CN101695072A - Authentication method for information safety devices and identification system thereof - Google Patents
Authentication method for information safety devices and identification system thereof Download PDFInfo
- Publication number
- CN101695072A CN101695072A CN200910236416A CN200910236416A CN101695072A CN 101695072 A CN101695072 A CN 101695072A CN 200910236416 A CN200910236416 A CN 200910236416A CN 200910236416 A CN200910236416 A CN 200910236416A CN 101695072 A CN101695072 A CN 101695072A
- Authority
- CN
- China
- Prior art keywords
- trade mark
- application
- check code
- merchant
- information safety
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses an authentication method for information safety devices. The authentication method comprises operating the encryption calculation for random number and a provider mark which are inputted by a provider according to encryption calculation stored in advance by an information safety device to obtain provider mark check codes, writing the provider mark and the provider mark check codes in a provider mark region of the information safety device, judging whether the provider mark and the provider mark check codes stored in advance in the provider mark region of the information safety device are matched with the provider mark and the provider mark check codes extracted in advance from provider installation software by user computer software, and passing through the safety authentication of provider mark if matching. The invention further discloses an authentication system for information safety devices. The authentication method after being applied can reduce the workload and fault rate of device manufactures in the aspects of production and management, and improves the safety and the authentication safety of provider mark of the information safety device.
Description
Technical field
The present invention relates to the device identification secure authentication technology, particularly a kind of authentication method of information safety devices and Verification System.
Background technology
Equipment is in manufacturing process; equipment manufacturers are except the manufacturer that this equipment is set; usually also can be according to the demand of using the merchant; the application trade mark that this equipment is set on making the equipment of finishing is known (in the practical application; in order to improve the fail safe of equipment; the application trade mark of this equipment is known and can not arbitrarily be changed; usually use the trade mark knowledge by equipment manufacturers by the outer computer input and be cured setting); in order to identify the application merchant under this equipment, this seems particularly important in the use of information safety devices.For example, some smart cards, USB key card (USB Key, Universal Serial Band Key) information safety devices such as, equipment manufacturers need be provided with on these cards and use the trade mark knowledge, are offered the user and are distinguished the service that the different application merchant provides with this by which application merchant to identify this card.For instance, in the bank system of web, on the information safety devices USB Key that equipment manufacturers provide for industrial and commercial bank, sign " ICBC " is set, to show the service that this card is provided by industrial and commercial bank, the user uses USB Key in the place of industrial and commercial bank website, agency or appointment, use merchant's (industrial and commercial bank) server and read the sign that comprises among this USB Key, if this sign is consistent with the sign " ICBC " that application merchant server is stored in advance, then through safety certification, think that this information safety devices is legal, and corresponding service is provided.
Along with being growing more intense of social competition, each uses the consideration of merchant for factors such as security strategy, equipment costs, may select a plurality of equipment manufacturers as equipment supply side; Similarly, equipment manufacturers also may be for a plurality of application merchants provide different information safety devices, and the equipment that provides for the different application merchant is provided with the application corresponding trade mark and knows.
By as seen above-mentioned, when equipment manufacturers need provide information safety devices for a plurality of application merchants, equipment manufacturers need use the merchant at each and get ready the goods respectively, and save as respectively and use the information safety devices that the merchant manufactures out, to face very big stock and produce pressure, increase the production cost of information safety devices, and then increased the expenditure cost of using the merchant, especially identical and under the situations that just initialize routine is different at a plurality of application merchants required information safety devices.
In order to reduce the expenditure cost of using the merchant, the method that prior art adopts is the application trade mark of information safety devices to be known by using the merchant be provided with voluntarily, be that equipment manufacturers need not use the merchant at each and get ready the goods respectively and store, use after the merchant receives the information safety devices that distinct device manufacturer provides, unified by the knowledge of applications merchant server input application trade mark, the information safety devices of this reception is used the trade mark knowledge to be provided with and to be stored in this information safety devices, like this, can reduce the expenditure cost of using the merchant effectively.But, above-mentioned by using the method that the merchant is provided with the knowledge of application trade mark voluntarily, cause some lawless persons to obtain and use the required information safety devices of merchant by legal means, this application trade mark is set on the information safety devices that obtains again to be known counterfeit to carry out, subscriber computer software (obtains and installs from using the merchant in advance, carry in the software and use the application trade mark knowledge that the merchant is provided with) judge that the sign that comprises in the information safety devices is sensible consistent with the application trade mark of storage in advance, corresponding service then is provided.Like this, make the application trade mark of information safety devices know that fail safe is low, authentication security is relatively poor.
