CN101695072A - Authentication method for information safety devices and identification system thereof - Google Patents

Authentication method for information safety devices and identification system thereof Download PDF

Info

Publication number
CN101695072A
CN101695072A CN200910236416A CN200910236416A CN101695072A CN 101695072 A CN101695072 A CN 101695072A CN 200910236416 A CN200910236416 A CN 200910236416A CN 200910236416 A CN200910236416 A CN 200910236416A CN 101695072 A CN101695072 A CN 101695072A
Authority
CN
China
Prior art keywords
trade mark
application
check code
merchant
information safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200910236416A
Other languages
Chinese (zh)
Inventor
孙吉平
韩勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Senselock Software Technology Co Ltd
Original Assignee
Beijing Senselock Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Senselock Software Technology Co Ltd filed Critical Beijing Senselock Software Technology Co Ltd
Priority to CN200910236416A priority Critical patent/CN101695072A/en
Publication of CN101695072A publication Critical patent/CN101695072A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an authentication method for information safety devices. The authentication method comprises operating the encryption calculation for random number and a provider mark which are inputted by a provider according to encryption calculation stored in advance by an information safety device to obtain provider mark check codes, writing the provider mark and the provider mark check codes in a provider mark region of the information safety device, judging whether the provider mark and the provider mark check codes stored in advance in the provider mark region of the information safety device are matched with the provider mark and the provider mark check codes extracted in advance from provider installation software by user computer software, and passing through the safety authentication of provider mark if matching. The invention further discloses an authentication system for information safety devices. The authentication method after being applied can reduce the workload and fault rate of device manufactures in the aspects of production and management, and improves the safety and the authentication safety of provider mark of the information safety device.

