CN101009562A - Method and system for improving the security of the intelligent secret key device - Google Patents

Method and system for improving the security of the intelligent secret key device Download PDF

Info

Publication number
CN101009562A
CN101009562A CN 200710063464 CN200710063464A CN101009562A CN 101009562 A CN101009562 A CN 101009562A CN 200710063464 CN200710063464 CN 200710063464 CN 200710063464 A CN200710063464 A CN 200710063464A CN 101009562 A CN101009562 A CN 101009562A
Authority
CN
China
Prior art keywords
data
key equipment
user
intelligent
cipher key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200710063464
Other languages
Chinese (zh)
Other versions
CN100566255C (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CNB2007100634647A priority Critical patent/CN100566255C/en
Publication of CN101009562A publication Critical patent/CN101009562A/en
Application granted granted Critical
Publication of CN100566255C publication Critical patent/CN100566255C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The provided method to improve the intelligent key device security, which belongs to the information security field and comprises following steps: connecting the intelligent key device and computer, receiving data from computer by the key device after identifying user ID successfully, and repeating in speech; once user conforming the repeated content, taking digital signature or enciphering data. The corresponding system comprises these modules for former operation. This invention can prevent distorting the digital signature or code, and improves the security for intelligent key device greatly.

Description

Improve the method and system of safety of intelligent key equipment
Technical field
The present invention relates to information security field, particularly a kind of method and system that improves safety of intelligent key equipment.
Background technology
Intelligent cipher key equipment is a kind of small hardware device that has processor and memory, and it adopts the double factor authentication pattern, and use is simple, cost is lower.Its built-in single-chip microcomputer or intelligent card chip can be stored user's key or digital certificate, utilizes the authentication of the built-in cryptographic algorithm realization of intelligent cipher key equipment to user identity.That intelligent cipher key equipment has is E-mail enciphered, digital signature, safety certificate, secure network login and visit SSL (Security Socket Layer, the secure socket layer protocol layer) function such as secure network, and has the feature that the private key that guarantees the user leaves hardware never, also have the characteristic of attack protection physically, fail safe is high.
Intelligent cipher key equipment uses encryption usually or comes identifying user identity based on the digital signature of public key system, and the digital signature of public key system had both guaranteed the confidentiality of information, and the information that guaranteed again has non repudiation.The principle of using digital signature to verify is: at first with being verified the private key for user signature expressly, obtain digital signature, then digital signature is sent to authentication, authentication is decrypted with the PKI that is verified the user, and last and original text compares, and verifies.Data length to the need signature during digital signature is conditional, earlier the plaintext of needs signature is carried out HASH (Hash) computing usually so be verified the user, the HASH value is imported in the intelligent cipher key equipment signed then.The HASH algorithm also claims one-way Hash algorithm, is meant under the situation of known operations result and algorithm the algorithm that can not backwards calculation goes out raw information.Hash algorithm all can produce the output of regular length to the input information (being commonly called as seed) of different length.
Said process need can not guarantee the fail safe of digital signature or enciphered data fully, because also there is potential safety hazard in computer itself, for example, when computer has suffered trojan horse, need digital signature or ciphered data to be distorted by the bottom wooden horse, be transferred to intelligent cipher key equipment then and carry out digital signature or encryption, whether the user can't judge in the intelligent cipher key equipment needs digital signature or ciphered data correct, this has had a strong impact on the fail safe of intelligent cipher key equipment, make intelligent cipher key equipment lose the value of its existence, simultaneously, also will inevitably bring unnecessary loss to the user.
Voice technology has been applied in the intelligent cipher key equipment at present, mainly as prompt facility, for example, the prompting of greeting information, operation prompt information, fault alarm, affirmation input, read-write operation indication or the like.
Summary of the invention
In order to solve in the prior art owing to needing to encrypt or the data of signature may be distorted the problem that causes safety of intelligent key equipment to reduce, the invention provides a kind of method that improves safety of intelligent key equipment, specifically may further comprise the steps:
Steps A: connect intelligent cipher key equipment and computer, and the user carried out authentication, behind authentication success, described computer receive the data of described user's input and with described transfer of data to described intelligent cipher key equipment;
Step B: described intelligent cipher key equipment receives the laggard lang sound repetition of data that described computer transmission comes, and after receiving the affirmation information of described user, the data that described intelligent cipher key equipment receives are carried out digital signature or encryption according to the content input of described intelligent cipher key equipment phonetic rehearsal.
Described step B is specially:
After described intelligent cipher key equipment receives the next data of described computer transmission, the described data of phonetic rehearsal; And after the affirmation information of when receiving the data consistent of described user, importing, the data that described intelligent cipher key equipment receives are carried out digital signature or encryption in the data of described intelligent cipher key equipment phonetic rehearsal and described input.
Described step B is specially:
Described intelligent cipher key equipment is resolved earlier and is obtained critical data, then the described critical data of phonetic rehearsal after receiving the next data of described computer transmission; And after receiving the affirmation information of importing when the critical data of described user at described intelligent cipher key equipment phonetic rehearsal conforms to the data of described input, the data that described intelligent cipher key equipment receives are carried out digital signature or encryption.
User described in the described step B utilizes input unit on the described intelligent cipher key equipment to described intelligent cipher key equipment input validation information.
Described input unit is single button, numerical key, sensor devices, fingerprint scanner, audio-switch, body temperature inductor, pressure inductor, vibrating sensor, acceleration transducer, magnetic sensors or electric field induction device.
Described step B also comprises:
Described intelligent cipher key equipment generates authentication code, the described authentication code of phonetic rehearsal then; And after receiving the confirmation code of described user, verify whether described confirmation code is consistent with the authentication code of current generation by described computer input, if consistent, then the data that described intelligent cipher key equipment is received are carried out digital signature or encryption.
Described intelligent cipher key equipment generates authentication code at random or generates different authentication codes at every turn.
The step of in the described steps A user being carried out authentication is specially:
Whether the PIN code or the human body biological characteristics of checking user input be correct.
The present invention also provides a kind of system that improves safety of intelligent key equipment, and described system comprises:
Authentication module is used for after intelligent cipher key equipment is connected to computer, and the user is carried out authentication;
Data reception module is used at described authentication module authentication success and receive the data of described user's input at described computer after, reception is by the next data of described computer transmission;
Voice module is used for receiving the laggard lang sound of data that is come by described computer transmission at described data reception module and repeats;
The confirmation receiver module is used to receive the affirmation information of described user according to the content input of described voice module phonetic rehearsal;
Intelligent key module is used for after described confirmation receiver module receives the affirmation information of described user's input the data that described data reception module receives being carried out digital signature or encryption.
Described voice module specifically is used for the described data of phonetic rehearsal after described data reception module receives the next data of described computer transmission.
Described system also comprises:
Data resolution module is used for resolving and obtaining critical data after described data reception module receives the next data of described computer transmission;
Correspondingly, described voice module also is used for the critical data that the described data resolution module of phonetic rehearsal obtains.
Described system also comprises:
The authentication code generation module is used to generate authentication code;
Correspondingly, described voice module also is used for the authentication code of the current generation of the described authentication code generation module of phonetic rehearsal;
Described confirmation receiver module specifically is used to receive the confirmation code of described user according to the authentication code input of described voice module phonetic rehearsal;
Described intelligent key module specifically is used for after described confirmation receiver module receives the confirmation code of described user's input, when this confirmation code of checking is consistent with the authentication code of the current generation of described authentication code generation module, the data that described data reception module receives are carried out digital signature or encryption.
Described system also comprises:
Input unit is used for for user's input validation information, and gives described confirmation receiver module with the affirmation message transmission of user's input.
Described input unit is single button, numerical key, sensor devices, fingerprint scanner, audio-switch, body temperature inductor, pressure inductor, vibrating sensor, acceleration transducer, magnetic sensors or electric field induction device.
The present invention utilizes voice technology, before intelligent cipher key equipment carries out digital signature or encrypts, by the function of intelligent cipher key equipment phonetic rehearsal data, confirms for the user; The user confirms by the input unit of intelligent cipher key equipment or the authentication code of intelligent cipher key equipment generation, has not only effectively prevented forbidden digit signature or encryption, and the fail safe that has greatly improved intelligent cipher key equipment.
Description of drawings
Fig. 1 is the method flow diagram that the embodiment of the invention one improves safety of intelligent key equipment;
Fig. 2 is the system construction drawing that the embodiment of the invention three improves safety of intelligent key equipment;