Summary of the invention
In view of this, main purpose of the present invention is to propose a kind of authentication method of information safety devices, improves the authentication security of the application trade mark knowledge of information safety devices.
Another object of the present invention is to propose a kind of Verification System of information safety devices, improve the authentication security of the application trade mark knowledge of information safety devices.
For achieving the above object, the invention provides a kind of authentication method of information safety devices, this method comprises:
Information safety devices, will be used trade mark and know and use the application merchant tag slot that trade mark is known check code writing information safety means to the random number of using merchant's input with use trade mark and know and carry out the computations trade mark that is applied and know check code according to the cryptographic algorithm of storage in advance;
Subscriber computer software judges that the application trade mark of the application merchant tag slot storage of information safety devices knows and use trade mark and know check code and know and use trade mark and know check code and whether mate from using application trade mark that merchant's install software obtains in advance, if coupling is used trade mark and is known the safety certification success.
Described cryptographic algorithm is a kind of or its combination in any in symmetry algorithm, asymmetric arithmetic and the hash algorithm.
Described to the random number of using merchant's input with use trade mark and know and carry out computations and comprise:
The application trade mark that receives is known as expressly, the random number that receives is carried out conversion as key or to the random number that receives, as key, use the cryptographic algorithm of storage in advance to calculate the random number after the conversion; Or,
The application trade mark that receives known and random number as expressly, the key that utilizes equipment manufacturers to set in advance uses the cryptographic algorithm of storing in advance to calculate.
With random number with use trade mark and know and carry out the result of calculation that computations obtains and know check code as described application trade mark; Or,
Described result of calculation is known check code through coding, cutting, simple transformation combination back as using trade mark again.
Described application trade mark is known other that comprise Chinese and English abbreviation, Chinese, the English name of using the merchant or use that the merchant selects and is used for character that self is identified.
The described application trade mark that obtains in advance know and use trade mark know check code with expressly or the mode of encrypting preserve hereof, described file comprises the local file on the subscriber computer and is stored in file on the network.
Described application trade mark is known safety certification and is successfully comprised:
If the application trade mark that reads from the application merchant tag slot of information safety devices know with in advance from use the sensible coupling of application trade mark that the merchant obtains and, the application trade mark that reads from the application merchant tag slot of information safety devices is known check code and is complementary with the application trade mark knowledge check code that obtains from application merchant install software in advance, then by using trade mark knowledge safety certification.
Described application trade mark is known safety certification and is successfully comprised:
If the application trade mark that reads from the application merchant tag slot of information safety devices is known check code and is complementary with the application trade mark knowledge check code that obtains from application merchant install software in advance, then by using trade mark knowledge safety certification.
The described application trade mark that obtains from the application merchant is in advance known and application trade mark knowledge check code comprises:
The application trade mark that subscriber computer carries according to information safety devices is known and is used the install software that trade mark is known check code, install and form subscriber computer software, and the application trade mark that will carry is known and is used trade mark and know check code and store; Or,
According to the information safety devices parameter, download the install software that carries the knowledge of application trade mark and use trade mark knowledge check code from the application corresponding merchant, install and form subscriber computer software, and the application trade mark that will carry is known and application trade mark knowledge check code is stored.
A kind of Verification System of information safety devices, this system comprises: information safety devices, uses merchant's server and runs on subscriber computer software on the subscriber computer, wherein,
Use merchant's server, be used to receive the random number of application merchant input and use the trade mark knowledge, export information safety devices to;
Information safety devices is used for the random number of using the input of merchant's server and uses trade mark and know, and carries out the computations trade mark that is applied and knows check code, will use trade mark and know and use trade mark and know the application merchant tag slot that check code is stored to information safety devices; The authentication requesting that reception subscriber computer software sends is known the application trade mark of storage and application trade mark knowledge check code is sent to subscriber computer software;
Subscriber computer software, send authentication requesting to information safety devices, the application trade mark that the acquired information safety means return is known and application trade mark knowledge check code, and the knowledge of application trade mark and the application trade mark knowledge check code that obtain from application merchant install software in advance stored with the subscriber computer local and remote compare.
