Supercharge Your Innovation With Domain-Expert AI Agents!

An authentication method based on usb-key

An authentication method and basic technology, applied in the usage of multiple keys/algorithms, user identity/authority verification, digital transmission system, etc., can solve problems such as PIN code leakage, to prevent PIN code leakage, improve security, avoid The effect of eavesdropping

Active Publication Date: 2021-04-27
中易通科技股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on the deficiencies in the prior art, the purpose of the present invention is to provide a safe and effective PIN code identity authentication method for USB-key to solve the problem. After the PIN code is directly encrypted and decrypted at the client and USB-key Compared with the existing PIN code leakage risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method based on usb-key
  • An authentication method based on usb-key
  • An authentication method based on usb-key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention is described below in conjunction with embodiment.

[0020] According to an embodiment of the invention, a USB-key-based authentication method includes the steps of: establishing a basic verification system between the client and the USB-key based on PKI and generating a session key; presetting the first PIN code and calculating its corresponding hash value, store the hash value in the USB-key; the client obtains the second PIN code and outputs a verification instruction, encrypts the verification instruction based on the session key to obtain the first encryption code; USB-key analysis The first encryption code is used to obtain the verification instruction, a first random code is randomly generated, and the first random code is encrypted based on the session key to obtain a second encryption code; the client parses the second encryption code to obtain Obtaining a first random code, encrypting the first random code based on the hash value to obtai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a USB-key-based authentication method and system. The method includes: preset a PIN code and calculate a hash value; the client verifies the PIN code and generates a verification instruction, and encrypts the verification instruction to obtain the first encryption code; parses the first Encrypt the password to obtain the verification instruction, generate the first random code, encrypt the first random code to obtain the second encrypted code; parse the second encrypted code to obtain the first random code, encrypt the first random code to obtain the third encrypted code, encrypt The third encrypted code is used to obtain the fourth encrypted code; the fourth encrypted code is analyzed to obtain the third encrypted code, the first random code is encrypted to obtain the fifth encrypted code, and if the fifth encrypted code is consistent with the third encrypted code, the verification is passed. The system is used to execute the method. The present invention establishes a basic verification system based on PKI / CA to improve data transmission security, processes the later verification process based on the session key of the previous verification, and can effectively avoid eavesdropping on data and prevent PIN code leakage.

Description

technical field [0001] The invention relates to the technical field of USB-key authentication, in particular to an authentication method based on a USB-key. Background technique [0002] With the development of the Internet, identity authentication has been applied in e-commerce, online banking transactions, and personal data confidentiality. Among various identity authentication methods, the smart password key (USB-key) is widely used as a safe and reliable identity authentication method. As an identity authentication device, USB-key can realize key information such as identity authentication, digital signature, access control, data encryption and decryption, and storage of keys and passwords. Usually, USB-key is used for identity authentication with the hardware itself. , the stored key and the PIN code set by the user are used as the basis for personal identity authentication. Among them, the PIN code is used as the authorization method for the user to access the hardwa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/14
CPCH04L9/14H04L9/3226H04L9/3234H04L9/3236H04L9/3263
Inventor 文明刘俊
Owner 中易通科技股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More