CN201270518Y - Safeguard device - Google Patents

Safeguard device Download PDF

Info

Publication number
CN201270518Y
CN201270518Y CNU2008202099632U CN200820209963U CN201270518Y CN 201270518 Y CN201270518 Y CN 201270518Y CN U2008202099632 U CNU2008202099632 U CN U2008202099632U CN 200820209963 U CN200820209963 U CN 200820209963U CN 201270518 Y CN201270518 Y CN 201270518Y
Authority
CN
China
Prior art keywords
unit
safety device
operation information
client
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CNU2008202099632U
Other languages
Chinese (zh)
Inventor
耿彤
朱世峰
肖卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Giesecke and Devrient China Information Technologies Co Ltd
Original Assignee
Giesecke and Devrient China Information Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke and Devrient China Information Technologies Co Ltd filed Critical Giesecke and Devrient China Information Technologies Co Ltd
Priority to CNU2008202099632U priority Critical patent/CN201270518Y/en
Application granted granted Critical
Publication of CN201270518Y publication Critical patent/CN201270518Y/en
Priority to PCT/EP2009/007447 priority patent/WO2010043410A2/en
Priority to EP09756415.7A priority patent/EP2342671B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Abstract

The utility model provides a safety device, wherein the safety device comprises a first receiving unit for receiving operation orders transmitted by a user end, a first input unit for providing for users to input operation information according to the operation orders, a first judging unit for judging whether the users of the user end confirm the operation information, an encrypting unit for utilizing a pre-stored symmetrical key to encrypt the operation information if the judging unit judges the users confirm the operation information, a first transmitting unit for transmitting the encrypted operation information to the user end. Through inputting key information, such as the operation information, the checking codes and the like, into the safety device, and transmitting the information which is transmitted in a network after encrypting in the network, the device guarantees the safety of transmission data, prevents Trojan horse from realizing the attacking aims through tampering or forging the operation information and the other modes, and solves the problems existing in the prior art.

