Method and system for carrying out cipher management through utilization of authentication continuous effectiveness
A password management and validity technology, applied in the electronic field, can solve problems such as inability to protect users' personal information, affect user experience, and cumbersome operations
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0020] figure 1 A flow chart showing a method for password management using continuous validity of authentication, the method comprising:
[0021] Step 101: Perform identity authentication between the wearable device and the managed device, and after passing the identity authentication, the wearable device determines that the authentication with the managed device is valid;
[0022] Wearable devices can be in the form of watches, smart glasses, smart belts, etc. Managed devices can be smart cards, electronic signature tools (such as ABC KEY, ICBC U-Shield, etc.), mobile devices, etc. Managed devices need to obtain offline PIN or online PIN to achieve corresponding functions.
[0023] In this step, the identity authentication method between the wearable device and the managed device may be, for example, mutual authentication of the other party's digital certificate, or mutual authentication of the other party's signature data, or other methods that can determine whether the othe...
Embodiment 2
[0082] Correspondingly, this embodiment also provides a system for password management using continuous validity of authentication, which is used to implement the method for password management using continuous validity of authentication in the first embodiment above.
[0083] Such as figure 2 As shown, the system includes: a wearable device 21 and a managed device 22, wherein:
[0084] The wearable device 2121 is used to perform identity authentication with the managed device 22. After the identity authentication is passed, the wearable device 21 determines that the managed device 22 is in a valid authentication state; obtains the offline verification information of the managed device 22, And encrypt the offline verification information to generate the offline verification information ciphertext, store the offline verification information ciphertext; the wearable device 21 calculates the check value of the offline verification information and stores the check value of the of...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