Description

A kind of authentication method of information safety devices and Verification System
Technical field
The present invention relates to the device identification secure authentication technology, particularly a kind of authentication method of information safety devices and Verification System.
Background technology
Equipment is in manufacturing process; equipment manufacturers are except the manufacturer that this equipment is set; usually also can be according to the demand of using the merchant; the application trade mark that this equipment is set on making the equipment of finishing is known (in the practical application; in order to improve the fail safe of equipment; the application trade mark of this equipment is known and can not arbitrarily be changed; usually use the trade mark knowledge by equipment manufacturers by the outer computer input and be cured setting); in order to identify the application merchant under this equipment, this seems particularly important in the use of information safety devices.For example, some smart cards, USB key card (USB Key, Universal Serial Band Key) information safety devices such as, equipment manufacturers need be provided with on these cards and use the trade mark knowledge, are offered the user and are distinguished the service that the different application merchant provides with this by which application merchant to identify this card.For instance, in the bank system of web, on the information safety devices USB Key that equipment manufacturers provide for industrial and commercial bank, sign " ICBC " is set, to show the service that this card is provided by industrial and commercial bank, the user uses USB Key in the place of industrial and commercial bank website, agency or appointment, use merchant's (industrial and commercial bank) server and read the sign that comprises among this USB Key, if this sign is consistent with the sign " ICBC " that application merchant server is stored in advance, then through safety certification, think that this information safety devices is legal, and corresponding service is provided.
Along with being growing more intense of social competition, each uses the consideration of merchant for factors such as security strategy, equipment costs, may select a plurality of equipment manufacturers as equipment supply side; Similarly, equipment manufacturers also may be for a plurality of application merchants provide different information safety devices, and the equipment that provides for the different application merchant is provided with the application corresponding trade mark and knows.
By as seen above-mentioned, when equipment manufacturers need provide information safety devices for a plurality of application merchants, equipment manufacturers need use the merchant at each and get ready the goods respectively, and save as respectively and use the information safety devices that the merchant manufactures out, to face very big stock and produce pressure, increase the production cost of information safety devices, and then increased the expenditure cost of using the merchant, especially identical and under the situations that just initialize routine is different at a plurality of application merchants required information safety devices.
In order to reduce the expenditure cost of using the merchant, the method that prior art adopts is the application trade mark of information safety devices to be known by using the merchant be provided with voluntarily, be that equipment manufacturers need not use the merchant at each and get ready the goods respectively and store, use after the merchant receives the information safety devices that distinct device manufacturer provides, unified by the knowledge of applications merchant server input application trade mark, the information safety devices of this reception is used the trade mark knowledge to be provided with and to be stored in this information safety devices, like this, can reduce the expenditure cost of using the merchant effectively.But, above-mentioned by using the method that the merchant is provided with the knowledge of application trade mark voluntarily, cause some lawless persons to obtain and use the required information safety devices of merchant by legal means, this application trade mark is set on the information safety devices that obtains again to be known counterfeit to carry out, subscriber computer software (obtains and installs from using the merchant in advance, carry in the software and use the application trade mark knowledge that the merchant is provided with) judge that the sign that comprises in the information safety devices is sensible consistent with the application trade mark of storage in advance, corresponding service then is provided.Like this, make the application trade mark of information safety devices know that fail safe is low, authentication security is relatively poor.
Summary of the invention
In view of this, main purpose of the present invention is to propose a kind of authentication method of information safety devices, improves the authentication security of the application trade mark knowledge of information safety devices.
Another object of the present invention is to propose a kind of Verification System of information safety devices, improve the authentication security of the application trade mark knowledge of information safety devices.
For achieving the above object, the invention provides a kind of authentication method of information safety devices, this method comprises:
Information safety devices, will be used trade mark and know and use the application merchant tag slot that trade mark is known check code writing information safety means to the random number of using merchant's input with use trade mark and know and carry out the computations trade mark that is applied and know check code according to the cryptographic algorithm of storage in advance;
Subscriber computer software judges that the application trade mark of the application merchant tag slot storage of information safety devices knows and use trade mark and know check code and know and use trade mark and know check code and whether mate from using application trade mark that merchant's install software obtains in advance, if coupling is used trade mark and is known the safety certification success.
Described cryptographic algorithm is a kind of or its combination in any in symmetry algorithm, asymmetric arithmetic and the hash algorithm.
Described to the random number of using merchant's input with use trade mark and know and carry out computations and comprise:
The application trade mark that receives is known as expressly, the random number that receives is carried out conversion as key or to the random number that receives, as key, use the cryptographic algorithm of storage in advance to calculate the random number after the conversion; Or,
The application trade mark that receives known and random number as expressly, the key that utilizes equipment manufacturers to set in advance uses the cryptographic algorithm of storing in advance to calculate.
With random number with use trade mark and know and carry out the result of calculation that computations obtains and know check code as described application trade mark; Or,
Described result of calculation is known check code through coding, cutting, simple transformation combination back as using trade mark again.
Described application trade mark is known other that comprise Chinese and English abbreviation, Chinese, the English name of using the merchant or use that the merchant selects and is used for character that self is identified.