Description

Safety device
Technical field
The utility model is about network security technology, especially in regard to safety device.
Background technology
Because the convenience of network, based on network application system occupies more and more important position as the Internet bank, ecommerce, E-Government, security, online game etc. in productive life.But, also just because of the characteristic of network makes the fail safe of network communication become important topic.Therefore, in order to guarantee the fail safe of said system, various safety devices, for example digital signature device has been widely used in every field.
The main application of this safety device is the storage digital certificate, carries out authentication and digital signature.Be that example describes below with the digital signature device.
At present, based on the application of digital signature technology, guaranteed the validity of the fail safe and the authentication of message transmission to a certain extent.But, along with popularizing of its application, the network hacker software program is constantly upgraded, attack pattern presents more and more diversified, environment for use to this digital signature device is attacked, the identification number of attempting to obtain this digital signature device that has (PIN:Personal IdentificationNumber) carries out the malice digital signature, the Transaction Information of attempting to intercept and capture the needs signature that has, and malice is altered Transaction Information.
Below to be example with this USBKey digital signature device be elaborated to the work of this digital signature device.
The user inserts this digital signature device in the USB mouth of client, at this moment, connect between this digital signature device and this client, like this, this user just can send authentication and digital signature relevant information to this digital signature device by this client when needed.For example, when network bank business based, this relevant information can be information such as trading account, dealing money.
When carrying out digital signature, this user imports the identification code of this digital signature device by the keyboard of this client, i.e. PIN code, and the password of this user's digital signature device, and this PIN code is sent to this digital signature device.
Whether this PIN code of this digital signature device checking user input is correct, if correct, then this user of this digital signature device mandate carries out the website and lands, and escape way connects operations such as SSL and digital signature.If this PIN code verification is not passed through, then show the information of importing PIN code once more at client end interface, if this user imports the number of times of this PIN code above after the preset times, this digital signature device will lock voluntarily.
From the above, because this digital signature device itself is not differentiated authentication and digital signature relevant information that this client sends, as long as the user imports with correct form and flow process by client, this input all can obtain the response of this digital signature device, this weakness will be utilized by hacker and unprincipled fellow, carries out following attack:
When this digital signature device sends signature request, be hidden in the trojan horse on backstage or hook sequential monitoring in this client, before this information is not sent to data signature device,, and it sent to the hacker it intercepting to this information.
After critical data in the signing messages that the hacker will be intercepted is revised, by trojan horse, replace signing messages wherein, more amended signing messages is sent to this digital signature device, because this digital signature device can not be done discriminating to signing messages, this operation can not discovered by the client.For example, when carrying out online transfer transactions, this signing messages can be information such as dealing money or account number.
If the user imports correct PIN code, after verification, what the transaction of being revised by the hacker will be legal passes through smoothly.
In addition because this user is the PIN password of inputing this digital signature device by the client keyboard, in case and this PIN code checking pass through, all subsequent operations all can be thought legal operation by this digital signature device.This user can't carry out effective security monitoring to the subsequent operation of this digital signature device, and this weakness will be utilized by hacker and unprincipled fellow, carries out following attack:
When this user imported correct PIN code by this client keyboard, the trojan horse or the hook program that are hidden in the backstage just may be obtained this PIN code, and it is sent to the hacker.
This hacker by the hacker software of Long-distance Control, controls the operation of user client behind the PIN of this digital signature device that obtains user password.
If this digital signature device of user is inserted on the computer for a long time, and user self (this client is in open state) not before client, the hacker can control this user client, and use this digital signature device of user and this PIN password that illegally obtains to carry out illegal network trading, the user is caused damage.
Application number is 200510132752.4, publication number is the utility application of CN 1216330C, a kind of signature apparatus and method of digital signature have been disclosed, now its content is herein incorporated, though this device has guaranteed the fail safe of information to a certain extent, can not fundamentally solve problems of the prior art.
The utility model content
The purpose of this utility model is to provide a kind of safety device, by key messages such as this safety device input operation information or authentication passwords, and in network, transmitting after the information encryption that in network, transmits, guaranteed the safety of these transmission data, stoped wooden horse to reach the attack purpose with the mode of distorting or forging operation information, solved problems of the prior art, and this safety device is simple in structure, easy to carry, cost is low.
For achieving the above object, the utility model provides a kind of safety device, and this safety device comprises:
First receiving element, described first receiving element are used to receive the operational order that client transmits;
First input unit, described first input unit are used for according to described operational order for user's input operation information;
First judging unit, described first judging unit is used to judge whether described client user confirms described operation information;
Ciphering unit, if the judged result of this first judging unit is for being, described ciphering unit is used for the utilization symmetric key that prestores described operation information is encrypted;
The described operation information that first transmitting element, described first transmitting element are used for encrypting sends to described client.