Described information safety devices comprises: communication unit, ciphering unit and memory cell, wherein,
Communication unit, be used to receive random number and the application trade mark of using the input of merchant's server and know, be sent to ciphering unit, receive the authentication requesting that subscriber computer software sends, read the knowledge of application trade mark and use trade mark knowledge check code from memory cell, be sent to subscriber computer software;
Ciphering unit is used to receive random number and uses trade mark and know, and carries out the computations trade mark that is applied and knows check code, will use trade mark and know and use trade mark knowledge check code and be sent to memory cell;
Memory cell is used for storage and uses the trade mark knowledge and use trade mark knowledge check code.
Described subscriber computer software comprises: communication unit, memory cell and authentication ' unit, wherein,
Communication unit is used to receive authentication requesting, is sent to information safety devices, and the application trade mark that received information safety equipment returns is known and used trade mark and know information of check code, is sent to authentication ' unit;
Authentication ' unit, be used for sending authentication requesting to communication unit, knowledge of application trade mark and application trade mark that receiving communication unit sends are known information of check code, know with the application trade mark that reads from memory cell and use trade mark knowledge check code to mate, if coupling is used trade mark and is known the safety certification success;
Memory cell is used to store from using knowledge of application trade mark and the application trade mark knowledge check code that merchant's install software is obtained.
As seen from the above technical solutions, the authentication method of information safety devices provided by the invention and Verification System, information safety devices according to the cryptographic algorithm of storage in advance to the random number of using merchant's input with use trade mark and know and carry out computations and be verified sign indicating number, because the computational process of identifying code is carried out in information safety devices inside, and the random number of using merchant's input is maintained secrecy, if the lawless person attempts counterfeit application trade mark and knows, even adopting same application trade mark knows, know the random number of using merchant's setting owing to have no way of, the result that computations obtains also just can not improve information safety devices and use fail safe and the authentication security that trade mark is known by authentication.
Description of drawings
Fig. 1 is the authentication method schematic flow sheet of embodiment of the invention information safety devices.
Fig. 2 is the authentication method idiographic flow schematic diagram of embodiment of the invention information safety devices.
Fig. 3 is the Verification System structural representation of embodiment of the invention information safety devices.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, the present invention is described in further detail below in conjunction with the accompanying drawings and the specific embodiments.
The authentication method of information safety devices provided by the invention and Verification System, input to information safety devices by the application trade mark knowledge that will carry random number, information safety devices uses cryptographic algorithm that the random number and the knowledge of application trade mark that receive are encrypted, trade mark is known and the application merchant tag slot of encrypted result writing information safety means with using, subscriber computer software is known according to the application trade mark of the application merchant tag slot storage of information safety devices and is used trade mark and know check code, knowing check code with application trade mark knowledge of obtaining from the application merchant install software that the application merchant provides in advance and application trade mark mates, if coupling is known safety certification by using trade mark.
Fig. 1 is the authentication method schematic flow sheet of embodiment of the invention information safety devices, and referring to Fig. 1, this flow process comprises:
Step 101, information safety devices, will be used trade mark and know and use the application merchant tag slot that trade mark is known check code writing information safety means to the random number of using merchant's input with use trade mark and know and carry out the computations trade mark that is applied and know check code according to the cryptographic algorithm of storage in advance;
In this step, cryptographic algorithm can be a kind of or its combination in any in symmetry algorithm, asymmetric arithmetic and the hash algorithm.The cryptographic algorithm of storing in advance in the information safety devices specifically can be provided with according to actual needs by using the merchant.In the practical application, use and discuss and information safety devices and application merchant server can be linked to each other, import random number and use the trade mark knowledge to information safety devices by application merchant server.
To the random number of using merchant's input with use trade mark and know and carry out computations and comprise: the application trade mark that will receive is known as plaintext, the random number that receives is carried out conversion as key or to the random number that receives, as key, use cryptographic algorithm to calculate the random number after the conversion; Or, the application trade mark that receives known and random number as expressly, the key that utilizes equipment manufacturers to set in advance uses cryptographic algorithm to calculate (this key can be that equipment manufacturers are provided with and maintain secrecy, and be stored in equally to use discuss in the server software).