The described application trade mark that obtains in advance know and use trade mark know check code with expressly or the mode of encrypting preserve hereof, described file comprises the local file on the subscriber computer and is stored in file on the network.
Described application trade mark is known safety certification and is successfully comprised:
If the application trade mark that reads from the application merchant tag slot of information safety devices know with in advance from use the sensible coupling of application trade mark that the merchant obtains and, the application trade mark that reads from the application merchant tag slot of information safety devices is known check code and is complementary with the application trade mark knowledge check code that obtains from application merchant install software in advance, then by using trade mark knowledge safety certification.
Described application trade mark is known safety certification and is successfully comprised:
If the application trade mark that reads from the application merchant tag slot of information safety devices is known check code and is complementary with the application trade mark knowledge check code that obtains from application merchant install software in advance, then by using trade mark knowledge safety certification.
The described application trade mark that obtains from the application merchant is in advance known and application trade mark knowledge check code comprises:
The application trade mark that subscriber computer carries according to information safety devices is known and is used the install software that trade mark is known check code, install and form subscriber computer software, and the application trade mark that will carry is known and is used trade mark and know check code and store; Or,
According to the information safety devices parameter, download the install software that carries the knowledge of application trade mark and use trade mark knowledge check code from the application corresponding merchant, install and form subscriber computer software, and the application trade mark that will carry is known and application trade mark knowledge check code is stored.
A kind of Verification System of information safety devices, this system comprises: information safety devices, uses merchant's server and runs on subscriber computer software on the subscriber computer, wherein,
Use merchant's server, be used to receive the random number of application merchant input and use the trade mark knowledge, export information safety devices to;
Information safety devices is used for the random number of using the input of merchant's server and uses trade mark and know, and carries out the computations trade mark that is applied and knows check code, will use trade mark and know and use trade mark and know the application merchant tag slot that check code is stored to information safety devices; The authentication requesting that reception subscriber computer software sends is known the application trade mark of storage and application trade mark knowledge check code is sent to subscriber computer software;
Subscriber computer software, send authentication requesting to information safety devices, the application trade mark that the acquired information safety means return is known and application trade mark knowledge check code, and the knowledge of application trade mark and the application trade mark knowledge check code that obtain from application merchant install software in advance stored with the subscriber computer local and remote compare.
Described information safety devices comprises: communication unit, ciphering unit and memory cell, wherein,
Communication unit, be used to receive random number and the application trade mark of using the input of merchant's server and know, be sent to ciphering unit, receive the authentication requesting that subscriber computer software sends, read the knowledge of application trade mark and use trade mark knowledge check code from memory cell, be sent to subscriber computer software;
Ciphering unit is used to receive random number and uses trade mark and know, and carries out the computations trade mark that is applied and knows check code, will use trade mark and know and use trade mark knowledge check code and be sent to memory cell;
Memory cell is used for storage and uses the trade mark knowledge and use trade mark knowledge check code.
Described subscriber computer software comprises: communication unit, memory cell and authentication ' unit, wherein,
Communication unit is used to receive authentication requesting, is sent to information safety devices, and the application trade mark that received information safety equipment returns is known and used trade mark and know information of check code, is sent to authentication ' unit;
Authentication ' unit, be used for sending authentication requesting to communication unit, knowledge of application trade mark and application trade mark that receiving communication unit sends are known information of check code, know with the application trade mark that reads from memory cell and use trade mark knowledge check code to mate, if coupling is used trade mark and is known the safety certification success;
Memory cell is used to store from using knowledge of application trade mark and the application trade mark knowledge check code that merchant's install software is obtained.
As seen from the above technical solutions, the authentication method of information safety devices provided by the invention and Verification System, information safety devices according to the cryptographic algorithm of storage in advance to the random number of using merchant's input with use trade mark and know and carry out computations and be verified sign indicating number, because the computational process of identifying code is carried out in information safety devices inside, and the random number of using merchant's input is maintained secrecy, if the lawless person attempts counterfeit application trade mark and knows, even adopting same application trade mark knows, know the random number of using merchant's setting owing to have no way of, the result that computations obtains also just can not improve information safety devices and use fail safe and the authentication security that trade mark is known by authentication.
Description of drawings
Fig. 1 is the authentication method schematic flow sheet of embodiment of the invention information safety devices.
Fig. 2 is the authentication method idiographic flow schematic diagram of embodiment of the invention information safety devices.
Fig. 3 is the Verification System structural representation of embodiment of the invention information safety devices.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with the accompanying drawings and the specific embodiments.
The authentication method of information safety devices provided by the invention and Verification System, input to information safety devices by the application trade mark knowledge that will carry random number, information safety devices uses cryptographic algorithm that the random number and the knowledge of application trade mark that receive are encrypted, trade mark is known and the application merchant tag slot of encrypted result writing information safety means with using, subscriber computer software is known according to the application trade mark of the application merchant tag slot storage of information safety devices and is used trade mark and know check code, knowing check code with application trade mark knowledge of obtaining from the application merchant install software that the application merchant provides in advance and application trade mark mates, if coupling is known safety certification by using trade mark.