For achieving the above object, the invention provides a kind of safety device, this safety device comprises:
The 4th receiving element, described the 4th receiving element are used to receive the operational order that client transmits;
The 3rd input unit, described the 3rd input unit are used for according to described operational order for user's input operation information;
The 5th judging unit, described the 5th judging unit is used to judge whether described client user confirms described operation information;
Processing unit is if the judged result of described the 5th judging unit is for being that described processing unit is used for described operation information is handled, and is used for the information checking sign indicating number of verification with generation;
The 3rd transmitting element, described the 3rd transmitting element are used for described operation information and described information checking sign indicating number are sent to described client.
The beneficial effects of the utility model are, by key messages such as this safety device input operation information or authentication passwords, and in network, transmitting after the information encryption that in network, transmits, guaranteed the safety of these transmission data, stoped wooden horse to reach the attack purpose with the mode of distorting or forging operation information, solved problems of the prior art, and this safety device is simple in structure, easy to carry, cost is low.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present utility model, constitutes the application's a part, does not constitute qualification of the present utility model.In the accompanying drawings:
Fig. 1 is that the safety device of embodiment 1 constitutes schematic diagram;
Fig. 2 is that the safety device of embodiment 2 constitutes schematic diagram;
Fig. 3 is that the authentication unit constitutes schematic diagram among Fig. 2;
Fig. 4 is the flow chart that the single transfer transactions of the utility model embodiment is used;
Fig. 5 is the flow chart that the batch transfer transactions of the utility model embodiment is used.
Embodiment
For making the purpose of this utility model, technical scheme and advantage clearer,, the utility model is described in further details below in conjunction with execution mode and accompanying drawing.At this, exemplary embodiment of the present utility model and explanation thereof are used to explain the utility model, but not as to qualification of the present utility model.
Followingly embodiment of the present utility model is elaborated with reference to accompanying drawing.
Embodiment 1
The embodiment of the invention provides a kind of safety device, and as shown in Figure 1, this safety device comprises first receiving element 101, first input unit 102, first judging unit 103, ciphering unit 104 and first transmitting element 105; Wherein, this first receiving element 101 is used to receive the operational order that client transmits; This first input unit 102 is used for according to this operational order for user's input operation information; This first judging unit 103 is used to judge whether this user confirms this operation information; If judged result is for confirming this operation information, then this ciphering unit 104 is used for this operation information is encrypted; The operation information that this first transmitting element 105 is used for encrypting sends to this client.
In the present embodiment, for example for network bank business based, this operation information can be information such as account number, transaction data.In addition,,, can't realize almost when using this safety means input operation information that at this moment, import the check code of this batch data by these safety means, like this, this operation information can also be check code because data volume is bigger in batches transaction.
This first input unit 102 can be keyboard or touch-screen, and this keyboard can comprise the button that is used to import operation informations such as account, transaction data.
In the present embodiment, this operation information encrypted can use built-in key that this operation information is encrypted, to guarantee the integrality of this operation information, this built-in key is to disperse from the sequence number of master key according to each safety device.
In addition, this operation information is encrypted also can be used the symmetric key of downloading from server by client.
From the above, input and encryption by device complete operation information safe in utilization, i.e. this safety device output is the ciphertext after encrypting, because the user is input operation content on client not, wooden horse also can't be invaded the safety device content, therefore, wooden horse can't be intercepted and captured the clear data of the operation information in this safety device, and the encrypt data of having intercepted and captured this safety device output also can't crack, let alone distort and forge, avoid bringing unnecessary loss to the user, thus the integrality of guarantee information transmission, fail safe, improved the safe class of network application system, and this safety device is simple in structure, cost is low.
In the present embodiment, safety device can use separately, by transmission information between wired or wireless mode and the client.In addition, this safety device also can be integrated on the existing portable equipment and use, as upward realizations such as digital signature devices.
Embodiment 2
Below be that digital signature device is that example describes with this safety device.
The embodiment of the invention provides a kind of safety device, as shown in Figure 2, this safety device comprises first receiving element 201, first input unit 202, first judging unit 203, ciphering unit 204 and first transmitting element 205, and its effect is similar to Example 1, repeats no more herein.
As shown in Figure 2, this safety device also comprises second judging unit 206, authentication unit 207, digital signature unit 208 and second transmitting element 209; Wherein, this second judging unit 206 is used to judge whether that this operation information that receives encrypting carries out the instruction of digital signature; If the judged result of this judging unit 206 is for being that this authentication unit 207 is used to carry out authenticating user identification; If authenticating user identification passes through, this digital signature unit 208 is used for the operation information of encrypting is carried out digital signature; The operation information that this second transmitting element 209 is used for carrying out the encryption of digital signature is sent to this client.Like this,, can guarantee to transmit data and do not distorted, be both the purpose that also reaches non-repudiation by this operation information is carried out digital signature.
In the present embodiment, above-mentioned each unit can adopt central processing unit (CPU) to control, and as shown in Figure 2, perhaps adopts a CPU smart card to realize that similar Fig. 1 repeats no more herein.
