Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Individual cryptoprotective complex

A complex and individual technology, applied in the payment system, digital data protection, payment system structure, etc., can solve the problem that the PC card cannot be used to realize various functions, the card cannot determine the object of confidential communication, and the key replacement cannot be established, etc. question

Inactive Publication Date: 2005-09-28
德米特里·亚历克山得罗维奇·格特纳
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantages of this device and the method of settlement it uses are: the bank must permanently participate in all operations of the smart card user, requiring the presence of a network of terminals connected to the communication link; each time the user should enter his or her PIN code, the user has to submit The salesperson reports said PIN code for calculation via the Internet
A significant disadvantage of this system is that the card cannot determine with whom to establish a secure communication, since the user may reproduce the algorithm of the operation of the PC card on a public computer, the user may use as a key a set of random numbers of the necessary size, since it is not possible for other The key recorded in a user's PC card is unknown to the user's PC card, and key replacement cannot be established
Due to these shortcomings, PC cards cannot be used to implement various functions based on trust in the source of information
Also, cards such as PC cards do not have sufficiently reliable physical protection to avoid scanning information from the chip

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Individual cryptoprotective complex
  • Individual cryptoprotective complex
  • Individual cryptoprotective complex

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] A personal security complex formed in accordance with the present invention works as follows. User connects box 1 ( figure 1) and terminal 2, additionally activating the box by supplying a job start signal. The activated box outputs a user access permission request to the user. By means of the terminal device 2, the user enters his or her identification data, and the box checks the entered identification data with the user's previous input and saves it in the PROM 13 ( figure 2 data in ). In the case of consistent data, the box continues to work. In order to simplify and speed up the additionally working user identification procedure in the execution of secure operations, the user should connect the identification wristband 6 and the fixed sensor by means of wires 8 , said wristband being worn on the user's hand by means of a latch 7 . After successfully identifying the user for the first time, the box checks for the presence of the connected identification wristba...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to information protection and user identification. The technical result consists in functionality enhancement including: information encryption and decryption; electronic document authentication using an electronic digital signature; protection of electronic documents against copying, exchange of copy-protected electronic documents; settlements by means of electronic payment facilities; protection of software and databases against unauthorized copying. The inventive personal cryptoprotective complex comprises a code-carrying medium in the form of a cassette for protection of cryptographic data and a terminal device for communications with peripheral devices such as a personal computer, a telephone and a card reader. The cassettes for personal cryptoprotective complexes are embodied such that they have a unified architecture, common software and an identical secret mother code. A protective sheath of the cassette has light-reflective surfaces. A program for monitoring the integrity of the protective sheath destroys the mother code in case of an authorized access. A data processing program checks the inputted open information for presence of service symbols therein which are used as a most important tool for carrying out different cryptographic operations. Individual data of a user, including the electronic digital signature thereof, is recorded in a ROM. The inventive cryptoprotective complex comprises a user identification device in the form of an identification wristband that stores single-use access passwords.

Description

technical field [0001] The present invention relates to information protection provisions for storage of access codes, keys and passwords, user identification, secure information exchange on open communication channels, and safe realization of various settlements using electronic money and its substitutes without using In the case of asymmetric keys, conclude electronic transactions and generate electronic documents confirmed by electronic signatures, protect computer programs and databases from illegal copying, and securely transmit and exchange electronic documents while preventing copying. Background technique [0002] User identification devices for accessing protected objects are known by means of a plastic card containing a microchip and an access code entered by the user. Their disadvantage is that the access code must be entered each time, and the user must remember several different access codes when the plastic card is intended for accessing various objects that ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06F12/14G06F21/60G06F21/86G06K19/073G06Q20/12H04L9/00
CPCG06F21/602G06F21/86G06Q20/3825
Inventor 德米特里·亚历克山得罗维奇·格特纳
Owner 德米特里·亚历克山得罗维奇·格特纳
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products