Fig. 3 is the system construction drawing that the embodiment of the invention four improves safety of intelligent key equipment;
Embodiment
The invention will be further described below in conjunction with the drawings and specific embodiments, but the present invention is not limited to the following examples.
Embodiment one
Identification authentication mode in the present embodiment is the PIN code authentication mode, needing digital signature or ciphered data is the information (as Bank Account Number, trade date, dealing money or the like) that the user need conclude the business, the user imports in the intelligent cipher key equipment by the information that computer will need to conclude the business, and, confirm the data that the intelligent cipher key equipment phonetic rehearsal goes out by the input unit on the intelligent cipher key equipment (as single button).
Referring to Fig. 1, the embodiment of the invention provides a kind of method that improves safety of intelligent key equipment, specifically may further comprise the steps:
Step 101: the user is connected to client computer with intelligent cipher key equipment;
Step 102: the user imports PIN code;
Step 103: whether the PIN code of intelligent cipher key equipment checking user input is correct, if correct, then execution in step 105, if incorrect and number of retries is full, then execution in step 104;
Step 104: the user is the disabled user, and intelligent cipher key equipment prompting error message finishes then;
Step 105: the user confirms as the legal holder of intelligent cipher key equipment by authentication, and client computer receives the information that the needs of user's input are concluded the business, and this Transaction Information is transferred in the intelligent cipher key equipment;
Step 106: intelligent cipher key equipment is resolved it after receiving the next data of client computer transmission, obtains critical data, and this critical data of phonetic rehearsal; This critical data is the part in the client computer transmission data of coming, data that can the representative of consumer input; For example, the data of user's input are: address name, Bank Account Number, trade date, transaction classification and dealing money, and then critical data is: Bank Account Number, transaction classification and dealing money, these three data can be represented above-mentioned five data;
Step 107: the user judges whether the critical data of intelligent cipher key equipment phonetic rehearsal conforms to the information that need conclude the business, judge promptly whether the critical data of intelligent cipher key equipment phonetic rehearsal has represented the information that need conclude the business, if then execution in step 109, otherwise execution in step 108;
Step 108: the user cancels current operation, finishes then;
Step 109: the user is by the input unit on the intelligent cipher key equipment, and promptly single button to intelligent cipher key equipment input validation information, confirms that promptly the critical data of intelligent cipher key equipment phonetic rehearsal has been represented the information that need conclude the business;
Step 110: after intelligent cipher key equipment was received user's affirmation information, the information that the needs of above-mentioned user's input that transmission comes to client computer are concluded the business was carried out the HASH computing, obtains the HASH value;
Step 111: intelligent cipher key equipment utilizes private key that the HASH value is carried out digital signature, and by client computer digital signature is sent to server end;
Step 112: the public key verifications digital signature that the server end utilization is corresponding with above-mentioned private key, if the verification passes, then execution in step 114, otherwise execution in step 113;
Step 113: server end returns error message, and authentication failed is closed the trade then;
Step 114: checking is passed through, and finishes transaction.
Input unit in the present embodiment is that single button can be replaced by numerical key, sensor devices, fingerprint scanner, audio-switch, body temperature inductor, pressure inductor, vibrating sensor, acceleration transducer, magnetic sensors or electric field induction device.Carrying out the mode of authentication can be replaced by the mode that carry out authentication by the human body biological characteristics of verifying user's input by the PIN code of checking user input.
Embodiment two
Different with embodiment one is the user confirms the intelligent cipher key equipment phonetic rehearsal by the mode of input validation sign indicating number critical data.Intelligent cipher key equipment generates an authentication code, and in the phonetic rehearsal critical data, the authentication code that phonetic rehearsal generates; The user is when carrying out the affirmation of critical data, need be according to the authentication code of phonetic rehearsal input validation sign indicating number on computers, computer is transferred to intelligent cipher key equipment with the confirmation code of user's input again, intelligent cipher key equipment compares the confirmation code of user's input and the authentication code of current generation, if the two unanimity, show that then the user has confirmed that the critical data of intelligent cipher key equipment phonetic rehearsal can represent the information that need conclude the business, the user is by checking, otherwise intelligent cipher key equipment prompting error message, the user rs authentication failure.Other processes are all identical with embodiment one, do not repeat them here.
Intelligent cipher key equipment in the present embodiment generates authentication code at random or generates different authentication codes at every turn, so greatly improved the fail safe of intelligent cipher key equipment.Even the authentication code of this generation is monitored, then supervise the hearer when carrying out the checking of back, because authentication code has regenerated and identical probability is very little, therefore supervise the hearer and be difficult to also just be difficult to utilize user profile to carry out operations such as illegal transaction by checking.
