Authentication method based on USB-key

An authentication method and basic technology, applied in the usage of multiple keys/algorithms, user identity/authority verification, digital transmission systems, etc., can solve problems such as PIN code leakage, prevent PIN code leakage, avoid eavesdropping, improve safety effect

Active Publication Date: 2018-09-18
中易通科技股份有限公司
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on the deficiencies in the prior art, the purpose of the present invention is to provide a safe and effective PIN code identity authentication method for USB-key to solve the problem. After the PIN code is directly encrypted and decrypted at the client and USB-key Compared with the existing PIN code leakage risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method based on USB-key
  • Authentication method based on USB-key
  • Authentication method based on USB-key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention is described below in conjunction with embodiment.

[0020] According to an embodiment of the invention, a USB-key-based authentication method includes the steps of: establishing a basic verification system between the client and the USB-key based on PKI and generating a session key; presetting the first PIN code and calculating its corresponding hash value, store the hash value in the USB-key; the client obtains the second PIN code and outputs a verification instruction, encrypts the verification instruction based on the session key to obtain the first encryption code; USB-key analysis The first encryption code is used to obtain the verification instruction, a first random code is randomly generated, and the first random code is encrypted based on the session key to obtain a second encryption code; the client parses the second encryption code to obtain Obtaining a first random code, encrypting the first random code based on the hash value to obtai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method based on a USB-key. The method comprises the following steps: presetting a PIN code and computing a hash value; verifying the PIN code and generating averification instruction by a client, and encrypting the verification instruction to acquire a first encrypted code; analyzing the first encrypted code to acquire a verification instruction to generate a first random code, and encrypting the first random code to acquire a second encrypted code; analyzing the second encrypted code to acquire the first random code, encrypting the first random codeto acquire the third encrypted code, and encrypting the third encrypted code to acquire the fourth encrypted code; analyzing the fourth encrypted code to acquire the third encrypted code, encrypting the first random code to acquire a fifth encrypted code, and passing the verification if the fifth encrypted code is consistent with the third encrypted code. The system is used for executing the method. The data transmission security is improved by establishing a basic verification system based on PKI/CA, the later authentication procedure is processed based on a session key authenticated at earlystage, the eavesdropping on the data can be effectively avoided, thereby preventing the PIN code from leaking.

Description

technical field [0001] The invention relates to the technical field of USB-key authentication, in particular to an authentication method based on a USB-key. Background technique [0002] With the development of the Internet, identity authentication has been applied in e-commerce, online banking transactions, and personal data confidentiality. Among various identity authentication methods, the smart password key (USB-key) is widely used as a safe and reliable identity authentication method. As an identity authentication device, USB-key can realize key information such as identity authentication, digital signature, access control, data encryption and decryption, and storage of keys and passwords. Usually, USB-key is used for identity authentication with the hardware itself. , the stored key and the PIN code set by the user are used as the basis for personal identity authentication. Among them, the PIN code is used as the authorization method for the user to access the hardwa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/14
CPCH04L9/14H04L9/3226H04L9/3234H04L9/3236H04L9/3263
Inventor 文明刘俊
Owner 中易通科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products