CN204069000U - Mobile encrypted authenticate device - Google Patents

Mobile encrypted authenticate device Download PDF

Info

Publication number
CN204069000U
CN204069000U CN201420397061.1U CN201420397061U CN204069000U CN 204069000 U CN204069000 U CN 204069000U CN 201420397061 U CN201420397061 U CN 201420397061U CN 204069000 U CN204069000 U CN 204069000U
Authority
CN
China
Prior art keywords
module
user
mobile terminal
sent
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201420397061.1U
Other languages
Chinese (zh)
Inventor
毛晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201420397061.1U priority Critical patent/CN204069000U/en
Application granted granted Critical
Publication of CN204069000U publication Critical patent/CN204069000U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The utility model discloses a kind of mobile encrypted authenticate device.This device comprises: authentication module, is configured to the identification code of representative of consumer identity to be sent to transport module; And described transport module, be connected with described authentication module, be configured to the described identification code received to be sent to a mobile terminal, wherein, described transport module is configured to, by non-universal serial bus usb mode, described identification code is sent to described mobile terminal.Mobile encrypted authenticate device of the present utility model makes the hardware encipher certification can being carried out user identity in the terminal by communication, thus make the mode of hardware encipher certification have more flexibility, especially the mobile terminal that USB interface is not set can be made to be encrypted certification by the mode of hardware encipher to user identity, thus to strengthen the fail safe of user authentication in the mobile terminal that USB interface is not set.

