Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for carrying out cipher management through utilization of authentication continuous effectiveness

A password management and validity technology, applied in the electronic field, can solve problems such as inability to protect users' personal information, affect user experience, and cumbersome operations

Inactive Publication Date: 2017-08-08
李明
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the user's personal information can be protected from leakage by entering the password, there are the following disadvantages: first, the operation is cumbersome, and the user must enter the password every time to view the encrypted content, which affects the user experience and is inconvenient to use; The password set by the user is too simple. Once the mobile phone is stolen, criminals can easily crack the password, thus failing to achieve the purpose of protecting the user's personal information from being leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for carrying out cipher management through utilization of authentication continuous effectiveness
  • Method and system for carrying out cipher management through utilization of authentication continuous effectiveness

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] figure 1 A flow chart showing a method for password management using continuous validity of authentication, the method comprising:

[0021] Step 101: Perform identity authentication between the wearable device and the managed device, and after passing the identity authentication, the wearable device determines that the authentication with the managed device is valid;

[0022] Wearable devices can be in the form of watches, smart glasses, smart belts, etc. Managed devices can be smart cards, electronic signature tools (such as ABC KEY, ICBC U-Shield, etc.), mobile devices, etc. Managed devices need to obtain offline PIN or online PIN to achieve corresponding functions.

[0023] In this step, the identity authentication method between the wearable device and the managed device may be, for example, mutual authentication of the other party's digital certificate, or mutual authentication of the other party's signature data, or other methods that can determine whether the othe...

Embodiment 2

[0082] Correspondingly, this embodiment also provides a system for password management using continuous validity of authentication, which is used to implement the method for password management using continuous validity of authentication in the first embodiment above.

[0083] Such as figure 2 As shown, the system includes: a wearable device 21 and a managed device 22, wherein:

[0084] The wearable device 2121 is used to perform identity authentication with the managed device 22. After the identity authentication is passed, the wearable device 21 determines that the managed device 22 is in a valid authentication state; obtains the offline verification information of the managed device 22, And encrypt the offline verification information to generate the offline verification information ciphertext, store the offline verification information ciphertext; the wearable device 21 calculates the check value of the offline verification information and stores the check value of the of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for carrying out cipher management through utilization of authentication continuous effectiveness. The method comprises the steps that when it is judged that a wearable device and a managed device are still in authentication effective states and it is detected that the wearable device is worn by a user, the wearable device determines a type of a cipher requested by a cipher obtaining request; when the type of the cipher requested by the cipher obtaining request is an offline PIN code and the wearable device judges that a to-be-checked value of offline verification information is consistent with a locally stored check value of the offline verification information, the wearable device sends first verification information to the managed device; and when the type of the cipher requested by the cipher obtaining request is an online PIN code and the wearable device judges that a to-be-checked value of the online PIN code is consistent with the check value of the online PIN code, the wearable device sends second verification information to the managed device.

Description

technical field [0001] The present invention relates to the field of electronic technology, in particular to a method and system for password management using continuous validity of authentication. Background technique [0002] With the development of mobile communication technology and smart mobile terminals, more and more personal information is stored on mobile terminals such as smart phones, IPADs and other personal devices, and some personal information is private to users holding mobile terminals , such as text messages, call records, contacts, photos, social software, financial software, etc. If the user loses the smart phone, the information in the smart phone will be obtained by criminals, thereby causing losses to the user. Therefore, users have higher and higher requirements on the security of mobile terminals. [0003] In related technologies, usually in order to protect the user's personal information from being leaked, the user will set an unlock password for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/088H04L9/0897H04L9/3226H04L9/3234
Inventor 李明
Owner 李明