Information security authentication and method for its encrypting device
An encryption device, encryption algorithm technology, applied in the information field
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0107] Application 1: Banking system security transaction solution
[0108] In this scheme, we determine that the bank is the service party and a reliable party. Why do we deposit money in the bank, but in exchange for a paper book or a plastic card from the bank? It is because we trust the bank, which is based on two reasons: 1) the bank's system guarantees the safety of customers' funds; 2) the bank's reputation also guarantees the same for us. Here, we assume that these two reasons still hold and exist. All other parties involved in banking business are customers and service demanders. The customer must open a customer number in the bank and link the customer's account.
[0109] The set of one-time number passwords used by the customer. The character set of the password is set to Arabic numerals, so that almost any communication method can be used. The one-time digital signature uses 8 digital characters, and each password in the password group uses 16 numbers, which ca...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More