Using trade mark knowledge check code can be the random number that receives to be known with the application trade mark carry out the result of calculation that computations obtains; Also can be that this result of calculation is known identifying code through coding, cutting, simple transformation combination back as using trade mark again.
Using trade mark knows other that comprise Chinese and English abbreviation, Chinese, the English name of using the merchant or use that the merchant selects and is used for character that self is identified etc.
The random number of using merchant's input should guarantee that the possibility of the random number repetition that the different application merchant imports is extremely low, and promptly high-quality random number is used the merchant random number of input is maintained secrecy.
In the practical application, can will use the trade mark knowledge and use trade mark and know the memory address of check code combination back as the application merchant tag slot of character string writing information safety means; Also the application trade mark can be known and use trade mark and know different memory address in the application merchant tag slot of check code difference writing information safety means.Using the merchant tag slot can be non-volatile memory block.
Step 102, subscriber computer obtains to carry and uses application trade mark that the merchant is provided with and know and use trade mark and know check code and storage from using merchant's install software in advance, whether the application trade mark of judging the application merchant tag slot storage of information safety devices is known and is used trade mark and know check code and know with the application trade mark of storage in advance and use trade mark and know check code and mate, if coupling is known safety certification by using trade mark.
In this step, subscriber computer can be an install software (using merchant's install software) of knowing and use trade mark knowledge check code according to the application trade mark that the application merchant that information safety devices carries is provided with, also can be according to the information safety devices parameter, download application trade mark knowledge that carries application merchant setting and the install software of using trade mark knowledge check code from the application corresponding merchant, install and form subscriber computer software, and the application trade mark that will carry is known and the application trade mark is known the check code preservation hereof.When the user inserted subscriber computer with information safety devices, subscriber computer can detect information safety devices and insert and notify subscriber computer software.
The application trade mark that obtains is in advance known and used trade mark knowledge check code can be to preserve hereof in mode expressly, also can be to preserve hereof to improve the fail safe of storage in the mode of encrypting.Wherein, file comprises the local file on the subscriber computer and is stored in file on the network that like this, it is safer that the application trade mark of storage is known check code.
Know safety certification and comprise by using trade mark: if the application trade mark of the application merchant tag slot of information safety devices storage know with the sensible coupling of application trade mark of storage in advance and, the application trade mark of the application merchant tag slot storage of information safety devices is known check code and is complementary with the application trade mark knowledge check code of storing in advance, then by using the safety certification that trade mark is known.
In the practical application, know check code by with random number with use trade mark and know and carry out computations and obtain owing to use trade mark, wherein having comprised the application trade mark knows, thereby, also can be when the application trade mark of the application merchant tag slot of information safety devices storage is known check code and the application trade mark of storage in advance and known check code and be complementary, then by using the safety certification that trade mark is known.
It is to obtain according to the method identical with step 101 that the application trade mark that carries in the install software is known check code, does not repeat them here.
As seen from the above-described embodiment, the authentication method of the information safety devices of the embodiment of the invention, information safety devices, will be used trade mark and know and use the application merchant tag slot that trade mark is known check code writing information safety means to the random number of using merchant's input with use trade mark and know and carry out the computations trade mark that is applied and know check code according to the cryptographic algorithm of storage in advance; Subscriber computer software obtains application from application merchant install software in advance and discusss the application trade mark knowledge that is provided with and use the also storage of trade mark knowledge check code, whether the application trade mark of judging the application merchant tag slot storage of information safety devices is known and is used trade mark and know check code and know with the application trade mark of storage in advance and use trade mark and know check code and mate, if coupling is by using the safety certification that trade mark is known.Adopt identical knowledge of application trade mark and random number to identify owing to use the merchant for each information safety devices, and use trade mark in the information safety devices internal calculation and know check code, though it uses the trade mark knowledge is disclosed, but random number is maintained secrecy, if the lawless person attempts counterfeit application trade mark and knows, even adopting same application trade mark knows, know the random number of using merchant's setting owing to have no way of, and/or, cryptographic algorithm, also just can't calculate identical application trade mark and know check code, thereby make authentication not pass through, guaranteed fail safe and authentication security that information safety devices application trade mark is known; Further, not needing equipment manufacturers is that different application merchant keeps or sets in advance different initial informations, thereby has reduced workload and the error rate of equipment manufacturers aspect production management significantly.