Description

Mobile encrypted authenticate device
Technical field
The utility model relates to data security arts, particularly, relates to a kind of mobile encrypted authenticate device.
Background technology
Along with the development of network technology, user can process various affairs by network.In recent years, the use of mobile phone is more and more universal.Due to mobile phone compact, more convenient than desktop computer with surfing Internet with cell phone.Modern can utilize the such as mobile terminal Internet access such as mobile phone, panel computer processing transactions at any chip time.Even in some important occasions, such as, when internet bank trade, large enterprise's internal network management etc. relate to user's fund security and user's important information, such as, remit money, transfer accounts, payment etc., increasing people uses the mobile terminal such as mobile phone, panel computer to carry out processing transactions.
In this case, ensure that the safety of user account is even more important.Static password can not meet protection user and log in security needs.Usually the mode of encrypting and authenticating is adopted to carry out the identity of authentication of users at present.In order to protect account, the cryptosecurity of user better, method or the device of some data security encrypting and authenticatings also progress into daily life.Some companies are proposed dynamic password card, and namely system provides one group of coordinate at random, and client finds password combination input system according to coordinate from card.Also have a kind of mode to be E-token dynamic password card, namely automatically generated one group of new random cipher according to cryptographic algorithm every 60 seconds.Also have one to be handset token, be a kind of mobile phone client software, it produced a random dynamic puzzle based on such as time synchronizing method every 60 seconds.In addition, short message password etc. is also had.It is the mode of dynamic password that above authentication mode can be summed up as.
Also has a kind of mode utilizing USB Key to encrypt in addition.USB Key is a kind of storage medium of digital certificate, which stores private key for user and digital certificate, and the public key algorithm utilizing it built-in realizes the certification to user identity.Because the private key of representative of consumer identity produces at USB Key, make in theory all cannot read in any way, therefore USB Key has higher fail safe as a kind of hardware password board, is widely used in the occasions such as Web bank, online game, large enterprise's internal network management.Such as, " the U shield " of industrial and commercial bank, " the excellent Key " of China Merchants Bank.
But mobile phone and this kind of mobile terminal of panel computer do not have USB interface due to equipment itself, when run into need to apply USB Key carry out the encryption application of the higher level of certification time, this kind of mobile terminal is just helpless.Such as, user has no idea to carry out paying or transferring accounts with " the U shield " of industrial and commercial bank on mobile phone or panel computer.At present, communication mode user identity being carried out to hardware encipher certification is also only limited to usb mode, and for using the mode of dynamic password in the mobile terminal not arranging USB interface, safety grades is not high.
Utility model content
The purpose of this utility model is to provide a kind of safety, easily mobile encrypted authenticate device.
To achieve these goals, the utility model carries a kind of mobile encrypted authenticate device, and this device comprises: authentication module, is configured to the identification code of representative of consumer identity to be sent to transport module; And described transport module, be connected with described authentication module, be configured to the described identification code received to be sent to a mobile terminal, described transport module is configured to, by non-universal serial bus usb mode, described identification code is sent to described mobile terminal.
Preferably, described mobile terminal is the mobile terminal not being provided with general-purpose serial bus USB interface.
Preferably, described mobile terminal is mobile phone or panel computer.
Preferably, described transport module is Mike's microphone interface and/or micro-USB Micro USB interface.
Preferably, described transport module be following in one or more: wireless network transmission module, Bluetooth communication modules and near-field communication NFC transport module.
Preferably, this device also comprises: identification module, be connected with described authentication module, be configured to receive user's input, identify user's input information, and this user's input information is sent to described authentication module, wherein, described authentication module is also configured to store secret key, described user's input information is encrypted calculating by described secret key, generates described identification code.
Preferably, described identification module be following in one or more: password identification module, rhythm identification module, fingerprint identification module, iris recognition module and gesture recognition module.
Preferably, described password identification module comprises: one group of button, and each button is marked the one in numeral, letter and color, is configured to receive described user input, and generation inputs corresponding key information with described user; And first processing module, be configured to receive described key information, and identify described user's input information according to this key information, and this user's input information is sent to described authentication module.
Preferably, described rhythm identification module comprises: user's input module, is configured to receive described user input, and this user input is sent to the second processing module; And described second processing module, be configured to record the time receiving described user input, and identify described user's input information according to the recorded time, and this user's input information is sent to described authentication module.
Preferably, described user's input module comprises button and/or touch-screen.
By technique scheme, the identification code of representative of consumer identity is sent to mobile terminal by non-usb mode by the mobile encrypted authenticate device that the utility model provides.This mobile encrypted authenticate device makes the hardware encipher certification can being carried out user identity in the terminal by communication, thus make the mode of hardware encipher certification have more flexibility, especially the mobile terminal that USB interface is not set can be made to be encrypted certification by the mode of hardware encipher to user identity, thus to strengthen the fail safe of user authentication in the mobile terminal that USB interface is not set.
Other feature and advantage of the present utility model are described in detail in embodiment part subsequently.
Accompanying drawing explanation
Accompanying drawing is used to provide further understanding of the present utility model, and forms a part for specification, is used from explanation the utility model, but does not form restriction of the present utility model with embodiment one below.In the accompanying drawings:
Fig. 1 is the structured flowchart of the mobile encrypted authenticate device that execution mode of the present utility model provides;
