TW582156B - Method of authenticating user - Google Patents

Method of authenticating user Download PDF

Info

Publication number
TW582156B
TW582156B TW90110428A TW90110428A TW582156B TW 582156 B TW582156 B TW 582156B TW 90110428 A TW90110428 A TW 90110428A TW 90110428 A TW90110428 A TW 90110428A TW 582156 B TW582156 B TW 582156B
Authority
TW
Taiwan
Prior art keywords
authentication
patent application
scope
logic
server
Prior art date
Application number
TW90110428A
Other languages
Chinese (zh)
Inventor
Paul Lin
Original Assignee
Authenex Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Authenex Inc filed Critical Authenex Inc
Application granted granted Critical
Publication of TW582156B publication Critical patent/TW582156B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

Authentication of a user is accomplished by an exchange including an electronic serial number, a plurality of substring designations, and a calculated authentication string. A user and an authentication authority each possess an identification string associated with the electronic serial number. By applying one or more operations, some of which may be exchanged across a network and others of which may be associated with the electronic serial number, a different authentication string can be calculated each time authentication is requested, making the methods and devices practicing this invention resistant to efforts to compromise the authentication.

Description

582156 Α7 Β7 五、發明説明(1 ) 發明背景 在電腦網路及電子商務的世界中,使用者之認證及通 訊之加密是關鍵的考量。使用者認證及加密之最常使用及 標準化的基準之一是一種公共密输(public key )系統。公 共密鑰系統之使用者被指定一公共密鑰及一私人密鑰。公 共密鑰係公佈給其他人之使用。私人密鑰係由一使用者所 安裝且不會經由網路而傳輸,除非(可能)當私人密鑰被 最初地發給或安裝時。於上下文(context )電子郵件中, 其安裝通常關連與私人密鑰及一電子郵件位址。安裝程序 常是很麻煩的。私人密鑰並非讓使用者從某一機器移至另 一機器時使用。於是企盼發展一·種可攜式的密鑰系統,其 可輕易地讓使用者從某一機器至另一機器安裝並執行,而 保留其某一關鍵秘密(例如私人密鑰)不會被使用者所傳 輸的特徵。 可攜式使用者認證之產品家族被銷售以ACTIVCARD之 商標。一種智慧卡產品被銷售以ACTIVCARD GOLD之商標 。一種需要鍵入PIN碼之小型鍵盤(keypad )被銷售以 ACTIVCARD ONE之商標。其可能有關公司科技之 ACTIVCARD所擁有的專利包含美國專利編號5,9;37,()08 、 5,887,065、5,802,1 76 及 5,737,421。如公司網站( www.activcard.com/products/enduser)上所述,智慧卡產品 可由讀取器所取得,且相容與任何PC/SC智慧卡讀取器。 其網站上所描述之產品係執行板上的使用者資料以及認證 ,且能夠被用於從開門到網路使用者認證等任何事項。,網 本紙張尺度適用中.國國家標準(CNS ) Α4規格(210Χ297公釐) 一 ' -4- (請先間讀背面之注意事項再填寫本頁) |裝- *1Τ 經濟_部智慧財產局員工消費合作社印製 582156 A7 B7 五、發明説明(2 ) 站上所述之企業憑證(c r e d e n t i a 1 s )可被執行於智慧卡, 包含動態暗語、企業數位簽名、靜態憑證及(未來某一天 )企業電子現金。當使用者鍵入暗語或PIN碼時,則智慧 卡產生一動態暗語、一靜態暗語或者一數位憑證。再次從 網站上得知,其動態暗語可被產生依據一 ActiveCard專利 的機構或者X9.9標準。其電池可能需於每兩年更換。介於 智慧卡與伺服器之間的訊息交換之協定未描述於公司的網 站上。此爲一相當昂貴的系統,其被設計以利專業網路管 理者實施。其既不便宜又不易實施。 第二種ACTIVCARD產品具有小型鍵盤及LCD顯示。網 站上描述其產生並顯示一動態喑語。使用者從LCD抄錄( transcribes )暗語至一註冊(logon )螢幕。如同第一種產 品,其似乎被設計以利專業網路管理者實施且必須於兩年 後更換電池。假如電池削弱時,則卡可能喪失與伺服器之 同步化而無法產生適當之隨時間變化的暗語。其係相當昂 貴’不易實施且煩勞使用者將暗語抄錄至電腦系統。於是 更企望有一種低價製造的、迷你的安全系統,其保留用以 辨識使用者之認證訊息係經常改變的特徵。 發明槪述 本發明包含一種認證之裝置及方法。於一實施例中, 提供一含有邏輯及資源之密鑰。資源包含一介面、一處理 器、及記憶體,以處理邏輯、暗語、電子序號(“ESN")及 辨識墊。邏輯處理其來自介面之暗語以使得密鑰可作甩。 本紙張尺度適崩中國國家標準(CNS ) A4規格(210X297公釐) (請先閲讀背面之注意事項再填寫本頁) |裝. ,11 經濟部智慧財1局員工消費合作社印製 -5- 582156 A7 _ ___ B7 _^_ 五、發明説明(3 ) 邏輯藉由ESN以辨識密鑰。其接收一請求以執行對於一個 以上指定之子字串的一個以上認證運算(operations)並產 生一認證字串。認證字串被供應至介面。ESK及認證字串 可被同時地傳輸或者以ESN、請求、認證字串之順序。 ESN及辨識墊最好是於製造時被固定於密鑰中。邏輯 及資源不容許密鑰修改ESN或辨識墊。邏輯及資源不容許 存取辨識墊。本發明之一型態可爲一混亂運算於製造時被 固定於密鑰中,其被應用於預定條件下之指定的子字串。 邏輯及資源可進一步包含一個以上的計時延遲。一暗 語計時延遲邏輯可引入第一延遲於預定數目的暗語項( entries )之間,以及第二延遲於預定數目的暗語項之後, 以有效地減緩暗語項之處理程序。認證計時延遲邏輯可引 入認證延遲於暗語處理程序與請求處理程序之間。 密鑰之另一型態可包含無法擷取(irretrievable)的暗 語指派(assignment )。密鑰之邏輯及資源可要求使用者 設定暗語,其被固定於記憶體中且無法透過介面而擷取。 暗語之固定於記億體中最好是透過介面而被通報以啓動密 鑰。邏輯及資源不得容許暗語被改變。 邏輯可限制其可容許的運算及子字串。其可能需要多 數運算。其可拒絕辨識運算,例如加入零、乘以壹或者與 零之字串執行邏輯地“或”。 本發明之進一步實施例包含一密鑰及終端機。終端機 可包含一網路連接。密鑰之介面連接至終端機,最好是藉 由一 USB連接。密鑰可控制·終端機,無論是下載程式碼、 本紙張尺度適用中周國家標準(CNS ) A4規格(210X297公嫠) " ' " " - -6- (請先閲讀背面之注意事項再填寫本頁) 、一^1 經濟部智慧財產局員工消費合作社印製 •I-- 582156 A7 B7 五、發明説明(4 ) 喚起終端機之固有資源或者喚醒安裝於終端機上之特別資 源以支援密鑰。密鑰及終端機可能於最初要求使用者設定 暗語以啓動密鑰。終端機可經由其網路連接(例如網際網 路連接)以宣告密鑰之啓動。 密鑰及終端機可透過網路而被連接與一初始化伺服器 。密鑰之邏輯及資源可能需要一介於終端機與初始化伺服 器之間的有效連接以設定暗語並啓動密鑰。 終端機可包含一交易伺服器。終端機另可透過網路而 連接與一交易伺服器。交易伺服器可爲一現金收銀機、 POS終端機、EC伺服器、網路伺服器、或任何需要使用者 之辨識的其他裝置。交易伺服器可產生認證運算及子字串 指定,或者可傳遞其來自另一來源之終端機運算及指定。 認證系統可包含密鑰、終端機、交易伺服器及認證伺 服器。交易伺服器可倂入終端機中或者透過網路而連接。 交易伺服器最好是藉由一可靠的連接以連接至認證伺服器 。此可靠的連接可爲一實體的安全連接(例如局部匯流排 或局部區域網路)、一加密的連接(例如虛擬的私人網路 )、一具有數位簽名訊息之認證連接、或者任何其他可信 任的連接。終端機可以僅通連與交易伺服器或者與交易及 認證,伺服器。認證伺服器包含ESNs及辨識墊之一表列。 一種認證伺服器可實施本發明。此認證伺服器可包含 資源及邏輯以互動與一使用者系統並認證一使用者。資源 可包含一介面、一處理器、及記憶體,以處理邏輯及ESN 與辨識墊之一表列。邏輯係處理來自介面之ESN,指定’一 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) (請先聞讀背面之注意事項再填寫本頁)582156 Α7 Β7 V. Description of the invention (1) Background of the invention In the world of computer networks and e-commerce, user authentication and encryption of communications are key considerations. One of the most commonly used and standardized benchmarks for user authentication and encryption is a public key system. Users of a public key system are assigned a public key and a private key. Public keys are published for use by others. The private key is installed by a user and will not be transmitted over the network unless (possibly) when the private key was originally issued or installed. In context email, its installation is usually associated with a private key and an email address. Installation procedures are often cumbersome. The private key is not intended to be used when the user moves from one machine to another. Therefore, I hope to develop a portable key system that can easily allow users to install and execute from one machine to another, while retaining a key secret (such as a private key) will not be used Characteristics transmitted by the author. The portable user-certified product family is sold under the ACTIVCARD trademark. A smart card product is sold under the trademark ACTIVCARD GOLD. A keypad that requires a PIN code is sold under the trademark ACTIVCARD ONE. Its possible patents related to ACTIVCARD of the company's technology include US Patent Nos. 5,9; 37, () 08, 5,887,065, 5,802,176, and 5,737,421. As stated on the company's website (www.activcard.com/products/enduser), smart card products are available from readers and are compatible with any PC / SC smart card reader. The products described on its website are user information and authentication on the executive board, and can be used for everything from door opening to online user authentication. The standard of netbook paper is applicable. National National Standard (CNS) Α4 specification (210 × 297 mm) A '-4- (Please read the precautions on the back before filling this page) | Packing-* 1Τ Economy_Ministry of Intellectual Property Printed by the Bureau ’s Consumer Cooperatives 582156 A7 B7 V. Description of the Invention (2) The enterprise credential (credentia 1 s) described on the station can be executed on the smart card, including dynamic code words, enterprise digital signatures, static credentials, and (some day in the future ) Enterprise electronic cash. When the user enters the password or PIN, the smart card generates a dynamic password, a static password, or a digital certificate. Once again from the website, its dynamic code words can be generated according to an ActiveCard patented institution or the X9.9 standard. Its battery may need to be replaced every two years. The protocol for exchanging messages between the smart card and the server is not described on the company's website. This is a fairly expensive system that is designed to be implemented by a professional network administrator. It is neither cheap nor easy to implement. The second ACTIVCARD product has a small keyboard and LCD display. The website describes its generation and displays a dynamic slang. The user transcribes the secret words from the LCD to a logon screen. Like the first product, it appears to be designed for professional network managers to implement and must replace the battery after two years. If the battery is weakened, the card may lose synchronization with the server and fail to produce appropriate passwords that change over time. It ’s quite expensive, it ’s not easy to implement, and it is troublesome for users to transcribe passwords to computer systems. Therefore, it is even more desirable to have a low-cost, mini-security system that retains the frequently changing characteristics of the authentication information used to identify the user. Summary of the Invention The present invention includes a device and method for authentication. In one embodiment, a key containing logic and resources is provided. The resource includes an interface, a processor, and memory to process logic, code words, electronic serial numbers ("ESN "), and identification pads. The logic processes the code words from the interface to make the key usable. China National Standard (CNS) A4 specification (210X297 mm) (Please read the precautions on the back before filling out this page) | Packing., 11 Printed by the Employee Consumer Cooperative of the 1st Bureau of Smart Finance of the Ministry of Economic Affairs -5- 582156 A7 _ ___ B7 _ ^ _ 5. Description of the invention (3) The logic uses the ESN to identify the key. It receives a request to perform more than one authentication operation on more than one specified substring and generates an authentication string. The authentication string It is supplied to the interface. ESK and authentication string can be transmitted simultaneously or in the order of ESN, request, and authentication string. The ESN and identification pad are preferably fixed in the key at the time of manufacture. Logic and resources do not allow secrets The key modifies the ESN or identification pad. Logic and resources do not allow access to the identification pad. One form of the present invention may be a chaotic operation that is fixed in the key at the time of manufacture, and is applied to a specified child under predetermined conditions. Logic and resources may further include more than one timing delay. A password timing delay logic may introduce a first delay between a predetermined number of password entries and a second delay after a predetermined number of password entries to be effective. Slows down the processing of cryptographic items. Authentication timing delay logic can introduce authentication delays between cryptographic processing and request processing. Another type of key can include irretrievable cryptographic assignments. The logic and resources of the key can require the user to set a password, which is fixed in the memory and cannot be retrieved through the interface. The password is fixed in the memory and is preferably reported through the interface to activate the key. Logic and The resource must not allow the code to be changed. Logic may limit its allowable operations and substrings. It may require majority operations. It may reject identifying operations such as adding zeros, multiplying by one, or performing a logically "or" with a string ". A further embodiment of the present invention includes a key and a terminal. The terminal may include a network connection. The interface is connected to the terminal, preferably through a USB connection. The key can control the terminal, whether it is downloading code, this paper size is applicable to the China National Standards (CNS) A4 specification (210X297) 嫠 " ' " "--6- (Please read the precautions on the back before filling out this page), 1 ^ 1 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs • I-- 582156 A7 B7 V. Description of the invention (4) Arouse The inherent resources of the terminal or wake up the special resources installed on the terminal to support the key. The key and the terminal may initially require the user to set a password to activate the key. The terminal can announce the activation of the key via its network connection (such as an Internet connection). The key and terminal can be connected to an initialization server via the network. The key logic and resources may require a valid connection between the terminal and the initialization server to set the password and activate the key. The terminal may include a transaction server. The terminal can also be connected to a transaction server via the network. The transaction server may be a cash register, a POS terminal, an EC server, a web server, or any other device that requires user identification. The transaction server can generate authentication operations and substring assignments, or it can pass terminal operations and assignments from another source. The authentication system can include keys, terminals, transaction servers, and authentication servers. The transaction server can be plugged into a terminal or connected via the Internet. The transaction server is preferably connected to the authentication server via a reliable connection. This reliable connection can be a physical secure connection (such as a local bus or local area network), an encrypted connection (such as a virtual private network), an authenticated connection with a digitally signed message, or any other trusted Connection. The terminal can only communicate with the transaction server or with the transaction and authentication server. The authentication server includes a list of ESNs and identification pads. An authentication server can implement the present invention. The authentication server may include resources and logic to interact with a user system and authenticate a user. Resources can include an interface, a processor, and memory to process logic and a list of ESNs and identification pads. The logic system handles the ESN from the interface and specifies ‘one paper size applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) (please read the precautions on the back before filling this page)