Among above-mentioned two embodiment, the content of intelligent cipher key equipment phonetic rehearsal all is the critical data through obtaining after resolving, the user confirms by judging whether critical data conforms to the data of oneself importing, this mode can replace with: intelligent cipher key equipment is not carried out the step of parsing, but directly phonetic rehearsal transmits the data of coming by computer; Correspondingly, whether the data of the data of user by judging the intelligent cipher key equipment phonetic rehearsal and its input are consistent confirms.
Embodiment three
Referring to Fig. 2, the embodiment of the invention also provides a kind of system that improves safety of intelligent key equipment, specifically comprises:
(1) authentication module is used for after intelligent cipher key equipment is connected to computer, and the user is carried out authentication;
(2) data reception module is used at the authentication module authentication success and receive the data of user's input at computer after, reception is by the next data of computer transmission;
(3) voice module is used for receiving the laggard lang sound repetition of data that the computer transmission comes at data reception module;
(4) confirmation receiver module is used to receive the affirmation information of user according to the content input of voice module phonetic rehearsal;
(5) intelligent key module is used for after the confirmation receiver module receives the affirmation information of user's input the data that the data receiver module receives being carried out digital signature or encryption.
Above-mentioned voice module specifically is used for after data reception module receives the next data of computer transmission, the data that the phonetic rehearsal data reception module receives.
The system of above-mentioned raising safety of intelligent key equipment also comprises:
Data resolution module is used for resolving and obtaining critical data after above-mentioned data reception module receives the next data of computer transmission;
Correspondingly, above-mentioned voice module also is used for the critical data that the above-mentioned data resolution module of phonetic rehearsal obtains.
The system of above-mentioned raising safety of intelligent key equipment also comprises:
The authentication code generation module is used to generate authentication code; The authentication code generation module can generate authentication code at random, also can generate different authentication codes at every turn;
Correspondingly, above-mentioned voice module also is used for the authentication code of the current generation of phonetic rehearsal authentication code generation module;
Above-mentioned confirmation receiver module specifically is used to receive the confirmation code of user according to the authentication code input of above-mentioned voice module phonetic rehearsal;
Above-mentioned intelligent key module specifically is used for after the confirmation receiver module receives the confirmation code of user's input, when this confirmation code of checking is consistent with the authentication code of the current generation of above-mentioned authentication code generation module, the data that above-mentioned data reception module receives are carried out digital signature or encryption.
Embodiment three
Referring to Fig. 3, the embodiment of the invention also provides a kind of system that improves safety of intelligent key equipment, specifically comprises:
(1) authentication module is used for after intelligent cipher key equipment is connected to computer, and the user is carried out authentication;
(2) data reception module is used at the authentication module authentication success and receive the data of user's input at computer after, reception is by the next data of computer transmission;
(3) voice module is used for receiving the laggard lang sound repetition of data that the computer transmission comes at data reception module;
(4) confirmation receiver module is used to receive the affirmation information of user according to the content input of voice module phonetic rehearsal;
(5) intelligent key module is used for after the confirmation receiver module receives the affirmation information of user's input the data that the data receiver module receives being carried out digital signature or encryption.
Above-mentioned voice module specifically is used for after data reception module receives the next data of computer transmission, the data that the phonetic rehearsal data reception module receives.
The system of above-mentioned raising safety of intelligent key equipment also comprises:
Data resolution module is used for resolving and obtaining critical data after above-mentioned data reception module receives the next data of computer transmission;
Correspondingly, above-mentioned voice module also is used for the critical data that the above-mentioned data resolution module of phonetic rehearsal obtains.
The system of above-mentioned raising safety of intelligent key equipment also comprises:
Input unit is used for for user's input validation information, and gives above-mentioned confirmation receiver module with the affirmation message transmission of user's input.
Above-mentioned input unit is single button, numerical key, sensor devices, fingerprint scanner, audio-switch, body temperature inductor, pressure inductor, vibrating sensor, acceleration transducer, magnetic sensors or electric field induction device.
Above-described embodiment is a more preferably embodiment of the present invention, and common variation that those skilled in the art carries out in the technical solution of the present invention scope and replacement all should be included in protection scope of the present invention.

