signature functions, and provide UI exchanges with users at the same time , responsible for working directly with the security independent unit, communicating with the device application relationship verification server, assisting or directly generating keys, updating; providing security authentication o...

Embodiment 2

[0164] In specific implementation, such as figure 2 In the figure is the flow chart of device application relationship client registration described in the embodiment of the present invention;

[0165] Step S21 generates the first dynamic device verification shared code, and step S24 generates the second dynamic device verification shared code. The shared code generation algorithm can use the ECDH algorithm, the Diffie-Hellman key exchange algorithm, or the reliable delivery of the RSA key; better use ECDH algorithm can obtain higher calculation efficiency and shorter key length under the same security level;

[0166] Steps S21 and S25 need to calculate and save the key seed information on the device application relationship client and the independent security unit, and then generate the final key based on the seed information as the first dynamic device verification shared code and the second dynamic device verification shared code ;

[0167] Method 1: The device applicati...

Embodiment 3

[0189] The present invention can be used for verification of device application relationship of public network Internet users, user access device and application relationship verification;

[0190] Such as image 3 It is an email application account authorization application relationship client device process:

[0191] During specific implementation, the email application client only talks to the device application relationship client,

[0192] Step S31 calculates the message body certificate, and the device application relationship client uses such as figure 2 Steps S210, S211, and S212 complete the calculation of the requested message body certificate, return the M certificate to the application client through S32, and the email application client uses this certificate as the current message authentication part to be included in the S33 authorization request message;

[0193] During specific implementation, the information in the authorization request message in steps S33...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information security, and especially relates to an information processing method, system and device for enhancing access security. According to the method, the system and the related device disclosed by the invention, a user access security technique of an Internet application is improved; usability and universality problems are solved; an extensible method and device capable of generating client and server authentication, management and identification online is provided; a technical method for registering a client device is provided for automatically associating identification and a secret key; security verification applications are provided for the application by the infrastructure; the applications comprise a authorization technical method of the application, a method for updating the secret keys of the client and the server and a method for automatically obtaining one-time valid access certificate when the application is accessed. The system comprises an application server and a device and application relationship verification server; wherein the client device comprises an application client, a device and application relationship client and an independent security unit; the device and application relationship verification server comprises following functions and modules that a device management module receives device register, a device and application authorization management module manages device and application relationships; a device updating module initiates a system secret key updating process; and a device and application relationship verification module judges a received access certificate.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an information processing method, system and equipment for enhancing access security. Background technique [0002] Internet users are vulnerable to the threat of the theft of private information such as application user identities and passwords. Intruders use the obtained private information to access user private information on unauthorized third-party devices, consume or transfer money and other infringement operations. The method of the present invention uses the account to access the verification mechanism on the computer smart device authorized to access. After the password is stolen, the third-party device cannot be accessed because it is not authorized. Password leaks and timely remediation of security breaches. [0003] At present, there are new technologies to enhance the security of users when logging in, such as the secondary password verificatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/068H04L63/0846H04L63/0884
Inventor 郭铮铮
Owner BEIJING DONGSHI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products