•IT 經濟部智慧財產局員工消費合作社印製 582156 A7 B7 五、發明説明(5 ) 個以上之子字串,指明一個或更多指定之子字串上的一組 運算至介面,接收來自介面之一認證字串,及決定其回應 是否爲真實的。邏輯可決定其ESN目前是否有效,在處理 認證之前。其可根據不成功的認證請求以執行一延遲或鎖 定(lockout ) 〇 認證伺服器僅可透過一可靠的連接以存取,或者其可 透過一不安全的網路以接收認證請求自一未被認證的資源 。認證伺服器可藉由任何安全協定以產生一認證。 經濟部智慧財產局員工消費合作社印製 丨.^--Ipt.—· (請先閑讀背面之注意事tf#填寫本頁,> Φ. 本發明另可被槪述於申請專利範圍中。一種實施本發 明之裝置係認證密鑰,其包含一處理器、輸入/輸出介面、 一電子序號及可存取至處理器之辨識字串,及利用處理器 之邏輯以接收子字串指定來回應其本身辨識與一電子序號 ,計算其執行應用子字串指定至辨識字串之一個以上運算 的結果,並輸出此結果。本發明之一型態係其處理器、電 子序號及辨識字串應被嵌入單一晶片上或者置於單組半導 體基底上,以達成安全之需求。認證密鑰之形狀因素( form factor )可爲一種標準的信用卡或者一適用於附加至 鑰匙環之較小形狀因素。應用至子字串指定之運算可爲任 何運算,例如加、減、乘、除或邏輯運算(例如互斥或) 。這些運算可被嵌入裝置中或者可接收自一外界來源,或 者其兩者之組合。利用處理器之邏輯可提供安全性服務, 此需於最初設定一暗語並於每次使用裝置時鍵入。設定暗 語可限定於當裝置係通連與一啓動認證密鑰之初始化伺服 器時的環境。用以設定暗語之邏輯可防止密碼被改變、•存 本^氏張尺度適用中國國家標準dNS ) A4規格(210X297公釐) 一 - -8 - 582156 經濟部智慧財產局員工消费合作社印製 A7 B7 五、發明説明(6 ) 取或還原,一旦其設定之後。利用處理器之邏輯應防止我 們存取至內嵌辨識字串之還原。 一種實施本發明之額外的裝置可包括一連接至網路的 終端機,一包含處理器、電子序號及辨識字串之認證密鑰 ,及利用處理器之邏輯。邏輯可接收多數子字串指定以回 應其本身辨識與一電子序號。其可計算一執行應用子字串 指定至辨識字串之一個以上運算的結果,且可利用通用串 列匯流排協定以通連與終端機。此認證系統之額外的型態 可結合認證密鑰中所包含之相同特徵。 一種實施本發明之方法(其利用電子序號及辨識字串 )可包含以下步驟:傳輸一電子序號、接收多數子字串指 定、應用一個以上之運算至指定的子字串以計算一結果、 及傳輸此結果。此方法之額外型態可包含接收一個以上之 運算指定及應用所接收之運算指定和內嵌之運算指定的組 合以計算一結果。此方法可包含提供安全性服務,例如需 於最初設定一暗語且每當請求認證時鍵入之。設定暗語可 被限定於當存在有效通訊於用戶端與初始化伺服器之間時 的環境。 一種通連與用戶且通連與授權伺服器之交易伺服器亦 可實施本發明。此一交易伺服器包含一處理器及利用處理 器之邏輯,以接收且識別一電子序號並將該電子序號從用 戶端傳遞至授權伺服器,從伺服器傳遞多數子字串指定至 用戶端,從用戶端傳遞一認證字串至伺服器,及接收授權 自伺服器,其係根據成功的認證。交易伺服器亦可傳遞’一 本紙張尺度適用中國國家標準( CNS ) A4規格(210X297公釐) (請先閲讀背面之注意事項再填寫本頁)• Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of IT and Economy 582156 A7 B7 V. Description of the invention (5) More than five substrings, indicating a set of operations on one or more specified substrings to the interface, receiving one from the interface The authentication string and determine if its response is authentic. Logic determines whether its ESN is currently valid before processing authentication. It can perform a delay or lockout based on an unsuccessful authentication request. The authentication server can only be accessed through a reliable connection, or it can receive authentication requests through an unsecured network. Certified resources. The authentication server can generate an authentication by any security protocol. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 丨. ^-Ipt.— · (Please read the notice on the back tf # to fill out this page, > Φ. The invention can also be described in the scope of patent application A device implementing the present invention is an authentication key, which includes a processor, an input / output interface, an electronic serial number, and an identification string accessible to the processor, and uses the processor's logic to receive a substring designation It responds to its own identification and an electronic serial number, calculates the result of performing one or more operations specified by the application substring to the identification string, and outputs the result. One form of the invention is its processor, electronic serial number, and identification word The string should be embedded on a single chip or placed on a single set of semiconductor substrates to achieve security requirements. The form factor of the authentication key can be a standard credit card or a smaller shape suitable for attaching to a key ring Factors. The operations applied to the substring designation can be any operation, such as addition, subtraction, multiplication, division, or logical operations (such as mutual exclusion or). These operations can be embedded in the device or accessible From an external source, or a combination of the two. The processor logic can be used to provide security services. This requires initial setting of a password and typing in each time the device is used. Setting the password can be limited to when the device is connected and connected. The environment for initializing the server when the authentication key is activated. The logic used to set the password can prevent the password from being changed. • The saved version is applicable to the Chinese national standard dNS) A4 specification (210X297 mm) 1--8- 582156 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs A7 B7 V. Description of Invention (6) Take or restore once it is set. The use of processor logic should prevent our access to the restoration of the embedded recognition string. An additional device for implementing the present invention may include a terminal connected to a network, an authentication key including a processor, an electronic serial number and an identification string, and logic using the processor. The logic can receive most substring designations in response to its own identification and an electronic serial number. It can calculate the result of performing one or more operations specified by the application substring to the recognition string, and can use the universal serial bus protocol to communicate with the terminal. The additional form of this authentication system can be combined with the same characteristics contained in the authentication key. A method for implementing the present invention (which uses an electronic serial number and an identification string) may include the following steps: transmitting an electronic serial number, receiving a majority of substring designations, applying more than one operation to the designated substring to calculate a result, and Transfer this result. An additional form of this method may include receiving more than one operation specification and applying a combination of the received operation specification and the embedded operation specification to calculate a result. This method may include providing security services, such as requiring a password to be initially set and entered whenever authentication is requested. The setting password can be limited to the environment when there is effective communication between the client and the initialization server. A transaction server connected to the user and connected to the authorization server can also implement the present invention. This transaction server includes a processor and logic using the processor to receive and identify an electronic serial number and pass the electronic serial number from the client to the authorization server, and pass most substrings from the server to the client. Passing an authentication string from the client to the server and receiving authorization from the server are based on successful authentication. The transaction server can also pass a ’one paper size to the Chinese National Standard (CNS) A4 specification (210X297 mm) (Please read the precautions on the back before filling this page)

