Unlock instant, AI-driven research and patent intelligence for your innovation.

Information security authentication and method for its encrypting device

An encryption device, encryption algorithm technology, applied in the information field

Inactive Publication Date: 2005-03-30
广州同应信息科技有限公司
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For countless customer terminals, it is impossible to have strong funds and strength to build a high-strength and secure network firewall, and even most customers know little about security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0107] Application 1: Banking system security transaction solution

[0108] In this scheme, we determine that the bank is the service party and a reliable party. Why do we deposit money in the bank, but in exchange for a paper book or a plastic card from the bank? It is because we trust the bank, which is based on two reasons: 1) the bank's system guarantees the safety of customers' funds; 2) the bank's reputation also guarantees the same for us. Here, we assume that these two reasons still hold and exist. All other parties involved in banking business are customers and service demanders. The customer must open a customer number in the bank and link the customer's account.

[0109] The set of one-time number passwords used by the customer. The character set of the password is set to Arabic numerals, so that almost any communication method can be used. The one-time digital signature uses 8 digital characters, and each password in the password group uses 16 numbers, which ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention realizes information security service, safety identity authentication conveniently and insures information integrality and validity. Main techniques utilized in the invention includes: one-off numbering cipher group, one-off digital signature, multiple step binding processing technique, controllable enciphering method and controllable enciphering device. One-off digital signature closely combined other techniques, and one-off digital signature device under control of controllable enciphering device complete procedure of information identity authentication. The invention independent on communication terminals and communication modes is a protocol of user safety and possible to realize information authentication on simple terminal and under simple communication mode. The invention realizes isolation of protocol and high security of service.

Description

technical field [0001] The solution of the invention belongs to the field of information technology and relates to information security services: identity authentication, information integrity authentication and non-repudiation. Background technique [0002] With the advancement of science and technology and the widespread application of electronic technology, there are more and more methods and products for information security services. In open communication systems, such as the Internet, many applications are based on public key cryptography. [0003] Identity authentication usually includes identity certificates, seals or handwritten signatures, user IDs and simple passwords, biometric systems (fingerprint, iris, etc. authentication), authentication tokens, smart cards, and combined authentication, as well as public key infrastructure ( PKI) digital signature. Identity certificates and handwritten signatures usually exist in physical form, which are easy to forge, diffi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G09C1/00
Inventor 刘任
Owner 广州同应信息科技有限公司