Fig. 2 is the schematic diagram of the mobile encrypted authenticate device that execution mode of the present utility model provides;
Fig. 3 is the schematic diagram of the mobile encrypted authenticate device that another execution mode of the present utility model provides;
Fig. 4 is the structured flowchart of the mobile encrypted authenticate device that another execution mode of the present utility model provides;
Fig. 5 is the schematic diagram of the mobile encrypted authenticate device that another execution mode of the present utility model provides; And
Fig. 6 is the schematic diagram of the mobile encrypted authenticate device that another execution mode of the present utility model provides.
Description of reference numerals
100 mobile encrypted authenticate device 101 authentication module 102 transport modules
103 mobile terminal 104 plug 401 identification modules
501 button 502 touch-screens
Embodiment
Below in conjunction with accompanying drawing, embodiment of the present utility model is described in detail.Should be understood that, embodiment described herein, only for instruction and explanation of the utility model, is not limited to the utility model.
Fig. 1 is the structured flowchart of the execution mode of the mobile encrypted authenticate device that the utility model provides.As shown in Figure 1, this mobile encrypted authenticate device 100 can comprise authentication module 101 and transport module 102.Wherein, authentication module 101 can be configured to the identification code of representative of consumer identity to be sent to transport module 102.Transport module 102 can be connected with authentication module 101, is configured to the identification code received is sent to a mobile terminal (mobile terminal 103 such as, in Fig. 2 and Fig. 3).
Wherein, with traditional mobile encrypted authenticate device unlike, what traditional mobile encrypted authenticate device adopted is that this hardware identification device (is therefore also called " USB key " by the transport module 102 being provided with USB interface, such as, " the U shield " of industrial and commercial bank, " the excellent Key " of China Merchants Bank).And in the utility model, transport module 102 can be configured to, by non-usb mode, identification code is sent to mobile terminal.
As mentioned above, identification code can be sent to mobile terminal by non-usb mode by transport module 102.Therefore, mobile terminal can be the mobile terminal not arranging USB interface, such as, and mobile phone or panel computer.Certainly, the mobile terminal being provided with USB interface also can be used, such as, desktop computer or notebook computer.
The various execution modes of transport module 102 are described below in detail.Fig. 2 is the schematic diagram of the mobile encrypted authenticate device 100 that execution mode of the present utility model provides.Wherein, transport module 102 can be Mike's microphone interface and/or Micro USB interface.As shown in Figure 2, in this embodiment, transport module 102 can be connected with mobile terminal 103 by plug 104.
(1) transport module 102 can be Mike's microphone interface.In this execution mode, the plug 104 be connected can be inserted Mike or the microphone interface of mobile terminal 103, thus this mobile encrypted authenticate device 100 is connected with mobile terminal 103 with transport module 102.By converting identification code to audio signal, and be sent to mobile terminal 103 via the plug 104 be connected with transport module 102, to carry out certification to user identity.
(2) transport module 102 can be Micro USB interface.At present, nearly all Android mobile device and Windows mobile device all have Micro USB interface.In this execution mode, the plug 104 be connected can be inserted the Micro USB interface of mobile terminal 103, thus be connected with mobile terminal 103 with Micro USB interface.Identification code is sent to mobile terminal 103 via the plug 104 be connected with Micro USB interface, to carry out certification to user identity.
Fig. 3 is the schematic diagram of the mobile encrypted authenticate device 100 that another execution mode of the present utility model provides.Wherein, transport module 102 can be following in one or more: wireless network transmission module, Bluetooth communication modules and NFC transport module.
(1) transport module 102 can be wireless network transmission module.In this execution mode, mobile terminal 103 can be the mobile terminal with wireless network transmission-receiving function.This wireless network can be Wifi, GPRS or 3G network etc.Thus, mobile terminal 103 can read identification code by wireless network from transport module 102, to carry out the certification of client identity.
(2) transport module 102 can be Bluetooth communication modules.In this execution mode, mobile terminal 103 can be the mobile terminal with Bluetooth function.Mobile encrypted authenticate device 100 with can carry out pairing by Bluetooth transmission between mobile terminal 103 and be connected, and in Bluetooth transmission mode, identification code is sent to mobile terminal 103 to carry out the certification of user identity.
(3) transport module 102 can be NFC transport module.In this execution mode, mobile terminal 103 can be the mobile terminal with NFC function.During use, can make mobile encrypted authenticate device 100 and mobile terminal 103 adjacent to each other, by NFC transport module, identification code is sent to mobile terminal 103, to carry out certification to user identity.
From the above mentioned, this mobile encrypted authenticate device 100 makes the hardware encipher certification can being carried out user identity in mobile terminal 103 by communication, thus make the mode of hardware encipher certification have more flexibility, especially the mobile terminal that USB interface is not set can be made to be encrypted certification by the mode of hardware encipher to user identity, thus to strengthen the fail safe of user authentication in the mobile terminal that USB interface is not set.
Preferably, Fig. 4 is the structured flowchart of the mobile encrypted authenticate device 100 that another execution mode of the present utility model provides.In Fig. 4, this mobile encrypted authenticate device 100 can also comprise identification module 401, and this identification module 401 can be connected with authentication module 101, is configured to receive user's input, identify user's input information, and this user's input information is sent to authentication module 101.Wherein, this authentication module 101 can also be configured to store secret key, and described user's input information is encrypted calculating by secret key, generates described identification code.
The various execution modes of identification module 401 are described below in detail.Fig. 5 is the schematic diagram of the mobile encrypted authenticate device that another execution mode of the present utility model provides.Fig. 6 is the schematic diagram of the mobile encrypted authenticate device that another execution mode of the present utility model provides.Wherein, mobile terminal 103 can be mobile phone.
Identification module 401 in the utility model can be following in one or more: password identification module, rhythm identification module, fingerprint identification module, iris recognition module and gesture recognition module.