-9- 582156 A7 B7 五、發明説明(7 ) 個以上之運算指定,除了傳遞多數子字串指定之外。 (請先閲讀背面之注意事項再填寫本頁) 實施本發明之一種額外的方法可包含下列步驟:從一 用戶端接收及識別電子序號並傳遞該序號至一伺服器’從 伺服器傳遞多數子字串指定至用戶端,從用戶端傳遞一認 證字串至一伺服器,及接收一授權而無須伺服器。此方法 亦可包含傳遞一個以上之運算指定’除了傳遞多數子字串 指定之外。 一種認證伺服器亦可實施本發明。認證伺服器可包括 ••一具有輸入/輸出介面之處理器、記錄電子序號及記錄辨 識字串之列、以及利用處理器之邏輯。此邏輯可用以接收 一特定的電子序號、選擇並傳送一個以上的運算指定、接 收一認證字串、及比較認證字串與一藉由應用一個以上運 算至記錄辨識字串之多數指定子字串所計算的結果。利用 處理器之邏輯的一種型態可選擇並傳送運算以執行於指定 的子字串上。這些指定的運算可結合與一個以上的混亂運 算以計算其結果。 經濟部智慧財產局員工消費合作社印製 一種特別適於認證伺服器所使用的方法可利用一記錄 電子序號及記錄辨識字串之列。其可包含下列步驟:接收 一特定的電子序號、選擇並傳送多數子字串指定、接收一 認證字串、應用一個以上運算至指定的子字串、及比較認 證字串與其計算的結果。本發明之一型態可爲其認證伺服 器選擇並傳送運算指定,其被依序地使用以計算一記錄結 果。一種包含已傳送之指定運算以及非傳送爲本方法之部 分之內嵌混亂運算的組合可·被應用至指定的子字串以計"算 本紙張尺度適用中國國家標準(CNS ) A4規格(21(^297公着1 ' ~~ •10- 經濟部智慧財產局員工消費合作社印製 582156 A7 B7 五、發明説明(8 ) 記錄結果。 一種實施本發明之總認證系統可包含一授權伺服器、 一交易伺服器,其具有一條與授權伺服器之可靠連結、及 一認證密鑰以通連與交易伺服器。本發明之此實施例中的 授權伺服器可包含記錄電子序號與記錄辨識字串之一列, 及邏輯以輸入一電子序號、選擇並輸出多數子字串指定、 輸入一認證字串、計算其執行於指定子字串上之一個以上 運算的記錄結果、及比較認證字串與記錄結果。本發明之 此實施例中的交易伺服器可包含邏輯以傳遞電子序號至授 權伺服器、傳遞來自授權伺服器之多數子字串指定、傳遞 授權字串至授權伺服器、及接收一成功的認證訊息自認證 伺服器。本發明之此實施例中的認證密鑰可包含一電子序 號、一辨識字串、及邏輯以輸出電子序號,輸入多數子字 串指定,計算認證字串,及輸出認證字串。此總認證系統 之每個元件可包含一處理器。其邏輯及每個元件可利用處 理器且可通連與一個以上之其他元件的處理器。 一種實施本發明之總方法可包含下列步驟:從用戶端 傳送一特定的電子序號至伺服器、從伺服器傳送多數子字 串指定至用戶端、應用一個以上運算至記錄辨識字串之指 定的子字串以計算一記錄結果、及比較認證字串與計算結 果。於此實施例中,計算可依任何順序或者同時地執行於 用戶端及伺服器上。伺服器無須等待以接收一認證字串, 在應用運算至記錄辨識字串以計算記錄結果之則。本發明 之一型態可爲伺服器選擇並傳送運算指定,其被依序地使 本紙張尺度適用中,國國家標準(CNS ) A4規格(210 X 297公釐) (請先閲讀背面之注意事項再填寫本頁)-9- 582156 A7 B7 V. Description of the invention (7) More than 7 operation designations, except for passing most substring designations. (Please read the notes on the back before filling out this page) An additional method of implementing the present invention may include the following steps: receiving and identifying an electronic serial number from a client and passing the serial number to a server. 'Pass the majority from the server The string is specified to the client, an authentication string is passed from the client to a server, and an authorization is received without the server. This method may also include passing more than one operation designation 'in addition to passing most substring designations. An authentication server can also implement the present invention. The authentication server may include a processor with an input / output interface, a record of electronic serial numbers and a record of identification strings, and logic utilizing the processor. This logic can be used to receive a specific electronic serial number, select and send more than one operation designation, receive an authentication string, and compare the authentication string with a plurality of specified substrings by applying more than one operation to the record identification string. The calculated result. A type of processor logic is used to select and transfer operations to execute on a specified substring. These specified operations can be combined with more than one chaotic operation to calculate its result. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs. A method particularly suitable for use in authentication servers can use a record of an electronic serial number and a record identification string. It may include the following steps: receiving a specific electronic serial number, selecting and transmitting a majority of substring designations, receiving an authentication string, applying more than one operation to the specified substring, and comparing the authentication string with the result of its calculation. One form of the present invention may select and transmit an operation specification for its authentication server, which is used sequentially to calculate a record result. A combination of the specified operation that has been transmitted and the embedded chaos operation that is not part of the method can be applied to the specified substring to calculate the paper size of the paper to the Chinese National Standard (CNS) A4 specification ( 21 (^ 297public works 1 '~~ • 10- Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 582156 A7 B7 V. Description of the invention (8) Record the results. A general authentication system implementing the present invention may include an authorization server A transaction server having a reliable connection with the authorization server and an authentication key to communicate with the transaction server. The authorization server in this embodiment of the present invention may include a record electronic serial number and a record identifier A sequence of strings, and logic to input an electronic serial number, select and output the majority of the substring designation, enter an authentication string, calculate the record results of one or more operations performed on the specified substring, and compare the authentication string with Record the results. The transaction server in this embodiment of the present invention may include logic to pass the electronic serial number to the authorization server, and pass the majority from the authorization server Specify the string, pass the authorization string to the authorization server, and receive a successful authentication message from the authentication server. The authentication key in this embodiment of the present invention may include an electronic serial number, an identification string, and logic to Output electronic serial number, input most substring designation, calculate authentication string, and output authentication string. Each element of this total authentication system can include a processor. Its logic and each element can use the processor and can be connected And a processor with more than one other element. A general method for implementing the present invention may include the following steps: transmitting a specific electronic serial number from the client to the server, transmitting most substrings from the server to the client, and applying a The above operations are performed to the specified substring of the record identification string to calculate a record result, and the authentication string and the calculation result are compared. In this embodiment, the calculation may be performed on the client and the server in any order or simultaneously. The server does not need to wait to receive an authentication string, and applies the operation to the record identification string to calculate the record result. One of the inventions The type can be selected and transmitted by the server for calculation and designation. It is applied to the paper size in order, the national standard (CNS) A4 specification (210 X 297 mm) (Please read the precautions on the back before filling in this page)

-11 - 582156 A7 B7 __ 五、發明説明(9 ) 用以計算記錄結果。一種包含已傳送之指定運算以及非傳-11-582156 A7 B7 __ 5. Description of the invention (9) It is used to calculate the record result. A type that contains the specified operation and

• I (請先閲讀背面之注意事項再填寫本頁) 送爲本方法之部分之內嵌混亂運算的組合可被應用至指定 的子字串以計算結果。 圖形簡述 圖1爲一用戶端或認證密繪之一方塊圖。 圖2描述一種方法,其使用一用戶端(例如一認證密 鑰)以產生一認證字串以回應子字串指定。 圖3爲一認證子系統之方塊圖,此認證子系統包括一 認證密鑰及一通連與一網路之終端機。 圖4爲一連結至用戶端及認證伺服器之交易伺服器的 方塊圖。 ^ 圖5描述其由一依據本發明之交易伺服器所實施的訊 息傳遞協定。 圖6爲一認證伺服器之方塊圖。 圖7描述一協定,以選擇並傳送子字串指定,及檢驗 (verifying ) —接收自用戶端之認證字串。 經濟,部智慧財產局員工消费合作社印製 圖8描述一認證系統,其包括一用戶端、一交易伺服 器及一認證伺服器。 圖9描述一供認證之協定,其包含交換於用戶端與伺 服器之間的訊息以及由用戶端與伺服器所執行之字串運算 主要元件對照表 · 本紙張尺度適用中國國家標準(CNS ) A4規格( 210X297公釐)~" -12- 582156 A7 B7 五、發明説明(1〇 ) 經濟部智慧財產局員工消費合作社印製 100 裝 置 101 , 介 面 102 處 理 器 及 利 用 處 理器 之 邏 輯 103 電 子 序 號 及 辨 m 字串 2 10 認 證 密 繪 或 用 戶 212 辨 m 或 認 證 伺 服 器 325 通 用 串 列 匯 流 排 協定 326 個 人 電 腦 327 網 路 400 認 證 密 鑰 430 交 易 伺 服 器 432 處 理 器 及 利 用 處 理器 之 邏 輯 440 辨 m 或 認 證 伺 服 器 550 用 戶 551 交 易 伺 服 器 552 認 證 伺 服 器 600 認 證 伺 服 器 601 介面 602 處 理 器 及 利 用 處 理器 之 邏 輯 603 記 錄 電 子 序 號 與 辨識 字 串 的列 710 用 戶 或 認 證 密 繪 712 認 證 伺服 器 910 用 戶 或 認 nS 密 繪 912 辨 m 或 認 證 伺 服 器 丨:--Ί-----—丨 (請先閲讀背面之注意事項再填寫本頁)• I (please read the notes on the back before filling this page) The combination of inline chaos sent to the part of this method can be applied to the specified substring to calculate the result. Brief description of the figure Figure 1 is a block diagram of a client or authentication secret drawing. Figure 2 illustrates a method that uses a client (e.g., an authentication key) to generate an authentication string in response to a substring designation. Figure 3 is a block diagram of an authentication subsystem. The authentication subsystem includes an authentication key and a terminal connected to a network. Figure 4 is a block diagram of a transaction server connected to a client and an authentication server. ^ Figure 5 depicts a messaging protocol implemented by a transaction server according to the present invention. FIG. 6 is a block diagram of an authentication server. Figure 7 depicts a protocol for selecting and transmitting substring designations and verifying—the authentication string received from the client. Printed by the Consumers' Cooperative of the Ministry of Economics and Intellectual Property Bureau Figure 8 describes an authentication system including a client, a transaction server, and an authentication server. Figure 9 depicts a protocol for authentication, which includes the messages exchanged between the client and the server, and a comparison table of the main components of string operations performed by the client and the server. This paper standard applies to the Chinese National Standard (CNS) A4 specifications (210X297 mm) ~ -12- 582156 A7 B7 V. Description of the invention (10) Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 100 devices 101, interface 102 processors and logic using processors 103 electronics Serial number and identification string 2 10 Authentication secret or user 212 Identification m or authentication server 325 Universal serial bus protocol 326 Personal computer 327 Network 400 Authentication key 430 Transaction server 432 Processor and logic using the processor 440 ID or authentication server 550 user 551 transaction server 552 authentication server 600 authentication server 601 interface 602 processor and logic using processor 603 Record the column of electronic serial number and identification string 710 user or authentication secret drawing 712 authentication server 910 user or identification nS secret drawing 912 identification m or authentication server 丨: --Ί ------- 丨 (Please read the back first (Notes to fill out this page)