Fig. 3 is that the authentication unit constitutes schematic diagram among Fig. 2.As shown in Figure 3, this authentication unit 207 comprises second input unit 301, the 3rd judging unit 302; Wherein, this second input unit 301 is used for importing the password that carries out authentication for the user; The 3rd judging unit 302 is used to judge whether this password of input is correct, passes through if judged result for being, then determines one's identity to authenticate.After authentication was passed through, this digital signature unit 207 carried out digital signature.
From the above, by second input unit, the 301 input validation passwords of this safety device, because the user does not import this authentication password on client, wooden horse also can't be invaded the safety device content, therefore, wooden horse can not be intercepted and captured this password, thereby guarantees the fail safe of authorization information.
In the present embodiment, this authentication password can be the sign password of this safety device, for example, can be the PIN code of this safety device, if the PIN code of the PIN code of the 3rd judging unit 302 these inputs of judgement and this safety device of storage is consistent, think that then this PIN code is correct, authentication is passed through.
If judged result is inconsistent, then determine the password bad of this input.At this moment, can return the information of re-entering this PIN code, point out this user to re-enter this PIN code, this safety device was with locked when the number of times of importing this PIN code as this user surpassed preset value.
Like this, this user authentication unit also comprises the 4th judging unit 303 and lock cell 304; Wherein, the 4th judging unit 303 is used to judge whether the number of times of this password of input surpasses preset value, if judged result is for being that then this lock cell 304 is used to lock this safety device, has further guaranteed fail safe.
In addition, this safety device also can comprise converting unit 210 and display unit 211, and this converting unit 210 is used for the information by 301 inputs of second input unit, and promptly password is converted to character, for example, is converted to " * "; This display unit 211 is used to show the character " * " after the conversion, and like this, it is easy to operate to be convenient to the user.In addition, this display unit 211 also can show the operation information by 301 inputs of first input unit.
In addition, for simplifying this device, display unit 211 need be set on this device, operation information or the authentication password that can in real time this user be imported are sent to showing of client, if this user confirms this input error, can use that then 202 pairs of these operation informations of this first input unit are made amendment etc.
In the present embodiment, this first input unit 202 and second input unit 301 can adopt keyboard to realize, this keyboard can comprise following button, so that the user inputs key messages such as number of the account, the amount of money, this safety device password in process of exchange, for example can comprise digital 0-9, decimal point, affirmation, cancellation, backspace, empty.
As shown in Figure 2, this safety device comprises that also second receiving element 212, first deposits memory cell 213.Wherein, this second receiving element 212 is used for receiving the symmetric key of downloading from server by this client; This first memory cell 213 is used for this symmetric key is stored.Like this, this ciphering unit 204 is used to utilize described symmetric key that described operation information is encrypted.
In the above-described embodiments, this safety device can be downloaded symmetric key from server by client, and this safety device can utilize this symmetric key to be used for the above-mentioned key message of operation information that comprises is encrypted.Wherein, this symmetric key is produced by server, and be sent to this safety device by client, this symmetric key needs server to decide through consultation consistent with this safety device, like this, when this safety device utilized this symmetric key that key message is encrypted and is sent to server by client, this server can be deciphered the key message of this encryption.
In the present embodiment, this can use the process key of an interim process to becoming key, when each transaction, download this process key from server, when this server is sent to this process key after this safety device, this safety device utilize this symmetric key that key message is encrypted and be sent to server by client by client, this safety device can be deleted this process key.Like this, can avoid under the situation of a symmetric key of long-term use, hacker's method of using force is broken through this symmetric encipherment algorithm.
This symmetric key is generated by this server, after this safety device obtains this symmetric key, this symmetric key is stored in the privately owned position of this first memory cell 214, and promptly in this position, client can't be obtained the plaintext of this process key by any way from this safety device.
In the present embodiment, the key message of this process secret key encryption of above-mentioned needs can be stored in the ad-hoc location of this first memory cell 214 temporarily, and for the information of this position, client only has read-only authority, like this, can effectively prevent from the attack of distorting operation information of client initiation.
In addition,, after this server generates this symmetric key, utilize client public key that this symmetric key is encrypted, encrypted symmetric key is sent to this safety device by client in order to guarantee this symmetric key safety of transmission.
In this case, this safety device also can comprise the 4th receiving element, decrypting device and second memory cell (not shown); Wherein, the 4th receiving element is used for the symmetric key by the encryption of this client reception server transmission; The private key for user that this decrypting device utilization prestores is decrypted this symmetric key, to obtain this symmetric key; This second storage is used for this symmetric key is stored.
In addition, as shown in Figure 2, this safety device also comprises key delete cells 214, and after information transfer process finished, this key delete cells 214 was used to delete this symmetric key.Like this, can avoid under the situation of a symmetric key of long-term use, hacker's method of using force is broken through this symmetric encipherment algorithm.
From the above; input by device complete operation information safe in utilization, password; because the user is input operation content on client not; wooden horse also can't be invaded the safety device content; therefore; wooden horse can't be intercepted and captured the clear data of the operation information in this safety device; and the encrypt data of having intercepted and captured this safety device output also can't crack; let alone distort and forge; protect the safety of user cipher and associative operation information effectively; improved the safe class of network application system, and this safety device is simple in structure, cost is low.