Fig. 1 is the authentication method schematic flow sheet of embodiment of the invention information safety devices, and referring to Fig. 1, this flow process comprises:
Step 101, information safety devices, will be used trade mark and know and use the application merchant tag slot that trade mark is known check code writing information safety means to the random number of using merchant's input with use trade mark and know and carry out the computations trade mark that is applied and know check code according to the cryptographic algorithm of storage in advance;
In this step, cryptographic algorithm can be a kind of or its combination in any in symmetry algorithm, asymmetric arithmetic and the hash algorithm.The cryptographic algorithm of storing in advance in the information safety devices specifically can be provided with according to actual needs by using the merchant.In the practical application, use and discuss and information safety devices and application merchant server can be linked to each other, import random number and use the trade mark knowledge to information safety devices by application merchant server.
To the random number of using merchant's input with use trade mark and know and carry out computations and comprise: the application trade mark that will receive is known as plaintext, the random number that receives is carried out conversion as key or to the random number that receives, as key, use cryptographic algorithm to calculate the random number after the conversion; Or, the application trade mark that receives known and random number as expressly, the key that utilizes equipment manufacturers to set in advance uses cryptographic algorithm to calculate (this key can be that equipment manufacturers are provided with and maintain secrecy, and be stored in equally to use discuss in the server software).
Using trade mark knowledge check code can be the random number that receives to be known with the application trade mark carry out the result of calculation that computations obtains; Also can be that this result of calculation is known identifying code through coding, cutting, simple transformation combination back as using trade mark again.
Using trade mark knows other that comprise Chinese and English abbreviation, Chinese, the English name of using the merchant or use that the merchant selects and is used for character that self is identified etc.
The random number of using merchant's input should guarantee that the possibility of the random number repetition that the different application merchant imports is extremely low, and promptly high-quality random number is used the merchant random number of input is maintained secrecy.
In the practical application, can will use the trade mark knowledge and use trade mark and know the memory address of check code combination back as the application merchant tag slot of character string writing information safety means; Also the application trade mark can be known and use trade mark and know different memory address in the application merchant tag slot of check code difference writing information safety means.Using the merchant tag slot can be non-volatile memory block.
Step 102, subscriber computer obtains to carry and uses application trade mark that the merchant is provided with and know and use trade mark and know check code and storage from using merchant's install software in advance, whether the application trade mark of judging the application merchant tag slot storage of information safety devices is known and is used trade mark and know check code and know with the application trade mark of storage in advance and use trade mark and know check code and mate, if coupling is known safety certification by using trade mark.
In this step, subscriber computer can be an install software (using merchant's install software) of knowing and use trade mark knowledge check code according to the application trade mark that the application merchant that information safety devices carries is provided with, also can be according to the information safety devices parameter, download application trade mark knowledge that carries application merchant setting and the install software of using trade mark knowledge check code from the application corresponding merchant, install and form subscriber computer software, and the application trade mark that will carry is known and the application trade mark is known the check code preservation hereof.When the user inserted subscriber computer with information safety devices, subscriber computer can detect information safety devices and insert and notify subscriber computer software.
The application trade mark that obtains is in advance known and used trade mark knowledge check code can be to preserve hereof in mode expressly, also can be to preserve hereof to improve the fail safe of storage in the mode of encrypting.Wherein, file comprises the local file on the subscriber computer and is stored in file on the network that like this, it is safer that the application trade mark of storage is known check code.
Know safety certification and comprise by using trade mark: if the application trade mark of the application merchant tag slot of information safety devices storage know with the sensible coupling of application trade mark of storage in advance and, the application trade mark of the application merchant tag slot storage of information safety devices is known check code and is complementary with the application trade mark knowledge check code of storing in advance, then by using the safety certification that trade mark is known.
In the practical application, know check code by with random number with use trade mark and know and carry out computations and obtain owing to use trade mark, wherein having comprised the application trade mark knows, thereby, also can be when the application trade mark of the application merchant tag slot of information safety devices storage is known check code and the application trade mark of storage in advance and known check code and be complementary, then by using the safety certification that trade mark is known.
It is to obtain according to the method identical with step 101 that the application trade mark that carries in the install software is known check code, does not repeat them here.
As seen from the above-described embodiment, the authentication method of the information safety devices of the embodiment of the invention, information safety devices, will be used trade mark and know and use the application merchant tag slot that trade mark is known check code writing information safety means to the random number of using merchant's input with use trade mark and know and carry out the computations trade mark that is applied and know check code according to the cryptographic algorithm of storage in advance; Subscriber computer software obtains application from application merchant install software in advance and discusss the application trade mark knowledge that is provided with and use the also storage of trade mark knowledge check code, whether the application trade mark of judging the application merchant tag slot storage of information safety devices is known and is used trade mark and know check code and know with the application trade mark of storage in advance and use trade mark and know check code and mate, if coupling is by using the safety certification that trade mark is known.Adopt identical knowledge of application trade mark and random number to identify owing to use the merchant for each information safety devices, and use trade mark in the information safety devices internal calculation and know check code, though it uses the trade mark knowledge is disclosed, but random number is maintained secrecy, if the lawless person attempts counterfeit application trade mark and knows, even adopting same application trade mark knows, know the random number of using merchant's setting owing to have no way of, and/or, cryptographic algorithm, also just can't calculate identical application trade mark and know check code, thereby make authentication not pass through, guaranteed fail safe and authentication security that information safety devices application trade mark is known; Further, not needing equipment manufacturers is that different application merchant keeps or sets in advance different initial informations, thereby has reduced workload and the error rate of equipment manufacturers aspect production management significantly.