Based on Fig. 1, lift specific embodiment below, the authentication method of information safety devices is elaborated.
Fig. 2 is the authentication method idiographic flow schematic diagram of embodiment of the invention information safety devices, and referring to Fig. 2, this flow process comprises:
Step 201: information safety devices is connected with outer computer;
In this step, outer computer is aforesaid application merchant server.
Step 202: the application trade mark of using merchant's input oneself on computer keyboard is known (N), imports predefined random number (R) simultaneously;
Step 203: application trade mark knowledge N and random number R that computer will be used merchant's input send to information safety devices;
Step 204: information safety devices receives after N and the R, as expressly, as key, uses hmac algorithm to calculate check code (C) R N;
Step 205: information safety devices is grouped together N and C, is written to the application merchant tag slot of information safety devices;
Through after step 201~step 205, just preserved meaningful and can verify an application trade mark knowledge in the information safety devices, the setting up procedure of using the trade mark knowledge does not need device fabrication merchant's participation.
Use the merchant and adopt identical N and R to identify for each information safety devices, it is disclosed using and discussing the N that is provided with, and R maintains secrecy, and has identical sign to guarantee all information safety devices.
Step 206: the subscriber computer software detection is inserted to information safety devices, reads the N and the C that store in the application merchant tag slot of this information safety devices;
Step 207: the application trade mark of subscriber computer software reading pre-stored is known and is used trade mark and know check code;
In this step, subscriber computer can be the install software of knowing and using trade mark knowledge check code according to the application trade mark that the application merchant that information safety devices carries is provided with, also can be according to the information safety devices parameter, download application trade mark knowledge that carries application merchant setting and the install software of using trade mark knowledge check code from the application corresponding merchant, install and form subscriber computer software, and the application trade mark that will carry is known and application trade mark knowledge check code is stored.
Step 208: judge whether the N that stores in the application merchant tag slot of information safety devices is sensible together with the application trade mark of storage in advance, if identical, execution in step 209, otherwise, process ends;
Step 209: judge whether the C that stores in the application merchant tag slot of information safety devices is identical with the application trade mark knowledge check code of storage in advance, if identical, by the safety certification of application trade mark knowledge, otherwise, process ends.
Like this, owing to store in advance in the subscriber computer software and use trade mark and know (N ') and use trade mark knowledge check code (C '),, show that this information safety devices is legal if N is identical with N ' and C is also identical with C ', otherwise this information safety devices is not to use the equipment of system of deciding through consultation.
Fig. 3 is the Verification System structural representation of embodiment of the invention information safety devices, and referring to Fig. 3, this system comprises: server is discussed in information safety devices, the subscriber computer software and the application that run on the subscriber computer, wherein,
Use merchant's server, be used to receive the random number of application merchant input and use the trade mark knowledge, export information safety devices to;
Information safety devices is used for the random number of using the input of merchant's server and uses trade mark and know, and carries out the computations trade mark that is applied and knows check code, will use trade mark and know and use trade mark and know the application merchant tag slot that check code is stored to information safety devices; The authentication requesting that reception subscriber computer software sends is known the application trade mark of storage and application trade mark knowledge information of check code is sent to subscriber computer software;
Subscriber computer software, send authentication requesting to information safety devices, know and application trade mark knowledge information of check code according to the application trade mark that information safety devices returns, mate with the knowledge of application trade mark and the application trade mark knowledge check code that obtain from application merchant install software in advance, if coupling is by using the safety certification that trade mark is known.
Information safety devices comprises: communication unit, ciphering unit and memory cell, wherein,
Communication unit, be used to receive random number and the application trade mark of using the input of merchant's server and know, be sent to ciphering unit, receive the authentication requesting that subscriber computer software sends, read the knowledge of application trade mark and use trade mark knowledge check code from memory cell, be sent to subscriber computer software;
Ciphering unit is used to receive random number and uses trade mark and know, and carries out the computations trade mark that is applied and knows check code, will use trade mark and know and use trade mark knowledge check code and be sent to memory cell;
Memory cell is used for storage and uses the trade mark knowledge and use trade mark knowledge check code.