(1) identification module 401 can be password identification module.This password identification module can comprise one group of button 501 and the first processing module (not shown).Each button 501 has been marked the one in numeral (such as, 0 ~ 9), letter (such as, a ~ z) and color (such as, red, yellow, blue).This group of button 501 can be configured to receive described user input, and generation inputs corresponding key information with described user.One group of button 501 can have multiple, for three buttons 501 in Fig. 5 and Fig. 6, also can arrange more than three buttons 501 in mobile encrypted authenticate device 100.During use, user generates key information by pressing different buttons 501.First processing module can be configured to receive described key information, and identifies described user's input information according to this key information, and this user's input information is sent to described authentication module 101.This user's input information is encrypted calculating by the secret key be stored in authentication module 101, generates identification code, is sent to mobile terminal 103, thus carries out the certification of user identity via transport module 102.
(2) identification module 401 can be rhythm identification module.This rhythm identification module comprises user's input module and the second processing module.Described user's input module can comprise button 501 and/or touch-screen 502.User's input module can be configured to receive described user input.Particularly, at least one button 501 can be set in mobile encrypted authenticate device 100.During use, user can generate user's input with certain rhythm pressing keys 501 or touch-screen 502.Such as, this rhythm is with about 1s, 1s, 1s, 2s, 1s, 1s, 1s, 2s ... the time interval pressing keys 501 of circulation like this.This user input can also be sent to the second processing module by user's input module.This second processing module is configured to record the time receiving described user input, and identifies described user's input information according to the recorded time, and this user's input information is sent to described authentication module 101.Afterwards, this user's input information is encrypted calculating by the secret key be stored in authentication module 101, generates identification code.This identification code is sent to mobile terminal 103 via transport module 102, thus carries out the certification of user identity.
In another embodiment, mobile encrypted authenticate device 100 also can be configured with password identification module and rhythm identification module simultaneously, by identifying the fail safe strengthening password further to the time of press key contents and button.
(3) identification module 401 can be fingerprint identification module.In this embodiment, user can input information by pressing at least one fingerprint in this fingerprint identification module.Like this, user is with after the mode input information of pressing fingerprint, and this fingerprint identification module converts thereof into digital signal, and the identification code that this digital signal generates after computations is sent to mobile terminal 103 via transport module 102, thus carries out the certification of user identity.
(4) identification module 401 can be iris recognition module.In this embodiment, as long as before eyes being placed on iris recognition module in certain distance, user's input just can be generated.This iris recognition module can identify this user input.Then, the identification code that the user's input information identified generates by identification module 401 after computations is sent to mobile terminal 103 via transport module 102, thus carries out the certification of user identity.
(5) identification module 401 can be gesture recognition module.In this embodiment, gesture recognition module can comprise camera and the 3rd processing module.As long as user makes corresponding gesture (such as, from top to bottom, from left to right, first from top to bottom after from right to left etc.) and just can generate user and input in face of this camera.By the 3rd processor module, these gestures are identified.Alternatively, this gesture recognition module also can comprise touch-screen 502 and the 4th processing module.User can slide with certain orientation with finger and make various gesture on this touch-screen 502.4th processing module can identify the gesture of this slip.Finally, the identification code that the user's input information identified generates by identification module 401 after computations is sent to mobile terminal 103 via transport module 102, carries out the certification of user identity.
Be understandable that, the numerous embodiments of above identification module 401 also can use wherein simultaneously two or more.If select numerous embodiments input encrypted message, then can be set to the certification that simultaneously must meet multiple input information, just by final certification.The mode of this multiple authentication can increase the fail safe of certification further.
Above-mentioned preferred implementation makes authenticated client on the basis of hardware encipher, adds the input information of user, i.e. the further encryption of dynamic password, particularly adopts the biological identification technology such as fingerprint and iris.This preferred implementation is encrypted calculating and generates identification code by the various forms of input information chosen flexibly being added secret key and carry out certification, further enhancing the fail safe of certification, adds Consumer's Experience.
Be understandable that, the various execution modes of identification module 401 and transport module 102 can be selected respectively according to concrete environmental condition.And can combination in any.
By technique scheme, the identification code of representative of consumer identity is sent to mobile terminal 103 by non-usb mode by the mobile encrypted authenticate device 100 that the utility model provides.This mobile encrypted authenticate device 100 makes the 103 hardware encipher certifications can being carried out user identity by multiple connected mode in the terminal, thus make the mode of hardware encipher certification have more flexibility, especially the mobile terminal that USB interface is not set can be made to be encrypted certification by the mode of hardware encipher to user identity, thus to strengthen the fail safe of user authentication in the mobile terminal that USB interface is not set.
Below preferred implementation of the present utility model is described by reference to the accompanying drawings in detail; but; the utility model is not limited to the detail in above-mentioned execution mode; within the scope of technical conceive of the present utility model; can carry out multiple simple variant to the technical solution of the utility model, these simple variant all belong to protection range of the present utility model.
It should be noted that in addition, each the concrete technical characteristic described in above-mentioned embodiment, in reconcilable situation, can be combined by any suitable mode.Such as, password identification module and rhythm identification module are combined.In order to avoid unnecessary repetition, the utility model illustrates no longer separately to various possible compound mode.
In addition, also combination in any can be carried out between various different execution mode of the present utility model.Such as, wireless network transmission module and gesture recognition module are combined.As long as it is without prejudice to thought of the present utility model, it should be considered as content disclosed in the utility model equally.