、1T ♦ 本紙張尺度適用中.國國家標準(CNS ) A4規格(210X297公釐) -13- 582156 A7 B7 五、發明説明(彳1 ) 詳細敘述 ' 以下之詳細敘述係參考後附之圖形。較佳實施例被敘 述以說明本發明,而非限定其範圍,其範圍係由申請專利 範圍所界定β熟悉本技術人士將理解其下述之說明的多種 同等的變異。 圖1說明一種實施本發明之裝置,其可用於使用者辨 識或認證以及加密。此裝置能夠產生一認證字串,其因使 用者而異。整個裝置100,其可被稱爲認證密鑰,可吻合 標準的信用卡之形狀因素或者可較小而適於附加至(例如 )鑰匙環。此裝置將具有支援輸入及輸出之一個以上介面 101。此裝/置將具有一處理器及利用巍處理器之邏輯102。 一電子序號及辨識字串103係內嵌於裝置中且可存取至處 理器。電子序號及辨識字串將被指派給裝置,在一般使用 者接收認證密鑰之前。特定的電子序號及辨識字串將被記 錄,當其被指派時。一有權者,例如許可者、持照者、製 造條件或認證密鑰之分配者將保有記錄電子序號及記錄辨 識字串之一列(list)。電子序號最好是唯一的,如同電子 序號與辨識字串之組合亦最好是唯一的。辨識字串最好是 長的,以致有多數子字串可被選擇而不會重複使用。例如 ,一種具有10,000個位置之辨識字串可被使用。每個位置 可爲二元的數字、十六進位數字、ASCII字元或任何其他 符號。利用處理器之邏輯容許認證密鑰輸出一電子序號, 輸入其可應用至辨識字串之·多數子字串指定,計算其執|行 本紙張尺度適用中.國國家標準(CNS ) A4規格(210 X 297公釐) ~ ㈣14- I _---_-----·1-- (請先閲讀背面之注意事項再填寫本頁) 、π ·丨 經濟·部智慧財產局員工消費合作社印製 582156 Α7 Β7 五、發明説明(12 ) (請先閲讀背面之注意事項再填寫本頁) 使用辨識字串之指定子字串的一個以上運算的結果’及輸 出該結果爲一認證字串。用以計算一結果之運算可爲任何 傳統的字串運算,例如加、減、乘、除或邏輯運算(如 XOR )。本發明之進一步型態可爲:邏輯接收一個以上運 算元當作輸入以應用至指定的子字串。除了接收運算元以 應用之外,認證密鑰可含有一個以上的混亂運算’其將於 指派電子序號及辨識字串時被同時指派。其保有記錄電子 序號及記錄辨識字串之列的有權者亦將保有記錄混亂運算 之一列。當一個以上運算透過一不安全網路而被認證密鑰 所接收時,則額外地存在有混亂運算將提高安全性。混亂 運算之存在亦將有助於阻撓其欲反向工程辨識字串之系統 性努力來設定一連串的平行方程式。假設其子字串指定很 少重複,則認證密鑰及相關元件將阻撓某人欲攔截包封之 企圖,並阻止他們欲反向工程辨識字串之用意。 經濟,部智慧財產局員工消費合作社印製 認證密鑰之一種型態可爲:處理器、邏輯、電子序號 及辨識字串均被嵌入於單一晶片或邏輯裝置中,或者被置 於單一半導體基底上。單一晶片之優點包含減低製造成本 ,及減少對於邏輯探測器或者其他可從辨識字串擷取暗語 或辨識字串之機構的可獲得機率。 認證密鑰之另一型態可爲:其包含邏輯以要求鍵入暗 語每當啓動一認證或加密程序時。此暗語可同時被指派爲 電子序號且供應至使用者,或者,其最好是可由使用者設 定以啓動認證密鑰。用以設定一暗語之邏輯可以僅操作於 當存在有從認證密鑰經由介面而至初始化伺服器(其包含 本紙張尺度適用中國國家標準(CNS ) Α4規格(210Χ297公釐) -15- 582156 A7 B7 五、發明説明(13 ) (請先閱讀背面之注意事項再填寫本頁) 一記錄電子序號之列)的通連時。初始化伺服器可包含邏 輯以檢驗其相應於一特定電子序號之認證密鑰可用於啓動 。其可檢驗電子序號未曾被通告爲遺失或被竊或者撤銷。 其亦可決定電子序號已適當地指派給個人且該個人已告知 其接收到認證密鑰。實施暗語保護及要求暗語鍵入之邏輯 可包含一個以上的延遲,在一不成功的暗語鍵入嘗試之後 。在一個或兩個不成功暗語鍵入之後的延遲可爲相當短暫 的。在數個不成功的暗語鍵入之後則有一較長的延遲產生 。引入延遲之效果係阻撓其欲破解暗語保護之系統性嘗試 。相關於暗語保護之邏輯可進一步避免暗語被改變,一旦 其已被設定之後。此特徵可被實施以軟體(如個人設定一 非易失性(nonvolatile )位元於記憶體中),或者以硬體 (如藉由燒入一密鑰於邏輯中當一暗語被鍵入時)。暗語 相關的邏輯應進一步防止暗語從認證密鑰之存取或還原。 此爲一有利的特徵,因爲認證密鑰可以低成本製造,以使 其合理地取代認證密鑰而非還原已遺忘或遺失的暗語。利 用處理器之邏輯最好是亦可防止存取至辨識字串。 經濟部智慧財產局員工消費合作社印製 圖2說明一種實施本發明之利用電子序號及辨識字串 的使用者認證之方法。此圖形說明介於認證密鑰或用戶2 1 0 與一伺服器(例如辨識或認證伺服器2 1 2 )之間的通訊。 於本發明之此型態中,用戶將傳輸一電子序號(2 1 4 )並 等待回應。其刪除下一個文字,其將接收多數可應用至一 內嵌之辨識字串的子字串指定(216)。一個或更多運算 可被執行於內嵌的辨識字串之指定子字串上以計算一結果 本紙張尺度適用中.國國家標準(CNS ) A4規格(210X297公釐) ~ -16- 582156 A7 B7 五、發明説明(14 ) (請先聞讀背面之注意事項再填寫本頁) 。此結果被接著傳輸(2 1 8 )。此方法之另一型態可爲: 一個或更多運算被接收以用來計算結果,除了接收子字串 指定之外。此方法可進一步要求一使用者鍵入一暗語(在 接收子字串指定之前)並可要求設定暗語以啓動認證密鑰 。使用者最好是將被要求設定一暗語,於最新的下一字行 通連與一初始化伺服器時。此方法之另一新的型態可爲: 計算一結果涉及應用一個以上的混亂運算,其既非傳送亦 非接收爲本發明之部分。混亂運算與接收之指定運算的組 合可被應用以計算結果。 經濟部智慧財產局員工消費合作社印製 圖3描述使用認證密鑰以結合與一終端機,例如一個 人電腦326。認證密鑰100及其元件102與103被一般性地 描述於圖1。認證密鑰最好是利用一通用串列匯流排(USB )協定或同等物325而被連接至終端機。終端機接著被連 接至一網路327,其可爲一局部區域網路、網際網路或任 何其他網路。利用US B協定之優點,相較於較少用的同等 協定,可包含供應電力至認證密鑰並支援認證密鑰與最近 下個文字之間和終端機的通訊,而無須一個別的步驟以特 地安裝適合於最近下兩個字元的軟體至終端機。 認證子系統之許多型態與認證密鑰之型態有部分相同 。其邏輯可支援:輸入欲執行之一個以上運算的指定、要 求暗語鍵入、在不成功的暗語鍵入後執行延遲、及要求使 用者設定暗語,最好是當通連與一初始化伺服器時。邏輯 可進一步防止暗語被改變、還原或存取,一旦其設定之後 。其應防止還原或存取至辨·識字串。其可包含一個以上混 本紙張尺度適用中國國家標準( CNS )八4規格(210X297公釐) -17- 582156 A7 B7 五、發明説明(15 ) 亂運算,其可被個別地應用或者結合與指定的運算。一種 實施本發明於認證子系統(包括認證密鑰)以及終端機上 之方法可非常類似一種僅利用認證密鑰之方法。 圖4說明一交易伺服器430,,其可位於認證密鑰或認證 子系統400與一辨識或認證伺服器440之間。交易伺服器 4 30係通連與認證密鑰400。此通連可透過網路、通用序列 匯流排或者任何其他用於電子通訊之通路。交易伺服器430 可遠離認證密鑰400,其係常見於電子商務設定或者需要 認證(當使用者登錄時)之全球電腦網路中。另一方面, 交易伺服器可被嵌入銷售點終端機、現金收銀機、自動提 款機或其他實際地連接與認證密鑰之裝置中。交易伺服器 4 30將包含一處理器及利用處理器之邏輯432。此邏輯將從 用戶端接收且識別電子序號,並將電子序號傳遞至一認證 伺服器。邏輯將傳遞認證伺服器之多數子字串指定傳遞至 用戶端。邏輯將從用戶端傳遞一認證字串至認證伺服器。 邏輯將從認證伺服器接收一指示,有關用戶是否通過或不 通過認證。認證伺服器將決定用戶是否通過認證,藉由比 較所傳遞之認證字串與其由應用某些運算至一記錄辨識字 串之指定子字串所計算得到的記錄結果。記錄辨識字串將 相應於一吻合所傳遞之電子序號的記錄序號。交易伺服器 之一型態可爲:其傳遞一個以上運算之指定以執行於指定 的子字串上,除了傳遞子字串指定之外。 圖5說明一種獲取用戶認證之方法,從交易伺服器之 觀點。此圖形描述用戶550·、交易伺服器551、及認證伺服 本紙張尺度適用中周國家標準(CNS ) A4規格(210X297公釐) (請先閲讀背面之注意事項再填寫本頁)、 1T ♦ This paper is applicable in China National Standard (CNS) A4 specification (210X297mm) -13- 582156 A7 B7 V. Description of the invention (彳 1) Detailed description '' The detailed description below is based on the attached drawings. The preferred embodiments are described to illustrate the present invention, but not to limit its scope, which is defined by the scope of the patent application. Those skilled in the art will understand many equivalent variations of the description below. Figure 1 illustrates a device embodying the present invention that can be used for user identification or authentication and encryption. This device is capable of generating an authentication string, which varies from user to user. The entire device 100, which may be referred to as an authentication key, may conform to the form factor of a standard credit card or may be small enough to be attached to, for example, a key ring. This device will have more than one interface 101 that supports input and output. The device / device will have a processor and logic 102 utilizing a processor. An electronic serial number and identification string 103 are embedded in the device and are accessible to the processor. The electronic serial number and identification string will be assigned to the device before the general user receives the authentication key. Specific electronic serial numbers and identification strings will be recorded when they are assigned. A right holder, such as a licensor, licensee, manufacturing condition, or distributor of certification keys, will maintain a list of record electronic serial numbers and record identification strings. The electronic serial number is preferably unique, as is the combination of the electronic serial number and the identification string. The recognition string is preferably long so that most substrings can be selected without reuse. For example, a recognition string with 10,000 positions can be used. Each position can be a binary number, a hexadecimal number, an ASCII character, or any other symbol. The logic of the processor is used to allow the authentication key to output an electronic serial number, input the number of substrings that can be applied to the identification string, and calculate its implementation. The national paper standard (CNS) A4 specification ( 210 X 297 mm) ~ ㈣14- I _---_----- · 1-- (Please read the precautions on the back before filling out this page), π · 丨 Economy and Consumer Affairs Cooperative of the Ministry of Economy and Intellectual Property Bureau Print 582156 Α7 Β7 V. Description of the invention (12) (Please read the notes on the back before filling this page) Use the result of more than one operation of the specified substring of the recognition string 'and output the result as an authentication string . The operation used to calculate a result can be any traditional string operation, such as addition, subtraction, multiplication, division, or logical operations (such as XOR). A further form of the invention may be: the logic receives more than one operand as input to apply to a specified substring. In addition to receiving operands for application, the authentication key may contain more than one chaotic operation, which will be assigned at the same time when the electronic serial number and the identification string are assigned. Those who have the right to keep records of electronic serial numbers and record identification strings will also keep records of chaotic operations. When more than one operation is received by the authentication key through an insecure network, there is an additional chaotic operation that will increase security. The existence of chaotic calculations will also help hinder their systematic efforts to reverse-engineer recognition strings to set up a series of parallel equations. Assuming that its substring designation is rarely repeated, the authentication key and related components will obstruct someone's attempt to intercept the encapsulation and prevent them from reverse engineering the purpose of identifying the string. Economics, a type of authentication key printed by the employee's consumer cooperative of the Intellectual Property Bureau of the Ministry can be: the processor, logic, electronic serial number and identification string are all embedded in a single chip or logic device, or placed on a single semiconductor substrate on. The advantages of a single chip include reduced manufacturing costs and a reduced chance of being available to logic detectors or other institutions that can extract code words or recognition strings from recognition strings. Another type of authentication key may be: it contains logic to require a password to be entered whenever an authentication or encryption program is initiated. This codeword can be assigned both as an electronic serial number and supplied to the user, or, preferably, it can be set by the user to activate the authentication key. The logic used to set a secret word can only be operated when there is an authentication server through the interface to the initialization server (which contains the paper standard applicable to the Chinese National Standard (CNS) A4 specification (210 × 297 mm) -15- 582156 A7 B7 V. Description of the invention (13) (Please read the notes on the back before filling out this page) Record the serial number of the electronic serial number). The initialization server may include logic to verify that its authentication key corresponding to a particular electronic serial number is available for activation. Its verifiable electronic serial number has not been announced as lost or stolen or revoked. It may also decide that the electronic serial number has been appropriately assigned to the individual and that individual has informed him of the receipt of the authentication key. Logic that implements code protection and requires code typing can include more than one delay after an unsuccessful code typing attempt. The delay after one or two unsuccessful code words can be quite short. There is a long delay after several unsuccessful passwords are typed. The effect of introducing delays is to obstruct his systematic attempts to break the protection of the code. The logic related to password protection can further prevent the password from being changed once it has been set. This feature can be implemented in software (such as personally setting a nonvolatile bit in memory), or in hardware (such as by burning a key into logic when a password is typed) . Passwords The logic should further prevent passwords from being accessed or restored from the authentication key. This is an advantageous feature because the authentication key can be manufactured at low cost so that it reasonably replaces the authentication key instead of restoring the forgotten or lost code words. It is best to use processor logic to prevent access to the recognition string. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs Figure 2 illustrates a method of user authentication using electronic serial numbers and identification strings to implement the present invention. This graphic illustrates the communication between the authentication key or user 2 1 0 and a server (such as the identification or authentication server 2 1 2). In this version of the invention, the user will transmit an electronic serial number (2 1 4) and wait for a response. It deletes the next text, which will receive most of the substring designations that can be applied to an embedded recognition string (216). One or more operations can be performed on the specified substring of the embedded recognition string to calculate a result. This paper size is applicable. National Standard (CNS) A4 specification (210X297 mm) ~ -16- 582156 A7 B7 V. Description of Invention (14) (Please read the notes on the back before filling in this page). This result is then transmitted (2 1 8). Another form of this method may be: One or more operations are received to calculate the result, except for receiving a substring designation. This method may further require a user to type a password (before receiving a substring specification) and may require the password to be set to activate the authentication key. The user is best asked to set a code word when the latest next word is connected to an initialization server. Another new form of this method may be: Calculating a result involves applying more than one chaotic operation, which is neither transmitted nor received as part of the invention. A combination of a chaotic operation and a specified operation received may be applied to calculate the result. Printed by the Employees' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs Figure 3 depicts the use of an authentication key to integrate with a terminal, such as a personal computer 326. The authentication key 100 and its elements 102 and 103 are generally described in FIG. The authentication key is preferably connected to the terminal using a universal serial bus (USB) protocol or equivalent 325. The terminal is then connected to a network 327, which can be a local area network, the Internet, or any other network. Utilizing the advantages of the US B agreement, it can include supplying power to the authentication key and supporting communication between the authentication key and the most recent text and the terminal, compared to the less-used equivalent agreement, without requiring an additional step to Specially install software suitable for the next two characters to the terminal. Many types of authentication subsystems are partly the same as the types of authentication keys. Its logic can support: inputting the designation of more than one operation to be performed, requiring typing of passwords, delaying execution after unsuccessful typing, and requiring users to set passwords, preferably when communicating with an initialization server. Logic can further prevent passwords from being changed, restored or accessed once they are set. It shall prevent restoration or access to the literacy string. It can contain more than one mixed paper size, applicable to China National Standard (CNS) 8-4 specifications (210X297 mm) -17- 582156 A7 B7 V. Description of invention (15) Random operation, which can be applied individually or combined and specified Operation. A method for implementing the present invention on an authentication subsystem (including an authentication key) and a terminal can be very similar to a method using only the authentication key. Figure 4 illustrates a transaction server 430, which may be located between the authentication key or authentication subsystem 400 and an identification or authentication server 440. The transaction server 4 30 is connected with the authentication key 400. This connection can be through the network, universal serial bus, or any other channel for electronic communication. The transaction server 430 can be remote from the authentication key 400, which is commonly used in e-commerce settings or global computer networks that require authentication (when a user logs in). On the other hand, the transaction server may be embedded in a point-of-sale terminal, a cash register, an ATM, or other device that is physically connected to the authentication key. The transaction server 4 30 will include a processor and logic 432 using the processor. This logic will receive and identify the electronic serial number from the client and pass the electronic serial number to an authentication server. The logic passes most substring designations of the authentication server to the client. The logic will pass an authentication string from the client to the authentication server. The logic will receive an indication from the authentication server as to whether the user is authenticated or not. The authentication server will determine whether the user is authenticated or not, by comparing the passed authentication string with the record result calculated by applying certain operations to a specified substring of a record identification string. The record identification string will correspond to a record number that matches the electronic serial number passed. One type of transaction server may be: it passes more than one operation designation to execute on the specified substring, except for passing the substring designation. Figure 5 illustrates a method for obtaining user authentication from the perspective of a transaction server. This graphic depicts the user 550 ·, the transaction server 551, and the authentication server. The paper size is applicable to the National Standard (CNS) A4 specification (210X297 mm) (Please read the precautions on the back before filling this page)