Subscriber computer software comprises: communication unit, memory cell and authentication ' unit, wherein,
Communication unit is used to receive authentication requesting, is sent to information safety devices, and the application trade mark that received information safety equipment returns is known and used trade mark and know information of check code, is sent to authentication ' unit;
Authentication ' unit, be used for sending authentication requesting to communication unit, the application trade mark that receiving communication unit sends is known and is used trade mark and know information of check code, knowing check code with application trade mark knowledge of reading from memory cell and application trade mark mates, if coupling is by using the safety certification that trade mark is known.
Memory cell is used to store in advance from using knowledge of application trade mark and the application trade mark knowledge check code that merchant's install software is obtained.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.Within the spirit and principles in the present invention all, any modification of being done, be equal to and replace and improvement etc., all should be included within protection scope of the present invention.
Claims (12)
1. the authentication method of an information safety devices is characterized in that, this method comprises:
Information safety devices, will be used trade mark and know and use the application merchant tag slot that trade mark is known check code writing information safety means to the random number of using merchant's input with use trade mark and know and carry out the computations trade mark that is applied and know check code according to the cryptographic algorithm of storage in advance;
Subscriber computer software judges that the application trade mark of the application merchant tag slot storage of information safety devices knows and use trade mark and know check code and know and use trade mark and know check code and whether mate from using application trade mark that merchant's install software obtains in advance, if coupling is used trade mark and is known the safety certification success.
2. the method for claim 1 is characterized in that, described cryptographic algorithm is a kind of or its combination in any in symmetry algorithm, asymmetric arithmetic and the hash algorithm.
3. the method for claim 1 is characterized in that, and is described to the random number of using merchant's input with use trade mark and know and carry out computations and comprise:
The application trade mark that receives is known as expressly, the random number that receives is carried out conversion as key or to the random number that receives, as key, use the cryptographic algorithm of storage in advance to calculate the random number after the conversion; Or,
The application trade mark that receives known and random number as expressly, the key that utilizes equipment manufacturers to set in advance uses the cryptographic algorithm of storing in advance to calculate.
4. as each described method of claim 1 to 3, it is characterized in that,
With random number with use trade mark and know and carry out the result of calculation that computations obtains and know check code as described application trade mark; Or,
Described result of calculation is known check code through coding, cutting, simple transformation combination back as using trade mark again.
5. method as claimed in claim 4 is characterized in that, described application trade mark is known other that comprise Chinese and English abbreviation, Chinese, the English name of using the merchant or use that the merchant selects and is used for character that self is identified.
6. method as claimed in claim 4, it is characterized in that, the described application trade mark that obtains in advance know and use trade mark know check code with expressly or the mode of encrypting preserve hereof, described file comprises the local file on the subscriber computer and is stored in file on the network.
7. method as claimed in claim 4 is characterized in that, described application trade mark is known safety certification and successfully comprised:
If the application trade mark that reads from the application merchant tag slot of information safety devices know with in advance from use the sensible coupling of application trade mark that the merchant obtains and, the application trade mark that reads from the application merchant tag slot of information safety devices is known check code and is complementary with the application trade mark knowledge check code that obtains from application merchant install software in advance, then by using trade mark knowledge safety certification.
8. method as claimed in claim 4 is characterized in that, described application trade mark is known safety certification and successfully comprised:
If the application trade mark that reads from the application merchant tag slot of information safety devices is known check code and is complementary with the application trade mark knowledge check code that obtains from application merchant install software in advance, then by using trade mark knowledge safety certification.
9. method as claimed in claim 4 is characterized in that, the described application trade mark that obtains from the application merchant is in advance known and application trade mark knowledge check code comprises:
The application trade mark that subscriber computer carries according to information safety devices is known and is used the install software that trade mark is known check code, install and form subscriber computer software, and the application trade mark that will carry is known and is used trade mark and know check code and store; Or,
According to the information safety devices parameter, download the install software that carries the knowledge of application trade mark and use trade mark knowledge check code from the application corresponding merchant, install and form subscriber computer software, and the application trade mark that will carry is known and application trade mark knowledge check code is stored.