Claims (10)

1. a mobile encrypted authenticate device, this device comprises:
Authentication module, is configured to the identification code of representative of consumer identity to be sent to transport module; And
Described transport module, is connected with described authentication module, is configured to the described identification code received to be sent to a mobile terminal,
It is characterized in that, described transport module is configured to, by non-universal serial bus usb mode, described identification code is sent to described mobile terminal.
2. device according to claim 1, is characterized in that, described mobile terminal is the mobile terminal not being provided with general-purpose serial bus USB interface.
3. device according to claim 1, is characterized in that, described mobile terminal is mobile phone or panel computer.
4. device according to claim 1, is characterized in that, described transport module is Mike's microphone interface and/or micro-USB Micro USB interface.
5. device according to claim 1, is characterized in that, described transport module be following in one or more: wireless network transmission module, Bluetooth communication modules and near-field communication NFC transport module.
6. device according to claim 1, is characterized in that, this device also comprises:
Identification module, is connected with described authentication module, is configured to receive user's input, identifies user's input information, and this user's input information is sent to described authentication module,
Wherein, described authentication module is also configured to store secret key, described user's input information is encrypted calculating by described secret key, generates described identification code.
7. device according to claim 6, is characterized in that, described identification module be following in one or more: password identification module, rhythm identification module, fingerprint identification module, iris recognition module and gesture recognition module.
8. device according to claim 7, is characterized in that, described password identification module comprises:
One group of button, each button is marked the one in numeral, letter and color, is configured to receive described user input, and generation inputs corresponding key information with described user; And
First processing module, is configured to receive described key information, and identifies described user's input information according to this key information, and this user's input information is sent to described authentication module.
9. device according to claim 7, is characterized in that, described rhythm identification module comprises:
User's input module, is configured to receive described user input, and this user input is sent to the second processing module; And
Described second processing module, is configured to record the time receiving described user input, and identifies described user's input information according to the recorded time, and this user's input information is sent to described authentication module.
10. device according to claim 9, is characterized in that, described user's input module comprises button and/or touch-screen.
CN201420397061.1U 2014-07-17 2014-07-17 Mobile encrypted authenticate device Expired - Fee Related CN204069000U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201420397061.1U CN204069000U (en) 2014-07-17 2014-07-17 Mobile encrypted authenticate device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201420397061.1U CN204069000U (en) 2014-07-17 2014-07-17 Mobile encrypted authenticate device