、1T 經濟部智慧財產局員工消費合作社印製 -18 - 582156 A7 B7 五、發明説明(16 ) (請先閲讀背面之注意事項再填寫本頁) 器552。此處理程序開始以交易伺服器接收及識別一來自 用戶端之電子序號(554 )。電子序號被傳遞至一認證伺 服器。假如需要時,則交易伺服器決定多數辨識伺服器之 哪個應接收電子序號。交易伺服器接收並傳遞多數子字串 指定至用戶端(556 ),該等多數子字串指定可應用至其 用戶及認證伺服器均已知之辨識字串。子字串指定從伺服 器被傳遞至用戶端。這些指定所應用至之辨識字串係交易 伺服器所未知的且未被傳輸。用戶藉由計算認證字串以回 應所傳遞之子字串指定。交易伺服器從用戶端傳遞一認證 字串至認證伺服器(557 ),並等待來自認證伺服器之指 示(558 )有關其用戶是否已通過或不通過認證。此方法 之進一步型態可爲:交易伺服器傳遞一個以上運算之指定 以執行於指定的子字串上,除了傳遞子字串指定之外。 經濟部智慧財產局員工消費合作社印製 圖6係認證伺服器600之方塊圖。認證伺服器包括:用 以接收輸入並傳輸輸出之介面601、一處理器及利用該處 理器之邏輯602、及一可存取至處理器之記錄電子序號與 辨識字串的列603。介面可利用一個以上的埠。其可連接 伺服器至一局部區域網路、網際網路、虛擬私人網路、私 人網路或任何通訊通道。利用處理器之邏輯將被調適以接 收電子序號、選擇並傳輸多數子字串指定、接收一認證字 串及比較認證字串與一藉由利用一個以上運算至多數指定 之子字串所計算得到的結果。這些指定之子字串應用至一 記綠辦識字串,其具有一相應於所接收之電子序號的記錄 序號。此記錄辨識字串係枏同與一裝置所已知的記錄辨識 本紙張尺度適用中國國家標準( CNS ) A4規格(210X297公釐) -19 - 582156 A7 B7 五、發明説明(17 ) 字串,此裝置傳輸其電子序號。當認證字串與其根據記錄 辨識字串而計算所得的結果吻合時,則認證伺服器可宣告 一成功的認證。認證伺服器之進一步型態可爲:其選擇並 傳輸一個以上運算之指定以執行使用指定的子字串。除了 這些指定的運算之外,認證伺服器可進一步包含一記錄混 亂運算之列以應用至指定的子字串。這些混亂運算將相應 於裝置所已知的混亂運算,此裝置係傳輸其電子序號。用 以計算結果之邏輯可應用混亂運算與指定運算之組合。 圖7描述一種藉由利用一記錄電子序號與記錄辨識字 串之列的認證伺服器之使用者認證的方法。用戶或認證密 鑰7 1 0配合認證伺服器7 1 2而運作。認證伺服器接收一特定 的電子序號(714)。其選擇並接收多數子字串指定(716 )。其接收一認證字串(7 1 8 )。其應用一個以上運算至 一記錄辨識字串之指定的子字串。記錄辨識字串係相應於 所接收之特定的電子序號。認證伺服器計算一記錄結果並 比較該記錄結果與認證字串。認證伺服器指示其認證之成 功或失敗(720 )。如同本發明之其他型態,此方法可涉 及選擇並傳送一個以上運算指定,其稍後係由應用步驟中 之認證伺服器所使用。這些運算指定亦由用戶所使用以備 製一認證字串,其係由認證伺服器所接收。此方法亦可包 含使用一個以上的記錄混亂運算,無論由其本身使用或者 配合與指定的運算。 圖8描述一種總認證系統,其包含一辨識或認證伺服 器600、一交易伺服器430及一認證密鑰100。認譚伺服器 本紙張尺度適用中國國家梂準(CNS ) A4規格(210X297公釐) I: :-----0^-- (請先閱讀背面之注意事項再填寫本頁)Printed by 1T Consumer Cooperatives, Intellectual Property Bureau, Ministry of Economic Affairs -18-582156 A7 B7 V. Description of Invention (16) (Please read the precautions on the back before filling this page) Device 552. This process begins with the transaction server receiving and identifying an electronic serial number (554) from the client. The electronic serial number is passed to an authentication server. If necessary, the transaction server decides which of the majority of the identification servers should receive the electronic serial number. The transaction server receives and passes the majority of substring designations to the client (556). These majority substring designations can be applied to identification strings known to both its users and the authentication server. The substring designation is passed from the server to the client. The identification strings to which these assignments apply are unknown to the transaction server and have not been transmitted. The user specifies the substring in response to the passed authentication string by computing it. The transaction server passes an authentication string from the client to the authentication server (557), and waits for an instruction (558) from the authentication server as to whether its user has passed or failed the authentication. A further form of this method may be: the transaction server passes more than one operation designation to execute on the specified substring, in addition to passing the substring designation. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs FIG. 6 is a block diagram of the authentication server 600. The authentication server includes: an interface 601 for receiving input and transmitting output, a processor and logic 602 using the processor, and a row 603 of recorded electronic serial numbers and identification strings accessible to the processor. The interface can utilize more than one port. It can connect the server to a local area network, the Internet, a virtual private network, a private network, or any communication channel. The logic of the processor will be adapted to receive the electronic serial number, select and transmit the majority substring designation, receive an authentication string, and compare the authentication string with a calculated one by using more than one operation to the majority specified substring. result. These specified substrings are applied to a green office literacy string, which has a record serial number corresponding to the received electronic serial number. This record identification string is different from the record identification known to a device. The paper size is applicable to the Chinese National Standard (CNS) A4 specification (210X297 mm) -19-582156 A7 B7 V. Description of the invention (17) string, This device transmits its electronic serial number. When the authentication string matches the result calculated from the record identification string, the authentication server can declare a successful authentication. A further form of the authentication server may be: it selects and transmits more than one operation designation to perform the use of the specified substring. In addition to these specified operations, the authentication server may further include a list of scrambled operations to apply to specified substrings. These chaotic operations will correspond to the chaotic operations known to the device, which transmits its electronic serial number. The logic used to calculate the result can apply a combination of chaotic operations and specified operations. FIG. 7 illustrates a method of user authentication by an authentication server using a record electronic serial number and a record identification string. The user or authentication key 7 1 0 cooperates with the authentication server 7 1 2. The authentication server receives a specific electronic serial number (714). It selects and receives a majority of substring designations (716). It receives an authentication string (7 1 8). It applies more than one operation to a specified substring of a record identification string. The record identification string corresponds to the specific electronic serial number received. The authentication server calculates a record result and compares the record result with the authentication string. The authentication server indicates the success or failure of its authentication (720). As with other forms of the invention, this method may involve selecting and transmitting more than one operation designation, which is later used by the authentication server in the application step. These calculations are also used by the user to prepare an authentication string, which is received by the authentication server. This method can also include chaotic operations using more than one record, whether used by itself or in conjunction with a specified operation. FIG. 8 illustrates a general authentication system including an identification or authentication server 600, a transaction server 430, and an authentication key 100. Recognize the Tan server This paper size is applicable to China National Standard (CNS) A4 specification (210X297 mm) I: --------- 0 ^-(Please read the precautions on the back before filling this page)