Embodiment 3
The embodiment of the invention also provides a kind of safety device, and this safety device comprises the 4th receiving element, the 3rd input unit, the 5th judging unit, processing unit and the 3rd transmitting element; Wherein, the 4th receiving element is used to receive the operational order that client transmits; The 3rd input unit is used for according to this operational order for user's input operation information; The 5th judging unit is used to judge whether this client user confirms this operation information; If the judged result of the 5th judging unit is for being, this processing unit is used for this operation information is handled, and is used for the information checking sign indicating number of verification with generation, with the integrality of guarantee information; The 3rd transmitting element is used for this operation information and described information checking sign indicating number are sent to described client.
Wherein, this embodiment 3 is with the difference of embodiment 1, it is not directly encrypted operation information, but operation information is handled, promptly utilize prestored secret key to calculate, generation is used for the information checking sign indicating number of verification, and this operation information and information checking sign indicating number are sent to client, is sent to server by this client.
When this server receives this operation information and information checking sign indicating number, utilize and the same algorithm computation check code of this safety device, judge whether this check code is consistent with the information checking sign indicating number that receives, be true if unanimity is then determined this operation information, do not distorted.
In addition, other component part of this safety device and embodiment 1 and 2 are similar, repeat no more herein.
Application with the digital ratio transfer transactions describes, as shown in Figure 4:
This digital signature device is connected with client, can uses the USBKey digital signature device in the present embodiment, like this, be connected with this client by USB interface;
When transaction was initiated, this server end generated a symmetric key, encrypted with client public key and sent to this client, and the symmetric key that this client will be encrypted is sent to this digital signature device.
This digital signature device uses the private key for user deciphering, obtains this symmetric key, is stored in the privately owned position in this digital signature device.
After finishing above-mentioned steps, the transaction beginning, the user imports crucial Transaction Information by the keyboard on this digital signature device, as account number, the amount of money etc.For ease of client's operation, it is consistent with demonstration on the screen to require the client to import, and promptly the client whenever by next key, shows corresponding informance on screen.
After input was finished, after the user pressed acknowledgement key on this digital signature device, this digital signature device was delivered to server by this client with the crucial Transaction Information of user's input after with symmetric key encryption.
After finishing the input Transaction Information, enter signature step, at first carry out authentication.The i.e. keyboard input PIN code of this user by this digital signature device, for ease of client's operation, require the client import with computer screen on show consistently, promptly the client is whenever by next key, demonstration one " * " number on screen.
User's PIN code of being totally lost enters cryptographic check after pressing acknowledgement key.
Judge whether verification is successful; When verification succeeds, the Transaction Information of having encrypted signed deliver to server, and abandon this symmetric key.So far, a complete single transaction is finished.
Application with the batch transfer transactions describes, as shown in Figure 5:
This digital signature device is connected with client, can uses the USBKey digital signature device in the present embodiment, like this, be connected with this client by USB interface;
The user uses the tools of transferring accounts in batches to obtain the check code of a Transaction Information on clean computer (not networking, virus-free).
When transaction was initiated, server end generated a symmetric key, encrypted with client public key and sent to client, and client is delivered to this digital signature device by middleware.
This digital signature device uses the private key for user deciphering, obtains this symmetric key, is stored in privately owned position in this digital signature device.
After finishing above-mentioned steps, the transaction beginning, the user imports the check code of transferring accounts in batches by the keyboard on this digital signature device, and it is consistent with demonstration on the screen to require the client to import, and promptly the client whenever by next key, shows corresponding informance on screen.
After this user pressed acknowledgement key on this digital signature device, this digital signature device was sent user's input validation sign indicating number with the symmetric key encryption that step 3 obtains.
After finishing the input validation sign indicating number, enter signature step, require the user to pass through this digital signature device input PIN code, require the client import with screen on show consistently, promptly the client is whenever by next key, demonstration one " * " number on screen.
This user PIN code of being totally lost enters cryptographic check after pressing acknowledgement key.Verification succeeds is signed to the check code of having encrypted and to be delivered to server, and abandons this symmetric key.So far, a complete batch money transfer transactions is finished.
From the above; input and encryption by device complete operation information safe in utilization; because the user is input operation content on client not; wooden horse also can't be invaded the safety device content, and therefore, wooden horse can't be intercepted and captured the clear data of the operation information in this safety device; and the ciphertext of having intercepted and captured this safety device output is can't cracking; let alone distort and forge, protect the safety of user cipher and associative operation information effectively, improved the safe class of network application system.
Above-described embodiment; the purpose of this utility model, technical scheme and beneficial effect are further described; institute is understood that; the above only is an embodiment of the present utility model; and be not used in and limit protection range of the present utility model; all within spirit of the present utility model and principle, any modification of being made, be equal to replacement, improvement etc., all should be included within the protection range of the present utility model.