Publications (1)

Publication Number Publication Date
CN204069000U true CN204069000U (en) 2014-12-31

Family

ID=52210439

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201420397061.1U Expired - Fee Related CN204069000U (en) 2014-07-17 2014-07-17 Mobile encrypted authenticate device

Country Status (1)

Country Link
CN (1) CN204069000U (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105704302A (en) * 2015-12-24 2016-06-22 深圳灵感家科技发展有限公司 Device for encrypting intelligent terminal application and encryption method
CN105760730A (en) * 2015-07-15 2016-07-13 石家庄蜗牛科技有限公司 System for mobile control and information protection through external iris recognition device
CN107430688A (en) * 2015-03-11 2017-12-01 北京释码大华科技有限公司 Iris authentication annex and system
CN107466407A (en) * 2017-07-20 2017-12-12 深圳市汇顶科技股份有限公司 A kind of fingerprint verification method, device and electronic equipment
CN109635906A (en) * 2018-12-07 2019-04-16 深圳市集虹鼎源科技有限公司 Two-dimensional code generation method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107430688A (en) * 2015-03-11 2017-12-01 北京释码大华科技有限公司 Iris authentication annex and system
CN105760730A (en) * 2015-07-15 2016-07-13 石家庄蜗牛科技有限公司 System for mobile control and information protection through external iris recognition device
CN105704302A (en) * 2015-12-24 2016-06-22 深圳灵感家科技发展有限公司 Device for encrypting intelligent terminal application and encryption method
CN107466407A (en) * 2017-07-20 2017-12-12 深圳市汇顶科技股份有限公司 A kind of fingerprint verification method, device and electronic equipment
WO2019014905A1 (en) * 2017-07-20 2019-01-24 深圳市汇顶科技股份有限公司 Fingerprint authentication method, device and electronic apparatus
CN109635906A (en) * 2018-12-07 2019-04-16 深圳市集虹鼎源科技有限公司 Two-dimensional code generation method and device

Similar Documents

Publication Publication Date Title
CN106779636B (en) Block chain digital currency wallet based on mobile phone earphone interface
CN103793815B (en) Mobile intelligent terminal acquirer system and method suitable for bank cards and business cards
US10867027B2 (en) System and method for pin entry on mobile devices
CN204069000U (en) Mobile encrypted authenticate device
CN103001773A (en) Fingerprint authentication system and fingerprint authentication method based on near field communication (NFC)
CN202004846U (en) Cellphone shield capable of protecting mobile payment security
CN103747001A (en) Audio-access mobile payment terminal based on security algorithm and communication method based on security algorithm
CN102768744A (en) Remote safe payment method and system
CN103606047A (en) Password management system
CN110378097A (en) Ensure sensing data safety
US20220239509A1 (en) Method for storing and recovering key for blockchain-based system, and device therefor
CN102710611A (en) Network security authentication method and system
WO2017020468A1 (en) Data exchange method and apparatus for composite smart card device
WO2017076270A1 (en) Smart card having function of one time password (otp), and work method therefor
CN104935550A (en) Intelligent electronic commerce user management system technique and operating method thereof
CN203104483U (en) Fingerprint authentication platform and NFC application terminal
US20190028470A1 (en) Method For Verifying The Identity Of A Person
Wong et al. An enhanced user authentication solution for mobile payment systems using wearables
CN204028917U (en) A kind of Bluetooth encryption device and application for network payment
CN202008672U (en) E-commerce transaction safety terminal
CN102184354A (en) Method for preventing data from being falsified and hijacked in online payment
KR20110030515A (en) Security token device and method of authentication usable in smartphone
CN108932441A (en) The operation method and computing device of safety keyboard system, safety keyboard
Singh Multi-factor authentication and their approaches
CN201207651Y (en) USB digital autograph device

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20141231

Termination date: 20200717

CF01 Termination of patent right due to non-payment of annual fee