、1T 經濟部智慧財產局員工消资合作社印製 -20·- 582156 Α7 Β7 五、發明説明(18 ) 與交易伺服器係彼此通連,最好是透過一可靠的連結。交 易伺服器與認證密鑰係彼此通連,雖然其連接不一定需爲 可靠的。交易伺服器及認證伺服器可爲相同裝置或伺服器 之部分,其中可靠的連結可爲一電子匯流排。另一方面, 認證伺服器及交易伺服器可廣泛地分佈,如同一銀行操作 認證伺服器而數個電子商務公司操作交易伺服器的情況。 一可靠的連結可爲實體安全的、數位簽名的、加密的、經 由一虛擬的公共網路或任何其他安全可靠的連結。安全性 風險被降至最低,當認證伺服器及交易伺服器可信任其交 換的資訊爲真確的時。認證伺服器600、交易伺服器430及 認證密鑰1 00可包含許多相同的元件,如圖6、4及1中所 描述者,且被相應地編號。 圖9包含一種使用者認證之總方法,其包含執行於用 戶端與伺服器端的步驟。用戶或認證密鑰9 1 0係通連與伺 服器,其可稱爲一辨識或認證伺服器9 1 2。用戶傳送一特 定的電子序號至伺服器(914)。伺服器選擇並多數子字 串指定至用戶(9 1 6 )。用戶應用一個以上運算至用戶所 已知之一特定辨識字串的指定子字串(9 1 7 )。其計算一 認證字串以傳送至伺服器(9 1 8 )。伺服器應用其如用戶 所應用之相同的一個以上運算至伺服器所已知的記錄辨識 字串之指定的子字串(9 1 9 )。記錄辨識字串係相應於特 定的辨識字串,依據特定的電子序號。伺服器計算一記錄 結果並比較應用字串與此結果。認證伺服器可接著報告其 用戶是否已通過或不通過認·證( 920 )。此總方法之進’一 本1氏張尺度逍用中國國家標準(〇呢)八4規格(210父297公釐) — ;一I^-----·# —— (請先閲讀背面之注意事項再填寫本頁) ,ιτPrinted by the Consumers' Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs of 1T -20 ·-582156 Α7 Β7 V. Invention Description (18) The transaction server is connected to each other, preferably through a reliable connection. The transaction server and the authentication key system are connected to each other, although their connection need not be reliable. The transaction server and the authentication server may be part of the same device or server, and the reliable connection may be an electronic bus. On the other hand, authentication servers and transaction servers can be widely distributed, as in the case where the same bank operates the authentication server and several e-commerce companies operate the transaction server. A reliable connection can be a physically secure, digitally signed, encrypted, via a virtual public network or any other secure connection. Security risks are minimized when the authentication server and transaction server can trust that the information they exchange is true. The authentication server 600, the transaction server 430, and the authentication key 100 may contain many of the same components, as described in Figs. 6, 4, and 1, and are numbered accordingly. Figure 9 contains a general method for user authentication, which includes steps performed on the client and server. The user or authentication key 9 1 0 is connected to the server, which can be called an identification or authentication server 9 1 2. The user sends a specific electronic serial number to the server (914). The server selects and assigns most substrings to the user (9 1 6). The user applies more than one operation to a specified substring (9 1 7) of a specific recognition string known to the user. It calculates an authentication string to send to the server (9 1 8). The server applies one or more of the same operations as applied by the user to the specified substring (9 1 9) of the record identification string known to the server. The record identification string corresponds to a specific identification string and is based on a specific electronic serial number. The server calculates a record result and compares the application string with this result. The authentication server may then report whether its user has passed or failed the authentication and certification (920). The progress of this general method 'a 1 Zhang Zhang scale free use of Chinese National Standard (0?) 8 4 specifications (210 father 297 mm) —; one I ^ ----- · # —— (Please read the back first (Please fill in this page again), ιτ