10. the Verification System of an information safety devices is characterized in that, this system comprises: information safety devices, use merchant's server and run on subscriber computer software on the subscriber computer, wherein,
Use merchant's server, be used to receive the random number of application merchant input and use the trade mark knowledge, export information safety devices to;
Information safety devices is used for the random number of using the input of merchant's server and uses trade mark and know, and carries out the computations trade mark that is applied and knows check code, will use trade mark and know and use trade mark and know the application merchant tag slot that check code is stored to information safety devices; The authentication requesting that reception subscriber computer software sends is known the application trade mark of storage and application trade mark knowledge check code is sent to subscriber computer software;
Subscriber computer software, send authentication requesting to information safety devices, the application trade mark that the acquired information safety means return is known and application trade mark knowledge check code, and the knowledge of application trade mark and the application trade mark knowledge check code that obtain from application merchant install software in advance stored with the subscriber computer local and remote compare.
11. system as claimed in claim 10 is characterized in that, described information safety devices comprises: communication unit, ciphering unit and memory cell, wherein,
Communication unit, be used to receive random number and the application trade mark of using the input of merchant's server and know, be sent to ciphering unit, receive the authentication requesting that subscriber computer software sends, read the knowledge of application trade mark and use trade mark knowledge check code from memory cell, be sent to subscriber computer software;
Ciphering unit is used to receive random number and uses trade mark and know, and carries out the computations trade mark that is applied and knows check code, will use trade mark and know and use trade mark knowledge check code and be sent to memory cell;
Memory cell is used for storage and uses the trade mark knowledge and use trade mark knowledge check code.
12., it is characterized in that described subscriber computer software comprises as claim 10 or 11 described systems: communication unit, memory cell and authentication ' unit, wherein,
Communication unit is used to receive authentication requesting, is sent to information safety devices, and the application trade mark that received information safety equipment returns is known and used trade mark and know information of check code, is sent to authentication ' unit;
Authentication ' unit, be used for sending authentication requesting to communication unit, knowledge of application trade mark and application trade mark that receiving communication unit sends are known information of check code, know with the application trade mark that reads from memory cell and use trade mark knowledge check code to mate, if coupling is used trade mark and is known the safety certification success;
Memory cell is used to store from using knowledge of application trade mark and the application trade mark knowledge check code that merchant's install software is obtained.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910236416A CN101695072A (en) | 2009-10-21 | 2009-10-21 | Authentication method for information safety devices and identification system thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910236416A CN101695072A (en) | 2009-10-21 | 2009-10-21 | Authentication method for information safety devices and identification system thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101695072A true CN101695072A (en) | 2010-04-14 |
Family
ID=42094012
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910236416A Pending CN101695072A (en) | 2009-10-21 | 2009-10-21 | Authentication method for information safety devices and identification system thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101695072A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101916344A (en) * | 2010-08-31 | 2010-12-15 | 北京深思洛克软件技术股份有限公司 | Method and system for verifying legality of software protection device |
CN102006171A (en) * | 2010-11-24 | 2011-04-06 | 北京天地融科技有限公司 | Method for updating internal clock of dynamic password token, token, authentication equipment and system |
CN102663297A (en) * | 2012-04-06 | 2012-09-12 | 天地融科技股份有限公司 | Font acquiring method, character displaying device, character displaying system and electronic signature tool |
WO2013086901A1 (en) * | 2011-12-16 | 2013-06-20 | 华为技术有限公司 | Checking method and apparatus for field replaceable unit, and communication device |
CN103840942A (en) * | 2014-02-19 | 2014-06-04 | 宇龙计算机通信科技(深圳)有限公司 | Data protection system and method |
CN104103107A (en) * | 2013-04-03 | 2014-10-15 | 陈麟华 | Time-varying password and time-varying password lock |
CN104935430A (en) * | 2014-03-17 | 2015-09-23 | 中国移动通信集团广东有限公司 | Processing method and device for client business |