Based on Fig. 1, lift specific embodiment below, the authentication method of information safety devices is elaborated.
Fig. 2 is the authentication method idiographic flow schematic diagram of embodiment of the invention information safety devices, and referring to Fig. 2, this flow process comprises:
Step 201: information safety devices is connected with outer computer;
In this step, outer computer is aforesaid application merchant server.
Step 202: the application trade mark of using merchant's input oneself on computer keyboard is known (N), imports predefined random number (R) simultaneously;
Step 203: application trade mark knowledge N and random number R that computer will be used merchant's input send to information safety devices;
Step 204: information safety devices receives after N and the R, as expressly, as key, uses hmac algorithm to calculate check code (C) R N;
Step 205: information safety devices is grouped together N and C, is written to the application merchant tag slot of information safety devices;
Through after step 201~step 205, just preserved meaningful and can verify an application trade mark knowledge in the information safety devices, the setting up procedure of using the trade mark knowledge does not need device fabrication merchant's participation.
Use the merchant and adopt identical N and R to identify for each information safety devices, it is disclosed using and discussing the N that is provided with, and R maintains secrecy, and has identical sign to guarantee all information safety devices.
Step 206: the subscriber computer software detection is inserted to information safety devices, reads the N and the C that store in the application merchant tag slot of this information safety devices;
Step 207: the application trade mark of subscriber computer software reading pre-stored is known and is used trade mark and know check code;
In this step, subscriber computer can be the install software of knowing and using trade mark knowledge check code according to the application trade mark that the application merchant that information safety devices carries is provided with, also can be according to the information safety devices parameter, download application trade mark knowledge that carries application merchant setting and the install software of using trade mark knowledge check code from the application corresponding merchant, install and form subscriber computer software, and the application trade mark that will carry is known and application trade mark knowledge check code is stored.
Step 208: judge whether the N that stores in the application merchant tag slot of information safety devices is sensible together with the application trade mark of storage in advance, if identical, execution in step 209, otherwise, process ends;
Step 209: judge whether the C that stores in the application merchant tag slot of information safety devices is identical with the application trade mark knowledge check code of storage in advance, if identical, by the safety certification of application trade mark knowledge, otherwise, process ends.
Like this, owing to store in advance in the subscriber computer software and use trade mark and know (N ') and use trade mark knowledge check code (C '),, show that this information safety devices is legal if N is identical with N ' and C is also identical with C ', otherwise this information safety devices is not to use the equipment of system of deciding through consultation.
Fig. 3 is the Verification System structural representation of embodiment of the invention information safety devices, and referring to Fig. 3, this system comprises: server is discussed in information safety devices, the subscriber computer software and the application that run on the subscriber computer, wherein,
Use merchant's server, be used to receive the random number of application merchant input and use the trade mark knowledge, export information safety devices to;
Information safety devices is used for the random number of using the input of merchant's server and uses trade mark and know, and carries out the computations trade mark that is applied and knows check code, will use trade mark and know and use trade mark and know the application merchant tag slot that check code is stored to information safety devices; The authentication requesting that reception subscriber computer software sends is known the application trade mark of storage and application trade mark knowledge information of check code is sent to subscriber computer software;
Subscriber computer software, send authentication requesting to information safety devices, know and application trade mark knowledge information of check code according to the application trade mark that information safety devices returns, mate with the knowledge of application trade mark and the application trade mark knowledge check code that obtain from application merchant install software in advance, if coupling is by using the safety certification that trade mark is known.
Information safety devices comprises: communication unit, ciphering unit and memory cell, wherein,
Communication unit, be used to receive random number and the application trade mark of using the input of merchant's server and know, be sent to ciphering unit, receive the authentication requesting that subscriber computer software sends, read the knowledge of application trade mark and use trade mark knowledge check code from memory cell, be sent to subscriber computer software;
Ciphering unit is used to receive random number and uses trade mark and know, and carries out the computations trade mark that is applied and knows check code, will use trade mark and know and use trade mark knowledge check code and be sent to memory cell;
Memory cell is used for storage and uses the trade mark knowledge and use trade mark knowledge check code.
Subscriber computer software comprises: communication unit, memory cell and authentication ' unit, wherein,
Communication unit is used to receive authentication requesting, is sent to information safety devices, and the application trade mark that received information safety equipment returns is known and used trade mark and know information of check code, is sent to authentication ' unit;
Authentication ' unit, be used for sending authentication requesting to communication unit, the application trade mark that receiving communication unit sends is known and is used trade mark and know information of check code, knowing check code with application trade mark knowledge of reading from memory cell and application trade mark mates, if coupling is by using the safety certification that trade mark is known.
Memory cell is used to store in advance from using knowledge of application trade mark and the application trade mark knowledge check code that merchant's install software is obtained.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.Within the spirit and principles in the present invention all, any modification of being done, be equal to and replace and improvement etc., all should be included within protection scope of the present invention.