0L 經濟部智慧財產局員工消費合作社印製 -21 - 582156 A7 B7 五、發明説明(19 ) (請先閲讀背面之注意事項再填寫本頁 步型態可爲:其指定的運算被選擇並傳送自伺服器而至用 戶端,連同指定的子字串。指定的運算可被結合與混亂運 算,其係用戶所已知且可根據用戶所傳送之特定電子序號 而被伺服器擷取。 本發明可被應用於多種環境中。使用者之認證係用以 避免電子商務交易中之信用卡詐騙所必要的。某些消息指 稱其電子商務中之信用卡詐騙的機率高達百分之18。因此 ,那些確保線上信用卡交易之付費的公司對企業收取可觀 的費用。本發明可減少此費用。本發明亦可容許一認證伺 服器直接傳輸信用卡資訊至一交易伺服器,以指示其使用 者已通過了認證。假如使用者具有一張以上的信用卡,則 使用者可被容許選擇其認證伺服器所透露給交易伺服器之 信用卡,最好是經由一可靠的通訊通道。使用者認證以及 從一可靠來源傳遞信用卡資訊之結合可幫助電子商務。 經濟部智慧財產局員工消費合作社印製 本發明亦可作用爲一種會員制ID卡。對於線上網站, 例如書店或線上娛樂,則使用者可被認證。當使用者欲匿 名時,則一耦合與存款帳戶或其他信用機構之認證伺服器 可結合使甩者之匿名認證與商品及服務之確認付款。本發 明可被用以認證使用者並實施一種付款傳遞系統,而無須 透露使用者之姓名。本發明之一實施例亦可作用爲一通行 密鑰,當一會員制ID卡被用以獲准進入某設施時。每個認 證密鑰將當作一唯一的ID卡,其無法被複製或僞造。 線上銀行業務係本發明之進一步應用。實施本發明之 一種認證密鑰或方法將作用·爲一網路上同等的駕照。其將 本紙張尺度適用巾國@家標準(CNS ) ( 210X297公釐1 ~一 -22- 582156 A7 B7 經濟·部智慧財產局員工消費合作社印製 五、發明説明(20 ) 較ATM卡更爲安全,因爲無法被輕易地複製或僞造。結合 與一認證授權單位,則一認證密鑰可被用於銀行業務及用 於電子商務或其他功能。 實施本發明之一認證密鑰或方法可被使用配合認證伺 服器以產生預付款的線上籌碼。其可由認證伺服器存取之 存款帳戶或其他信用機構可被記帳以產生線上籌碼,在執 行一認證程序之後。 於商業至商業交易之領域中,執行本發明之一種認證 密鑰或方法可建立可靠度與安全性於一原本不安全的通訊 連結上。 電腦網路使用者可受惠自一種實施本發明之認證密鑰 或方法。依據本發明之一網路伺服器可根據認證以容許使 用者之存取特權。一持有認證密鑰之使用者可於任何終端 機獲准網路存取之相同的特權。 本發明亦可應用至電子郵件,以確認其讀取電子郵件 之個人係預期的接收者。於此應用中,電子郵件之傳遞或 加密可根據本發明之使用者認證而被控制。認證伺服器可 控制電子郵件之發放或觀看。認證伺服器亦可提供一種具 有憑證或加密字串之電子郵件應用程式,以令使用者得以 讀取一特定電子郵件訊息或存取電子郵件帳戶。 熟悉安全性之領域的人士亦將瞭解其由本發明所產生 之認證字串亦可被使用爲加密之基礎。取代透過網路以傳 輸認證字串,一用戶可產生一認證字串(例如128位元長 ),並使用該字串爲加密之基礎。用於加密目的之字串可 (請先閲讀背面之注意事 1# -項再填· 裝-- 窝本頁)0L Printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs -21-582156 A7 B7 V. Invention Description (19) (Please read the notes on the back before filling in this page. The step type can be: the specified operation is selected and transmitted From the server to the client, together with the specified substring. The specified operation can be combined with the chaotic operation, which is known to the user and can be retrieved by the server according to the specific electronic serial number sent by the user. The invention Can be used in a variety of environments. User authentication is necessary to avoid credit card fraud in e-commerce transactions. Some sources claim that the probability of credit card fraud in e-commerce is as high as 18%. Therefore, those who ensure Companies that pay for online credit card transactions charge considerable fees to businesses. The invention can reduce this fee. The invention also allows an authentication server to directly transmit credit card information to a transaction server to indicate that its users have passed authentication. If the user has more than one credit card, the user may be allowed to choose the transaction server disclosed by his authentication server The credit card is best passed through a reliable communication channel. The combination of user authentication and the transfer of credit card information from a reliable source can help e-commerce. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economics The present invention can also be used as a membership ID card. For online websites, such as bookstores or online entertainment, users can be authenticated. When users want to be anonymous, an authentication server coupled with a deposit account or other credit institution can combine anonymous authentication with dumpers and Confirm payment for goods and services. The present invention can be used to authenticate users and implement a payment delivery system without revealing the user's name. An embodiment of the present invention can also be used as a passkey when a membership system When an ID card is used to gain access to a facility, each authentication key will be treated as a unique ID card, which cannot be copied or forged. Online banking is a further application of the present invention. An authentication key implementing the present invention Or the method will act as an equivalent driver's license on the Internet. It applies this paper size to the country @ 家 standard (CNS) (210X29 7mm 1 ~ 1-22- 582156 A7 B7 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economy and Mining 5. Description of the Invention (20) It is more secure than ATM cards because it cannot be easily copied or counterfeited. Combination with a certification Authorization unit, then an authentication key can be used for banking and for e-commerce or other functions. An authentication key or method for implementing the present invention can be used in conjunction with an authentication server to generate prepaid online chips. It can be used by The deposit account or other credit institution accessed by the authentication server can be booked to generate online chips, after performing an authentication procedure. In the field of business to commercial transactions, executing an authentication key or method of the present invention can establish reliability And security on an otherwise insecure communication link. Computer network users can benefit from an authentication key or method that implements the present invention. According to one aspect of the present invention, a web server can be authenticated to allow user access privileges. A user holding an authentication key can gain the same privileges of network access from any terminal. The present invention can also be applied to e-mail to confirm that the person who reads the e-mail is the intended recipient. In this application, the transmission or encryption of the email can be controlled according to the user authentication of the present invention. The authentication server can control the distribution or viewing of emails. The authentication server can also provide an email application with a certificate or encrypted string to allow users to read a specific email message or access an email account. Those familiar with the field of security will also understand that the authentication string generated by the present invention can also be used as the basis for encryption. Instead of transmitting an authentication string over the network, a user can generate an authentication string (for example, 128 bits long) and use that string as the basis for encryption. The string used for encryption purpose is OK (please read the note on the back 1 #-then fill in · install-nest page)

•1T 4 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) -23- 582156 A7 B7 _____ 五、發明説明(21 ) (請先閲讀背面之注意事項再填寫本頁) 被產生並使用以取代認證,或者認證以外之措施。上述傳 輸一電子序號、接收多數子字串指定及(選配地)運算指 定、及應用運算至指定子字串之相同步驟可被用以產生一 認證字串以用於加密之目的。一用於加密目的之認證字串 當然不會透過網路而被傳輸。 此表列係用以指示多種本發明可實際應用之環境,此 環境之表列並非用以限定本發明之範圍。 經濟部智慧財產局員工消費合作社印製 本發明可實現超越習知科技之多種優點。本發明促進 認證密鑰之發送,該等認證密鑰可認證一使用者而不論其 位於何處或者其使用之終端機爲何。使用者可被認證於一 位於其家中、其辦公室中、或者其所拜訪之某一設施中的 終端機。本發明可使用一種便宜的訂製晶片及塑膠卡以實 施,例如以一般信用卡之形狀大小。此種卡可被製造且登 記以一認證授權單位,以每個五元以內之成本。本發明產 生一種無法被攔截或濫用之常改變的認證字串。常改變的 認證字串無法被輕易地僞造,因爲其設有安全性機構以阻 撓對於內嵌辨識字串之存取而獲取授權字串。內嵌的辨識 字串永不被傳輸透過一網路,其可能有潛在的危險。一種 實施本發明之認證密鑰將是使用者可便利使用的。利用一 通用匯流排,則一認證密鑰將通連與現存的個人電腦,而 無須安裝特別的軟體於個人電腦上。其可利用目前許多個 人電腦上常見的隨插即用。一種實施本發明之裝置將較某 些其他裝置更易於使用,例如前述之時間爲基礎的裝置, 此時使用者需在時間用盡而有一新的認證碼被裝置所產生 本紙張尺度適用中國國家標準(CNS ) A4規格(210 X 297公釐) " -24- 582156 A7 B7 五、發明説明(22 ) 前讀取認證碼。本發明之額外的優點將可由那些熟悉本項 技術者瞭解。 雖然本發明係參考較佳實施例及範例而被詳細地揭露 如上,但是應瞭解這些範例僅用於說明而非用以限制。可 預期其修改及組合將可由那些熟悉本項技術者所實施,其 修改及組合將落入本發明之精神中以及下列申請專利範圍 之範圍內。 (請先閲讀背面之注意事項再填寫本頁) 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中周國家標準(CNS ) A4規格(210X297公釐) -25-• 1T 4 This paper size is in accordance with Chinese National Standard (CNS) A4 specification (210X297 mm) -23- 582156 A7 B7 _____ V. Description of the invention (21) (Please read the precautions on the back before filling this page) was generated and Use in place of or in addition to certification. The same steps described above for transmitting an electronic serial number, receiving a majority substring designation and (optionally) operation designation, and applying the operation to the specified substring can be used to generate an authentication string for encryption purposes. An authentication string used for encryption purposes is of course not transmitted over the network. This list is used to indicate a variety of environments in which the present invention can be practically used, and this list of environments is not intended to limit the scope of the present invention. Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economics The present invention can realize a variety of advantages beyond the conventional technology. The present invention facilitates the sending of authentication keys that can authenticate a user regardless of where it is located or the terminal it uses. Users can be authenticated at a terminal located in their home, their office, or a facility they visit. The present invention can be implemented using a cheap custom chip and a plastic card, for example, in the shape of a general credit card. Such cards can be manufactured and registered with a certification authority at a cost of less than five yuan each. The present invention produces a frequently changing authentication string that cannot be intercepted or abused. Frequently changed authentication strings cannot be easily forged because they are provided with a security mechanism to prevent access to the embedded identification string and obtain an authorized string. The embedded identification string is never transmitted through a network, which may be potentially dangerous. An authentication key implementing the present invention will be convenient for users. With a universal bus, an authentication key will communicate with the existing personal computer without the need to install special software on the personal computer. It can take advantage of the plug and play commonly found on many personal computers today. A device implementing the present invention will be easier to use than some other devices, such as the aforementioned time-based device. At this time, the user needs to run out of time and a new authentication code is generated by the device. The paper size is applicable to the Chinese country. Standard (CNS) A4 specification (210 X 297 mm) " -24- 582156 A7 B7 V. Description of the invention (22) Read the authentication code before. Additional advantages of the invention will be apparent to those skilled in the art. Although the present invention has been disclosed in detail above with reference to preferred embodiments and examples, it should be understood that these examples are for illustration only and not for limitation. It is expected that the modifications and combinations will be implemented by those skilled in the art, and the modifications and combinations will fall within the spirit of the present invention and the scope of the following patent applications. (Please read the notes on the back before filling out this page) Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs This paper applies the China National Standard (CNS) A4 specification (210X297 mm) -25-

Claims (1)

