Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Remote de-locking method of information safety device

A technology for information security and remote unlocking, which is applied in the field of remote unlocking of information security device firmware, which can solve problems such as inability to unlock, troublesome information security devices, inability to complete unlocking or restore PIN codes, etc.

Active Publication Date: 2007-01-24
FEITIAN TECHNOLOGIES
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Each PIN code corresponds to a different PUK code. When the PIN code is entered incorrectly for many times, the information security device is locked and needs to be unlocked by entering the PUK code. In the prior art, some people also refer to the PUK code as SOPIN code) code verification, but If the issuer forgets the PUK code, the work of unlocking or recovering the PIN code cannot be completed, so the unlocking cannot be performed. At this time, the issuer needs to contact the manufacturer to realize the recovery of the PUK code
[0003] The traditional way is that the hardware is scrapped or the publisher returns the hardware device to the manufacturer. This process not only consumes a lot of manpower and material resources, but also the hardware device is easily damaged or lost during long-distance transmission. Equipment is causing unnecessary trouble

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote de-locking method of information safety device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] In this embodiment, the information security equipment holder is an information security equipment issuer, and the hardware recovery information generation device is in the hands of the hardware manufacturer.

[0032] Such as figure 1 As shown, after step 101 starts, in step 102, the issuer of the information security device obtains relevant hardware information from the information security device and generates authentication information. The authentication information includes hardware information and characteristic information of the issuer. is visible. The hardware information can use the serial number of the information security device, which ensures that each information security device corresponds to unique authentication information. The characteristic information of the issuer is the information used by the information security equipment manufacturer to verify the identity of the issuer.

[0033] Step 103, the information security equipment issuer sends the a...

Embodiment 2

[0050] In this embodiment, the holder of the information security device is the user who uses the information security device, and the remote unlocking process is implemented by the user himself through the hardware device and upper-layer software in hand. At this time, the user no longer needs to go to the issuer to unlock, but directly contact the information security equipment manufacturer, provide the authentication information to the information security equipment manufacturer, and obtain the unlocking information provided by the information security equipment manufacturer after passing the identity verification, realizing Unlocking of information security equipment.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a remote unlocking method for information security devices including: a holder of an information security device gets correlated hardware information from an information securuioty device then to send the authentication information containing hardware information to a hardware resuming information generation device, which generates hardware resuming information based on the authentication information and the holder realizes unlocking with the resuming information.

Description

technical field [0001] The invention relates to a remote unlocking method, in particular to a remote unlocking method for information security device firmware. Background technique [0002] Under normal circumstances, the sales model of information security equipment products that use software encryption protection and identity verification, including mobile phones and smart cards, is publisher-user, and ordinary users forget the PIN code set by themselves (the password of the information security equipment, used to Prevent others from misappropriating. When the user enables the PIN code, it is equivalent to adding a password to the information security device, and the user can modify the PIN code by himself) or after the PIN code is locked, it needs to be unlocked by the issuer or restore the original PIN code. This process requires The issuer uses the PUK (Personal Unlock Key), which is used to unlock the information security device locked due to the wrong input of the PIN...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/32H04M1/66H04Q7/32H04M11/00
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products