Claims (12)

1. the authentication method of an information safety devices is characterized in that, this method comprises:
Information safety devices, will be used trade mark and know and use the application merchant tag slot that trade mark is known check code writing information safety means to the random number of using merchant's input with use trade mark and know and carry out the computations trade mark that is applied and know check code according to the cryptographic algorithm of storage in advance;
Subscriber computer software judges that the application trade mark of the application merchant tag slot storage of information safety devices knows and use trade mark and know check code and know and use trade mark and know check code and whether mate from using application trade mark that merchant's install software obtains in advance, if coupling is used trade mark and is known the safety certification success.
2. the method for claim 1 is characterized in that, described cryptographic algorithm is a kind of or its combination in any in symmetry algorithm, asymmetric arithmetic and the hash algorithm.
3. the method for claim 1 is characterized in that, and is described to the random number of using merchant's input with use trade mark and know and carry out computations and comprise:
The application trade mark that receives is known as expressly, the random number that receives is carried out conversion as key or to the random number that receives, as key, use the cryptographic algorithm of storage in advance to calculate the random number after the conversion; Or,
The application trade mark that receives known and random number as expressly, the key that utilizes equipment manufacturers to set in advance uses the cryptographic algorithm of storing in advance to calculate.
4. as each described method of claim 1 to 3, it is characterized in that,
With random number with use trade mark and know and carry out the result of calculation that computations obtains and know check code as described application trade mark; Or,
Described result of calculation is known check code through coding, cutting, simple transformation combination back as using trade mark again.
5. method as claimed in claim 4 is characterized in that, described application trade mark is known other that comprise Chinese and English abbreviation, Chinese, the English name of using the merchant or use that the merchant selects and is used for character that self is identified.
6. method as claimed in claim 4, it is characterized in that, the described application trade mark that obtains in advance know and use trade mark know check code with expressly or the mode of encrypting preserve hereof, described file comprises the local file on the subscriber computer and is stored in file on the network.
7. method as claimed in claim 4 is characterized in that, described application trade mark is known safety certification and successfully comprised:
If the application trade mark that reads from the application merchant tag slot of information safety devices know with in advance from use the sensible coupling of application trade mark that the merchant obtains and, the application trade mark that reads from the application merchant tag slot of information safety devices is known check code and is complementary with the application trade mark knowledge check code that obtains from application merchant install software in advance, then by using trade mark knowledge safety certification.
8. method as claimed in claim 4 is characterized in that, described application trade mark is known safety certification and successfully comprised:
If the application trade mark that reads from the application merchant tag slot of information safety devices is known check code and is complementary with the application trade mark knowledge check code that obtains from application merchant install software in advance, then by using trade mark knowledge safety certification.
9. method as claimed in claim 4 is characterized in that, the described application trade mark that obtains from the application merchant is in advance known and application trade mark knowledge check code comprises:
The application trade mark that subscriber computer carries according to information safety devices is known and is used the install software that trade mark is known check code, install and form subscriber computer software, and the application trade mark that will carry is known and is used trade mark and know check code and store; Or,
According to the information safety devices parameter, download the install software that carries the knowledge of application trade mark and use trade mark knowledge check code from the application corresponding merchant, install and form subscriber computer software, and the application trade mark that will carry is known and application trade mark knowledge check code is stored.
10. the Verification System of an information safety devices is characterized in that, this system comprises: information safety devices, use merchant's server and run on subscriber computer software on the subscriber computer, wherein,
Use merchant's server, be used to receive the random number of application merchant input and use the trade mark knowledge, export information safety devices to;
Information safety devices is used for the random number of using the input of merchant's server and uses trade mark and know, and carries out the computations trade mark that is applied and knows check code, will use trade mark and know and use trade mark and know the application merchant tag slot that check code is stored to information safety devices; The authentication requesting that reception subscriber computer software sends is known the application trade mark of storage and application trade mark knowledge check code is sent to subscriber computer software;
Subscriber computer software, send authentication requesting to information safety devices, the application trade mark that the acquired information safety means return is known and application trade mark knowledge check code, and the knowledge of application trade mark and the application trade mark knowledge check code that obtain from application merchant install software in advance stored with the subscriber computer local and remote compare.
11. system as claimed in claim 10 is characterized in that, described information safety devices comprises: communication unit, ciphering unit and memory cell, wherein,
Communication unit, be used to receive random number and the application trade mark of using the input of merchant's server and know, be sent to ciphering unit, receive the authentication requesting that subscriber computer software sends, read the knowledge of application trade mark and use trade mark knowledge check code from memory cell, be sent to subscriber computer software;
Ciphering unit is used to receive random number and uses trade mark and know, and carries out the computations trade mark that is applied and knows check code, will use trade mark and know and use trade mark knowledge check code and be sent to memory cell;
Memory cell is used for storage and uses the trade mark knowledge and use trade mark knowledge check code.
12., it is characterized in that described subscriber computer software comprises as claim 10 or 11 described systems: communication unit, memory cell and authentication ' unit, wherein,
Communication unit is used to receive authentication requesting, is sent to information safety devices, and the application trade mark that received information safety equipment returns is known and used trade mark and know information of check code, is sent to authentication ' unit;
Authentication ' unit, be used for sending authentication requesting to communication unit, knowledge of application trade mark and application trade mark that receiving communication unit sends are known information of check code, know with the application trade mark that reads from memory cell and use trade mark knowledge check code to mate, if coupling is used trade mark and is known the safety certification success;
Memory cell is used to store from using knowledge of application trade mark and the application trade mark knowledge check code that merchant's install software is obtained.
CN200910236416A 2009-10-21 2009-10-21 Authentication method for information safety devices and identification system thereof Pending CN101695072A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910236416A CN101695072A (en) 2009-10-21 2009-10-21 Authentication method for information safety devices and identification system thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910236416A CN101695072A (en) 2009-10-21 2009-10-21 Authentication method for information safety devices and identification system thereof