Claims (14)

1. a method that improves safety of intelligent key equipment is characterized in that, said method comprising the steps of:
Steps A: connect intelligent cipher key equipment and computer, and the user carried out authentication, behind authentication success, described computer receive the data of described user's input and with described transfer of data to described intelligent cipher key equipment;
Step B: described intelligent cipher key equipment receives the laggard lang sound repetition of data that described computer transmission comes, and after receiving the affirmation information of described user, the data that described intelligent cipher key equipment receives are carried out digital signature or encryption according to the content input of described intelligent cipher key equipment phonetic rehearsal.
2. the method for raising safety of intelligent key equipment according to claim 1 is characterized in that, described step B is specially:
After described intelligent cipher key equipment receives the next data of described computer transmission, the described data of phonetic rehearsal; And after the affirmation information of when receiving the data consistent of described user, importing, the data that described intelligent cipher key equipment receives are carried out digital signature or encryption in the data of described intelligent cipher key equipment phonetic rehearsal and described input.
3. the method for raising safety of intelligent key equipment according to claim 1 is characterized in that, described step B is specially:
Described intelligent cipher key equipment is resolved earlier and is obtained critical data, then the described critical data of phonetic rehearsal after receiving the next data of described computer transmission; And after receiving the affirmation information of importing when the critical data of described user at described intelligent cipher key equipment phonetic rehearsal conforms to the data of described input, the data that described intelligent cipher key equipment receives are carried out digital signature or encryption.
4. the method for raising safety of intelligent key equipment according to claim 1 is characterized in that, user described in the described step B utilizes input unit on the described intelligent cipher key equipment to described intelligent cipher key equipment input validation information.
5. the method for raising safety of intelligent key equipment according to claim 4, it is characterized in that described input unit is single button, numerical key, sensor devices, fingerprint scanner, audio-switch, body temperature inductor, pressure inductor, vibrating sensor, acceleration transducer, magnetic sensors or electric field induction device.
6. the method for raising safety of intelligent key equipment according to claim 1 is characterized in that, described step B also comprises:
Described intelligent cipher key equipment generates authentication code, the described authentication code of phonetic rehearsal then; And after receiving the confirmation code of described user, verify whether described confirmation code is consistent with the authentication code of current generation by described computer input, if consistent, then the data that described intelligent cipher key equipment is received are carried out digital signature or encryption.
7. the method for raising safety of intelligent key equipment according to claim 6 is characterized in that, described intelligent cipher key equipment generates authentication code at random or generates different authentication codes at every turn.
8. the method for raising safety of intelligent key equipment according to claim 1 is characterized in that, the step of in the described steps A user being carried out authentication is specially:
Whether the PIN code or the human body biological characteristics of checking user input be correct.
9. a system that improves safety of intelligent key equipment is characterized in that, described system comprises:
Authentication module is used for after intelligent cipher key equipment is connected to computer, and the user is carried out authentication;
Data reception module is used at described authentication module authentication success and receive the data of described user's input at described computer after, reception is by the next data of described computer transmission;
Voice module is used for receiving the laggard lang sound of data that is come by described computer transmission at described data reception module and repeats;
The confirmation receiver module is used to receive the affirmation information of described user according to the content input of described voice module phonetic rehearsal;
Intelligent key module is used for after described confirmation receiver module receives the affirmation information of described user's input the data that described data reception module receives being carried out digital signature or encryption.
10. the system of raising safety of intelligent key equipment according to claim 9 is characterized in that, described voice module specifically is used for the described data of phonetic rehearsal after described data reception module receives the next data of described computer transmission.
11. the system of raising safety of intelligent key equipment according to claim 9 is characterized in that, described system also comprises:
Data resolution module is used for resolving and obtaining critical data after described data reception module receives the next data of described computer transmission;
Correspondingly, described voice module also is used for the critical data that the described data resolution module of phonetic rehearsal obtains.
12. the system of raising safety of intelligent key equipment according to claim 9 is characterized in that, described system also comprises:
The authentication code generation module is used to generate authentication code;
Correspondingly, described voice module also is used for the authentication code of the current generation of the described authentication code generation module of phonetic rehearsal;
Described confirmation receiver module specifically is used to receive the confirmation code of described user according to the authentication code input of described voice module phonetic rehearsal;
Described intelligent key module specifically is used for after described confirmation receiver module receives the confirmation code of described user's input, when this confirmation code of checking is consistent with the authentication code of the current generation of described authentication code generation module, the data that described data reception module receives are carried out digital signature or encryption.
13. the system of raising safety of intelligent key equipment according to claim 9 is characterized in that, described system also comprises:
Input unit is used for for user's input validation information, and gives described confirmation receiver module with the affirmation message transmission of user's input.
14. the system of raising safety of intelligent key equipment according to claim 13, it is characterized in that described input unit is single button, numerical key, sensor devices, fingerprint scanner, audio-switch, body temperature inductor, pressure inductor, vibrating sensor, acceleration transducer, magnetic sensors or electric field induction device.
CNB2007100634647A 2007-02-01 2007-02-01 Improve the method and system of safety of intelligent key equipment Expired - Fee Related CN100566255C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2007100634647A CN100566255C (en) 2007-02-01 2007-02-01 Improve the method and system of safety of intelligent key equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2007100634647A CN100566255C (en) 2007-02-01 2007-02-01 Improve the method and system of safety of intelligent key equipment