Claims (12)

1. a safety device is characterized in that, described safety device comprises:
First receiving element, described first receiving element are used to receive the operational order that client transmits;
First input unit, described first input unit are used for according to described operational order for user's input operation information;
First judging unit, described first judging unit is used to judge whether described client user confirms described operation information;
Ciphering unit is if the judged result of described first judging unit is for being that described ciphering unit is used for described operation information is encrypted;
The described operation information that first transmitting element, described first transmitting element are used for encrypting sends to described client.
2. safety device according to claim 1 is characterized in that, described safety device also comprises:
Second judging unit, described second judging unit are used to judge whether that the described operation information that receives encrypting carries out the instruction of digital signature;
The authentication unit is if the judged result of described second judging unit is for being that described authentication unit is used to carry out authenticating user identification;
The digital signature unit, if authenticating user identification passes through, described digital signature unit is used for the described operation information of encrypting is carried out digital signature;
Second transmitting element, the operation information that described second transmitting element is used for carrying out the encryption of digital signature is sent to described client.
3. according to the described safety device of claim 2, it is characterized in that described authentication unit comprises:
Second input unit, described second input unit are used for importing the authentication password of carrying out authentication for the user;
The 3rd judging unit, described the 3rd judging unit are used to judge whether the described authentication password of input is correct, pass through if judged result for being, then determines one's identity to authenticate.
4. safety device according to claim 3 is characterized in that, described authentication unit also comprises:
The 4th judging unit, if the judged result of described the 3rd judging unit is incorrect, then described the 4th judging unit is used to judge whether the number of times of the described password of input surpasses preset value;
Lock cell is if the judged result of the 4th judging unit is for being that described lock cell is used to lock described safety device.
5. according to claim 1 or 3 described safety devices, it is characterized in that described first input unit and second input unit are keyboard or the touch-screen that has button.
6. according to claim 1 or 3 described safety devices, it is characterized in that described safety device also comprises:
Converting unit, described converting unit are used for the described operation information or the password of input are converted to character;
Display unit, described display unit is used to show described character.
7. safety device according to claim 1 is characterized in that, described safety device also comprises:
Second receiving element, described second receiving element is used for downloading symmetric key by described client from server;
First memory cell, described first storage is used for described symmetric key is stored;
Then described ciphering unit is used to utilize described symmetric key that described operation information is encrypted.
8. safety device according to claim 1 is characterized in that, described safety device also comprises:
The 3rd receiving element, described the 3rd receiving element are used for downloading the symmetric key of encrypting from server by described client;
Decrypting device, described decrypting device are used for described symmetric key is decrypted, to obtain described symmetric key;
Second memory cell, described second storage is used for described symmetric key is stored;
Then described ciphering unit is used to utilize described symmetric key that described operation information is encrypted.
9. safety device according to claim 2 is characterized in that described safety device also comprises the key delete cells, and described key delete cells is used to delete described symmetric key.
10. safety device according to claim 1 is characterized in that described safety device also comprises display unit, and described display unit is used to show described operation information.
11. a safety device is characterized in that, described safety device comprises:
The 4th receiving element, described the 4th receiving element are used to receive the operational order that client transmits;
The 3rd input unit, described the 3rd input unit are used for according to described operational order for user's input operation information;
The 5th judging unit, described the 5th judging unit is used to judge whether described client user confirms described operation information;
Processing unit is if the judged result of described the 5th judging unit is for being that described processing unit is used for described operation information is handled, and is used for the information checking sign indicating number of verification with generation;
The 3rd transmitting element, described the 3rd transmitting element are used for described operation information and described information checking sign indicating number are sent to described client.
12. safety device according to claim 11 is characterized in that, described the 3rd input unit is keyboard or the touch-screen that has button.
CNU2008202099632U 2008-10-17 2008-10-17 Safeguard device Expired - Lifetime CN201270518Y (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CNU2008202099632U CN201270518Y (en) 2008-10-17 2008-10-17 Safeguard device
PCT/EP2009/007447 WO2010043410A2 (en) 2008-10-17 2009-10-16 Method for information interaction and secure device
EP09756415.7A EP2342671B1 (en) 2008-10-17 2009-10-16 Method for information interaction and secure device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNU2008202099632U CN201270518Y (en) 2008-10-17 2008-10-17 Safeguard device