Publications (1)

Publication Number Publication Date
CN101695072A true CN101695072A (en) 2010-04-14

Family

ID=42094012

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910236416A Pending CN101695072A (en) 2009-10-21 2009-10-21 Authentication method for information safety devices and identification system thereof

Country Status (1)

Country Link
CN (1) CN101695072A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916344A (en) * 2010-08-31 2010-12-15 北京深思洛克软件技术股份有限公司 Method and system for verifying legality of software protection device
CN102006171A (en) * 2010-11-24 2011-04-06 北京天地融科技有限公司 Method for updating internal clock of dynamic password token, token, authentication equipment and system
CN102663297A (en) * 2012-04-06 2012-09-12 天地融科技股份有限公司 Font acquiring method, character displaying device, character displaying system and electronic signature tool
WO2013086901A1 (en) * 2011-12-16 2013-06-20 华为技术有限公司 Checking method and apparatus for field replaceable unit, and communication device
CN103840942A (en) * 2014-02-19 2014-06-04 宇龙计算机通信科技(深圳)有限公司 Data protection system and method
CN104103107A (en) * 2013-04-03 2014-10-15 陈麟华 Time-varying password and time-varying password lock
CN104935430A (en) * 2014-03-17 2015-09-23 中国移动通信集团广东有限公司 Processing method and device for client business
CN106971104A (en) * 2015-09-22 2017-07-21 三星电子株式会社 Perform the method for security function and support the electronic equipment of methods described
CN110176990A (en) * 2019-05-15 2019-08-27 百度在线网络技术(北京)有限公司 Vehicle assembly replaces recognition methods, device, computer equipment and storage medium
CN110941805A (en) * 2019-11-21 2020-03-31 北京达佳互联信息技术有限公司 Identity authentication method and device