Publications (2)

Publication Number Publication Date
CN101009562A true CN101009562A (en) 2007-08-01
CN100566255C CN100566255C (en) 2009-12-02

Family

ID=38697735

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2007100634647A Expired - Fee Related CN100566255C (en) 2007-02-01 2007-02-01 Improve the method and system of safety of intelligent key equipment

Country Status (1)

Country Link
CN (1) CN100566255C (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420299B (en) * 2008-11-28 2010-09-01 北京飞天诚信科技有限公司 Method for enhancing stability of intelligent cipher key equipment and intelligent cipher key equipment
CN102136057A (en) * 2011-02-21 2011-07-27 苏州国芯科技有限公司 2.4G/13.56M safety radio frequency card reader and authentication method thereof
CN102223234A (en) * 2011-06-17 2011-10-19 飞天诚信科技股份有限公司 Electronic signature system and method based on audio communication
CN101631022B (en) * 2009-08-04 2012-06-27 飞天诚信科技股份有限公司 Signing method and system thereof
CN102710605A (en) * 2012-05-08 2012-10-03 重庆大学 Information security management and control method under cloud manufacturing environment
CN102737170A (en) * 2011-04-08 2012-10-17 杭州晟元芯片技术有限公司 USB (universal serial bus) key safety chip and voice USB key
CN101409622B (en) * 2008-11-26 2012-10-31 飞天诚信科技股份有限公司 Digital signing system and method
CN103701601A (en) * 2013-12-16 2014-04-02 天地融科技股份有限公司 Data transmission method and system
CN104519063A (en) * 2014-12-17 2015-04-15 飞天诚信科技股份有限公司 Method for reexamining signatures
WO2015104001A1 (en) * 2014-01-13 2015-07-16 天地融科技股份有限公司 Data transmission method and system
US9774602B2 (en) 2012-01-30 2017-09-26 Intel Corporation Remote trust attestation and geo-location of servers and clients in cloud computing environments
US9910972B2 (en) 2012-01-30 2018-03-06 Intel Corporation Remote trust attestation and geo-location of servers and clients in cloud computing environments
CN108270767A (en) * 2016-11-23 2018-07-10 伊迪米亚身份与安全法国公司 Data verification method
CN111510294A (en) * 2020-05-07 2020-08-07 与众科技(天津)有限公司 Method for improving office system security by using secret key

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107016541B (en) * 2017-04-14 2018-07-13 桂林微网互联信息技术有限公司 Encrypted card