CN106971104A (en) * | 2015-09-22 | 2017-07-21 | 三星电子株式会社 | Perform the method for security function and support the electronic equipment of methods described |
CN110176990A (en) * | 2019-05-15 | 2019-08-27 | 百度在线网络技术(北京)有限公司 | Vehicle assembly replaces recognition methods, device, computer equipment and storage medium |
CN110941805A (en) * | 2019-11-21 | 2020-03-31 | 北京达佳互联信息技术有限公司 | Identity authentication method and device |
-
2009
- 2009-10-21 CN CN200910236416A patent/CN101695072A/en active Pending
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101916344B (en) * | 2010-08-31 | 2013-09-25 | 北京深思洛克软件技术股份有限公司 | Method and system for verifying legality of software protection device |
CN101916344A (en) * | 2010-08-31 | 2010-12-15 | 北京深思洛克软件技术股份有限公司 | Method and system for verifying legality of software protection device |
CN102006171A (en) * | 2010-11-24 | 2011-04-06 | 北京天地融科技有限公司 | Method for updating internal clock of dynamic password token, token, authentication equipment and system |
CN102006171B (en) * | 2010-11-24 | 2012-11-07 | 天地融科技股份有限公司 | Method for updating internal clock of dynamic password token, token, authentication equipment and system |
WO2013086901A1 (en) * | 2011-12-16 | 2013-06-20 | 华为技术有限公司 | Checking method and apparatus for field replaceable unit, and communication device |
CN102663297A (en) * | 2012-04-06 | 2012-09-12 | 天地融科技股份有限公司 | Font acquiring method, character displaying device, character displaying system and electronic signature tool |
CN104103107A (en) * | 2013-04-03 | 2014-10-15 | 陈麟华 | Time-varying password and time-varying password lock |
CN103840942A (en) * | 2014-02-19 | 2014-06-04 | 宇龙计算机通信科技(深圳)有限公司 | Data protection system and method |
CN103840942B (en) * | 2014-02-19 | 2017-10-17 | 宇龙计算机通信科技(深圳)有限公司 | data protection system and method |
CN104935430A (en) * | 2014-03-17 | 2015-09-23 | 中国移动通信集团广东有限公司 | Processing method and device for client business |
CN106971104A (en) * | 2015-09-22 | 2017-07-21 | 三星电子株式会社 | Perform the method for security function and support the electronic equipment of methods described |
CN106971104B (en) * | 2015-09-22 | 2021-12-07 | 三星电子株式会社 | Method of performing security function and electronic device supporting the same |
CN110176990A (en) * | 2019-05-15 | 2019-08-27 | 百度在线网络技术(北京)有限公司 | Vehicle assembly replaces recognition methods, device, computer equipment and storage medium |
CN110941805A (en) * | 2019-11-21 | 2020-03-31 | 北京达佳互联信息技术有限公司 | Identity authentication method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101695072A (en) | Authentication method for information safety devices and identification system thereof | |
CN108053001B (en) | Information security authentication method and system for electronic warehouse receipt | |
CN102831529B (en) | A kind of commodity information identification method based on radio frequency and system | |
EP2487629B1 (en) | Secure smart poster | |
CN202019354U (en) | Article identity authenticating and anti-counterfeiting system based on NFC (near field communication) cellphone | |
CN104217327B (en) | A kind of financial IC card internet terminal and its method of commerce | |
JP4791497B2 (en) | Radio frequency identification system and method | |
RU2018105186A (en) | VERIFICATION OF PORTABLE CONSUMER DEVICES | |
CN102663591A (en) | Product anti-counterfeiting method and system based on electronic tag | |
CN102855577B (en) | Multiple commodity antifake check method based on cloud computing | |
CN102880891B (en) | The RFID safety communicating method that a kind of extra lightweight RFID bidirectional identification protocol is set up | |
WO2013072437A1 (en) | Key protected nfc tag method and system, and a method for diversify coupon on a viral distribution chain by nfc | |
CN104184733A (en) | RFID lightweight-class bidirectional authentication method based on CRC coding | |
CN103218591A (en) | Anti-counterfeiting system based on RFID (radio frequency identification), and working method of same | |
CN101388767A (en) | Certificate false proof method based on light weight digital signature scheme | |
CN103530785A (en) | Double anti-counterfeiting system and method based on near field communication (NFC) function | |
CN104320250A (en) | Anti-counterfeiting authentication method based on NFC chip | |
CN104410968A (en) | Portable universal integrated circuit card (UICC) subscriber terminal equipment and identity authentication system thereof | |
CN104282091A (en) | Bill data generating/transmitting/storing/authenticating method | |
CN108082723B (en) | Anti-counterfeiting bottle cap based on CPU (Central processing Unit) password chip and working method thereof | |
CN1945591A (en) | Encryting anti-fake technology for electronic label | |
CN102938116B (en) | A kind of full link protection business method of Transaction Safety | |
CN108650223A (en) | A kind of point-to-point authentic authentication method of the network equipment and system | |
CN107239936A (en) | A kind of E-seal management system | |
CN202870898U (en) | Radio frequency-based commodity information identification system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20100414 |