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916344B (en) * 2010-08-31 2013-09-25 北京深思洛克软件技术股份有限公司 Method and system for verifying legality of software protection device
CN101916344A (en) * 2010-08-31 2010-12-15 北京深思洛克软件技术股份有限公司 Method and system for verifying legality of software protection device
CN102006171A (en) * 2010-11-24 2011-04-06 北京天地融科技有限公司 Method for updating internal clock of dynamic password token, token, authentication equipment and system
CN102006171B (en) * 2010-11-24 2012-11-07 天地融科技股份有限公司 Method for updating internal clock of dynamic password token, token, authentication equipment and system
WO2013086901A1 (en) * 2011-12-16 2013-06-20 华为技术有限公司 Checking method and apparatus for field replaceable unit, and communication device
CN102663297A (en) * 2012-04-06 2012-09-12 天地融科技股份有限公司 Font acquiring method, character displaying device, character displaying system and electronic signature tool
CN104103107A (en) * 2013-04-03 2014-10-15 陈麟华 Time-varying password and time-varying password lock
CN103840942A (en) * 2014-02-19 2014-06-04 宇龙计算机通信科技(深圳)有限公司 Data protection system and method
CN103840942B (en) * 2014-02-19 2017-10-17 宇龙计算机通信科技(深圳)有限公司 data protection system and method
CN104935430A (en) * 2014-03-17 2015-09-23 中国移动通信集团广东有限公司 Processing method and device for client business
CN106971104A (en) * 2015-09-22 2017-07-21 三星电子株式会社 Perform the method for security function and support the electronic equipment of methods described
CN106971104B (en) * 2015-09-22 2021-12-07 三星电子株式会社 Method of performing security function and electronic device supporting the same
CN110176990A (en) * 2019-05-15 2019-08-27 百度在线网络技术(北京)有限公司 Vehicle assembly replaces recognition methods, device, computer equipment and storage medium
CN110941805A (en) * 2019-11-21 2020-03-31 北京达佳互联信息技术有限公司 Identity authentication method and device

Similar Documents

Publication Publication Date Title
CN101695072A (en) Authentication method for information safety devices and identification system thereof
CN108053001B (en) Information security authentication method and system for electronic warehouse receipt
CN102831529B (en) A kind of commodity information identification method based on radio frequency and system
EP2487629B1 (en) Secure smart poster
CN202019354U (en) Article identity authenticating and anti-counterfeiting system based on NFC (near field communication) cellphone
CN104217327B (en) A kind of financial IC card internet terminal and its method of commerce
JP4791497B2 (en) Radio frequency identification system and method
RU2018105186A (en) VERIFICATION OF PORTABLE CONSUMER DEVICES
CN102663591A (en) Product anti-counterfeiting method and system based on electronic tag
CN102855577B (en) Multiple commodity antifake check method based on cloud computing
CN102880891B (en) The RFID safety communicating method that a kind of extra lightweight RFID bidirectional identification protocol is set up
WO2013072437A1 (en) Key protected nfc tag method and system, and a method for diversify coupon on a viral distribution chain by nfc
CN104184733A (en) RFID lightweight-class bidirectional authentication method based on CRC coding
CN103218591A (en) Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same
CN101388767A (en) Certificate false proof method based on light weight digital signature scheme
CN103530785A (en) Double anti-counterfeiting system and method based on near field communication (NFC) function
CN104320250A (en) Anti-counterfeiting authentication method based on NFC chip
CN104410968A (en) Portable universal integrated circuit card (UICC) subscriber terminal equipment and identity authentication system thereof
CN104282091A (en) Bill data generating/transmitting/storing/authenticating method
CN108082723B (en) Anti-counterfeiting bottle cap based on CPU (Central processing Unit) password chip and working method thereof
CN1945591A (en) Encryting anti-fake technology for electronic label
CN102938116B (en) A kind of full link protection business method of Transaction Safety
CN108650223A (en) A kind of point-to-point authentic authentication method of the network equipment and system
CN107239936A (en) A kind of E-seal management system
CN202870898U (en) Radio frequency-based commodity information identification system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100414