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101409622B (en) * 2008-11-26 2012-10-31 飞天诚信科技股份有限公司 Digital signing system and method
CN101420299B (en) * 2008-11-28 2010-09-01 北京飞天诚信科技有限公司 Method for enhancing stability of intelligent cipher key equipment and intelligent cipher key equipment
CN101631022B (en) * 2009-08-04 2012-06-27 飞天诚信科技股份有限公司 Signing method and system thereof
CN102136057A (en) * 2011-02-21 2011-07-27 苏州国芯科技有限公司 2.4G/13.56M safety radio frequency card reader and authentication method thereof
CN102737170A (en) * 2011-04-08 2012-10-17 杭州晟元芯片技术有限公司 USB (universal serial bus) key safety chip and voice USB key
US9172536B2 (en) 2011-06-17 2015-10-27 Feitian Technologies Co., Ltd. Audio communication based electronic signature system and method thereof
CN102223234A (en) * 2011-06-17 2011-10-19 飞天诚信科技股份有限公司 Electronic signature system and method based on audio communication
CN104081713B (en) * 2012-01-30 2018-08-17 英特尔公司 The long-range trust identification of server and client computer in cloud computing environment and geographical location
US9910972B2 (en) 2012-01-30 2018-03-06 Intel Corporation Remote trust attestation and geo-location of servers and clients in cloud computing environments
US9774602B2 (en) 2012-01-30 2017-09-26 Intel Corporation Remote trust attestation and geo-location of servers and clients in cloud computing environments
CN102710605A (en) * 2012-05-08 2012-10-03 重庆大学 Information security management and control method under cloud manufacturing environment
CN103701601A (en) * 2013-12-16 2014-04-02 天地融科技股份有限公司 Data transmission method and system
WO2015104001A1 (en) * 2014-01-13 2015-07-16 天地融科技股份有限公司 Data transmission method and system
CN104519063B (en) * 2014-12-17 2017-07-14 飞天诚信科技股份有限公司 A kind of implementation method for checking signature
CN104519063A (en) * 2014-12-17 2015-04-15 飞天诚信科技股份有限公司 Method for reexamining signatures
CN108270767A (en) * 2016-11-23 2018-07-10 伊迪米亚身份与安全法国公司 Data verification method
CN108270767B (en) * 2016-11-23 2022-03-29 伊迪米亚身份与安全法国公司 Data verification method
CN111510294A (en) * 2020-05-07 2020-08-07 与众科技(天津)有限公司 Method for improving office system security by using secret key

Also Published As

Publication number Publication date
CN100566255C (en) 2009-12-02

Similar Documents

Publication Publication Date Title
CN100566255C (en) Improve the method and system of safety of intelligent key equipment
CN100566254C (en) Improve the method and system of safety of intelligent key equipment
CN105427099B (en) The method for network authorization of secure electronic transaction
CN109150548B (en) Digital certificate signing and signature checking method and system and digital certificate system
CN109067801A (en) A kind of identity identifying method, identification authentication system and computer-readable medium
AU2004288540B2 (en) Portable security transaction protocol
US9124433B2 (en) Remote authentication and transaction signatures
CN101272237B (en) Method and system for automatically generating and filling login information
US8386647B2 (en) Method for time source calibration and system thereof
EP1349034B1 (en) Service providing system in which services are provided from service provider apparatus to service user apparatus via network
CN105229965B (en) Equipment identification system and equipment authenticating method
CN107248075B (en) Method and device for realizing bidirectional authentication and transaction of intelligent key equipment
CN103905204B (en) The transmission method and Transmission system of data
CN101651675A (en) Method and system for enhancing security of network transactions
CN101897165A (en) Method of authentication of users in data processing systems
JPH113033A (en) Method for identifying client for client-server electronic transaction, smart card and server relating to the same, and method and system for deciding approval for co-operation by user and verifier
CN101765996A (en) Remote Authentication And Transaction Signatures
JP2001051596A (en) Device and method for generating/verifying data
CN101350723A (en) USB Key equipment and method for implementing verification thereof
CN101216923A (en) A system and method to enhance the data security of e-bank dealings
US10547451B2 (en) Method and device for authentication
CN114072796A (en) Hardware authentication token with remote validation
KR20170005400A (en) System and method for encryption
CN104125064B (en) A kind of dynamic cipher authentication method, client and Verification System
WO2012034339A1 (en) Method and mobile terminal for realizing network payment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: FEITIAN TECHNOLOGIES CO., LTD.

Free format text: FORMER NAME: BEIJING FEITIAN CHENGXIN SCIENCE + TECHNOLOGY CO. LTD.

CP03 Change of name, title or address

Address after: 100085 Beijing city Haidian District Xueqing Road No. 9 Ebizal building B block 17 layer

Patentee after: Feitian Technologies Co.,Ltd.

Address before: 100083, Haidian District, Xueyuan Road, No. 40 research, 7 floor, 5 floor, Beijing

Patentee before: FEITIAN TECHNOLOGIES Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091202