Publications (1)

Publication Number Publication Date
CN201270518Y true CN201270518Y (en) 2009-07-08

Family

ID=40843127

Family Applications (1)

Application Number Title Priority Date Filing Date
CNU2008202099632U Expired - Lifetime CN201270518Y (en) 2008-10-17 2008-10-17 Safeguard device

Country Status (1)

Country Link
CN (1) CN201270518Y (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592099A (en) * 2016-01-25 2016-05-18 深圳市文鼎创数据科技有限公司 Identity authentication device
CN107749837A (en) * 2017-09-26 2018-03-02 甘肃万维信息技术有限责任公司 A kind of E-Government Resource Security guard system and its method
CN115037733A (en) * 2022-06-24 2022-09-09 明峰医疗系统股份有限公司 Remote control system and method of CT (computed tomography) equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592099A (en) * 2016-01-25 2016-05-18 深圳市文鼎创数据科技有限公司 Identity authentication device
CN107749837A (en) * 2017-09-26 2018-03-02 甘肃万维信息技术有限责任公司 A kind of E-Government Resource Security guard system and its method
CN115037733A (en) * 2022-06-24 2022-09-09 明峰医疗系统股份有限公司 Remote control system and method of CT (computed tomography) equipment

Similar Documents

Publication Publication Date Title
EP2747361B1 (en) Method using a single authentication device to authenticate a user to a service provider among a plurality of service providers and device for performing such a method
KR101544722B1 (en) Method for performing non-repudiation, payment managing server and user device therefor
CN101334884B (en) Improve the method and system of account transfer safety
CN101662469B (en) Method and system based on USBKey online banking trade information authentication
US9055061B2 (en) Process of authentication for an access to a web site
CN101340285A (en) Method and system for identity authentication by finger print USBkey
CN101221641B (en) On-line trading method and its safety affirmation equipment
CN101216923A (en) A system and method to enhance the data security of e-bank dealings
CN103020825A (en) Safety payment authentication method based on software client
CN105046488A (en) Method, apparatus, and system for generating transaction-signing one-time password
WO2018133674A1 (en) Method of verifying and feeding back bank payment permission authentication information
CN102945526A (en) Device and method for improving online payment security of mobile equipment
CN102201137A (en) Network security terminal, and interaction system and method based on terminal
CN101819614A (en) System and method for enhancing network transaction safety by utilizing voice verification USBKey
CN108768941B (en) Method and device for remotely unlocking safety equipment
CN101944216A (en) Two-factor online transaction safety authentication method and system
CN101729505A (en) Information interaction method and security device thereof
CN108401494B (en) Method and system for transmitting data
CN104301288A (en) Method and system for online identity authentication, online transaction certification, and online certification protection
CN101478547A (en) Apparatus for trustable digital signature to intelligent cipher key and working method thereof
CN202206419U (en) Network security terminal and interactive system based on terminal
CN201270518Y (en) Safeguard device
CN101425901A (en) Control method and device for customer identity verification in processing terminals
CN103051618A (en) Terminal authentication equipment and network authentication method
KR101856530B1 (en) Encryption system providing user cognition-based encryption protocol and method for processing on-line settlement, security apparatus and transaction approval server using thereof

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term

Granted publication date: 20090708

CX01 Expiry of patent term