經濟部智慧財產局員工消費合作社印製 582156 A8 B8 C8 _ D8 六、申請專利範圍 1 · 一種認證密鑰,包含: (a )具有一個以上輸入/輸出介面之處理器; (b )可存取至處理器之電子序號及辨識字串; (c )利用處理器之邏輯,以 輸出電子序號: 輸入多數子字串指定; 計算其使用辨識字串之指定的子字串以執行一 個以上運算所得之結果;及 輸出結果。 2 ·如申請專利範圍第1項之認證密鑰,其中處理器 '利用處理器之邏輯、電子序號及辨識字串被置於單一半 導體基底上。 3 ·如申請專利範圍第1項之認證密鑰,其中處理器 、利用處理器之邏輯、電子序號及辨識字串被嵌入單一晶 片中。 4 ·如申請專利範圍第1項之認證密鑰,其中認證密 鑰之形狀因素係吻合標準的信用卡。 5 ·如申請專利範圍第1項之認證密鑰,其中用以計 算結果之邏輯將指定之子字串相加在一起。 6 ·如申請專利範圍第1項之認證密鑰,其中用以計 算結果之邏輯將指定之子字串相乘在一起。 7 ·如申請專利範圍第1項之認證密鑰,其中用以計 算結果之邏輯計算指定之子字串的差異。 8 ·如申請專利範圍第1項之認證密鑰,其中用以,計 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) --------訂-------I IPrinted by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs 582156 A8 B8 C8 _ D8 VI. Patent Application Scope 1 · An authentication key containing: (a) a processor with more than one input / output interface; (b) accessible Electronic serial number and identification string to the processor; (c) Use the logic of the processor to output the electronic serial number: Enter the majority of the substring designation; Calculate the result of using the specified substring of the identification string to perform more than one operation The results; and output results. 2 · If the authentication key of the scope of patent application item 1, the processor 'uses the processor's logic, electronic serial number and identification string to be placed on a single semi-conductive substrate. 3. If the authentication key of the first patent application scope, the processor, the logic using the processor, the electronic serial number and the identification string are embedded in a single chip. 4 · If the authentication key of the first patent application scope, the form factor of the authentication key is a standard credit card. 5 · If the authentication key of the scope of patent application item 1, the logic used to calculate the result is to add the specified sub-strings together. 6 · If the authentication key of the scope of patent application No. 1 is used, the logic used to calculate the result is to multiply the specified sub-strings together. 7 · If the authentication key of the scope of patent application is the first item, the logic of the calculation result is used to calculate the difference of the specified substring. 8 · If you apply for the certification key in the first item of the patent scope, which is used to calculate the paper size, the Chinese National Standard (CNS) A4 specification (210 X 297 mm) (please read the precautions on the back before filling this page) ) -------- Order ------- II -26- 582156 經濟部智慧財產局員工消費合作社印製 A8 B8 C8 D8 六、申請專利範圍 算結果之邏輯計算指定之子字串的商數。 9 ·如申請專利範圍第1項之認證密鑰,其中用以計 算結果之邏輯計算指定之子字串的邏輯XOR (戶斥或)結 果。 1 0 ·如申請專利範圍第1項之認證密鑰,其中用以 輸入多數子字串指定之邏輯進一步包含邏輯以輸入欲執行 之一個以上運算的指定。 ^ 1 1 ·如申請專利範圍第1項之認證密鑰,進一步包 含邏輯以要求鍵入暗語於傳輸電子序號之前。 1 2 .如申請專利範圍第11項之認證密鑰,其中用以 要求暗語鍵入之邏輯包含一個以上延遲於暗語之不成功鍵 入以後。 1 3 ·如申請專利範圍第1項之認證密鑰,進一步包 含邏輯以設定暗語。 1 4 ·如申請專利範圍第1 3項之認證密鑰,其中用以 設定暗語之邏輯僅操作於當介面通連與其包含一電子序號 之列的初始化伺服器時。 1 5 ·如申請專利範圍第1 3項之認證密鑰,其中用以 設定暗語之邏輯進一步包含邏輯以防止暗語被改變。 1 6 ·如申請專利範圍第1 3項之認證密鑰,其中用以 設定暗語之邏輯進一步包含邏輯以防止暗語之還原。 1 7 ·如申請專利範圍第1 3項之認證密鑰,其中用以 設定暗語之邏輯進一步包含邏輯以防止對於暗語之存取。 1 8 ·如申請專利範圍第1項之認證密鑰,進一步,包 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) I---I---------— — It-------I I (請先閱讀背面之注意事項再填寫本頁) #· -27- 經濟部智慧財產局員工消費合作社印製 582156 A8 B8 C8 D8 六、申請專利範圍 含邏輯以防止辨識字串之還原。 1 9 ·如申請專利範圍第1項之認證密鑰,進一步包 含邏輯以防止對於辨識字串之存取° 2 0 ·如申請專利範圍第1項之認證密鑰,進一步包 含一個以上混亂運算及邏輯以計算其應用混亂運算至一個 以上指定之子字串的結果。 .2 1 ·如申請專利範圍第1項之認證密鑰,進一步包 含一個以上混亂運算及邏輯以計算其應用指定運算與混亂 運算至指定之子字串的結果。 2 2 · —種認證子系統,包含: (a )連接至網路之終端機; (b )認證密鑰,其包含處理器、電子序號、及可存 取至處理器之辨識字串、及利用處理器之邏 輯,以 輸出電子序號; 輸入多數子字串指定; 計算其使用辨識字串之指定的子字串以執行一 個以上運算所得之結果;及 通連與終端機; 其中認證密鑰係利用通用串列匯流排協定而連 接至終端機。 2 3 ·如申請專利範圍第22項之認證子系統,其中用 以輸入多數子字串指定之邏輯進一步包含邏輯以輸入欲執 行之一個以上運算的指定。. , 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) 『· I ——— — — — « — — — — — — I. -28--26- 582156 Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs A8 B8 C8 D8 VI. Patent Application Scope The logical calculation of the calculation result specifies the quotient of the specified substring. 9 · If the authentication key of the scope of the patent application is the first item, the logical XOR result of the specified substring is used for the logical calculation of the calculation result. 1 0 · If the authentication key of the scope of patent application item 1, the logic for inputting the majority substring designation further includes logic to input the designation of one or more operations to be performed. ^ 1 1 · If the authentication key of the scope of patent application No. 1 further contains logic to require typing a secret word before transmitting the electronic serial number. 1 2. If the authentication key in the scope of patent application No. 11 is used, the logic used to require password entry includes more than one unsuccessful entry after the password entry. 1 3 · If the authentication key in the scope of patent application No. 1 further contains logic to set the password. 1 4 · If the authentication key of item 13 in the scope of patent application, the logic used to set the password is only operated when the interface communicates with the initialization server that contains an electronic serial number. 15 · If the authentication key of item 13 of the scope of patent application, the logic used to set the cryptic language further includes logic to prevent the cryptic language from being changed. 16 · If the authentication key of item 13 in the scope of patent application, the logic used to set the password further includes logic to prevent the password from being restored. 17 • If the authentication key of item 13 in the scope of patent application, the logic used to set the password further includes logic to prevent access to the password. 1 8 · If you apply for the authentication key in item 1 of the patent scope, further, the paper size of the package is applicable to China National Standard (CNS) A4 (210 X 297 mm) I --- I -------- -— — It ------- II (Please read the notes on the back before filling out this page) # · -27- Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 582156 A8 B8 C8 D8 6. Scope of Patent Application Contains logic to prevent the restoration of recognition strings. 1 9 · If the authentication key in the scope of patent application, the item 1 further includes logic to prevent access to the identification string ° 2 0 · If the authentication key in the scope of patent application, the item 1 further includes more than one chaotic operation and Logic to calculate the result of applying a chaotic operation to more than one specified substring. .2 1 · If the authentication key in the scope of patent application No. 1 further includes more than one chaotic operation and logic to calculate the result of applying the specified operation and chaotic operation to the specified substring. 2 2-An authentication subsystem including: (a) a terminal connected to the network; (b) an authentication key, which includes a processor, an electronic serial number, and an identification string accessible to the processor, and Use the logic of the processor to output the electronic serial number; input the majority of the substring designation; calculate the result of using the specified substring of the recognition string to perform more than one operation; and communicate with the terminal; where the authentication key It is connected to a terminal using a universal serial bus protocol. 2 3 · If the authentication subsystem of item 22 of the patent application scope, wherein the logic specified by inputting a plurality of substrings further includes logic to input the designation of one or more operations to be performed. . The paper size is in accordance with Chinese National Standard (CNS) A4 (210 X 297 mm) (Please read the notes on the back before filling this page) 『· I ——— — — —« — — — — — — I. -28- 582156 六、申請專利範圍 2 4 ·如申請專利範圍第22項之認證子系統,進一步 包含邏輯以要求鍵入暗語於傳輸電子序號之前。 2 5 ·如申請專利範圍第24項之認證子系統,其中用 以要求暗語鍵入之邏輯包含一個以上延運於暗語之不成功 鍵入以後。 2 6 ·如申請專利範圍第22項之認證子系統,進一步 包含邏輯以設定暗語^ * 2 7 ·如申請專利範圍第26項之認證子系統,其中用 以設定暗語之邏輯僅操作於當介面通連與其包含一電子序 號之列的初始化伺服器時。 2 8 ·如申請專利範圍第26項之認證子系統,其中用 以設定暗語之邏輯進一步包含邏輯以防止暗語被改變。 2 9 ·如申請專利範圍第26項之認證子系統,其中用 以設定暗語之邏輯進一步包含邏輯以防止暗語之還原。 3 0 ·如申請專利範圍第26項之認證子系統,其中用 以設定暗語之邏輯進一步包含邏輯以防止對於暗語之存取 〇 3 1 ·如申請專利範圍第22項之認證子系統,進一步 包含邏輯以防止辨識字串之還原。 3 2 ·如申請專利範圍第22項之認證子系統,進一步 包含邏輯以防止對於辨識字串之存取。 3 3 ·如申請專利範圍第22項之認證子系統,進一步 包含一個以上可存取至處理器之混亂運算,及邏輯以計算 其應用混亂運算至一個以上.指定之子字串的結果。 , 本紙張i度適用中國國家標準(CNS)A4規格(210 X 297公髮1 ~"" " -29- (請先閱讀背面之注意事項再填寫本頁) ^--------^ · I------I 經濟部智慧財產局員工消費合作社印製 582156 A8 B8 C8 D8 3 4 ·如申請專利範圍第22項之認證子系統,進一步 包含一個以上可存取至 其應用指定運算與混亂 六、申請專利範圍 處理器之混亂運算,及邏輯以計算 運算至指定之子字串的結果。 3 5 · —種利用電子序號及辨識字串之使用者認證的 方法,包含下列步驟: (a )傳輸電子序號; (b )接收多數可應用至辨識字串之子字串指定; (c )應用一個以上運算至指定的子字串以計算結果 :及 (d )傳輸結果。 閲 讀. 背 面 之 注 意 事 項 % 填零· |裂 頁I 經濟部智慧財產局員工消費合作社印製 I I 訂 3 6 ·如申請專利範圍第 進一步包含接收用於應用步驟 3 7 ·如申請專利範圍第 求使用者於接收多數子字串指 3 8 ·如申請專利範圍第 求使用者設定暗語之步驟。 3 9 ·如申請專利範圍第 求使用者設定其無法還原之暗 4 0 ·如申請專利範圍第 求使用者設定暗語之步驟,於 4 1 ·如申請專利範圍第 上混亂運算,其中應用步驟應 35項之方法,其中接收步驟 之一個以上運算指定。 35項之方法,進一步包含要 定前鍵入暗語的步驟。 37項之方法,進一步包含要 37項之方法,進一步包含要 語的步驟。 3 7項之方法,進.一步包含要 通連與初始化伺服器時。 35項之方法,其利用一個以 用混亂運算至指定的子字串 4 2 ·如申請專利範爵第41項之方法,其中接收步驟 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -30 一 582156 A8 B8 C8 D8 六、申請專利範圍 進一步包含接收一個以上運算指定,而應用步驟應用指定 運算及混亂運算至指定的子字串。 (請先閱讀背面之注意事項再填寫本頁) 4 3 · —種通連與用戶端及授權伺服器之交易伺服器 ,其包含: (a )處理器: (b )利用處理器之邏輯,以 接收且識別一來自用戶端之電子序號並將該電 子序號傳遞至授權伺服器; 從授權伺服器傳遞多數子字串指定至用戶端; 從用戶端傳遞一認證字串至授權伺服器; 從授權伺服器接收有關該用戶是否通過認證之 指示。 4 4 ·如申請專利範圍第43項之交易伺服器,其中用 以傳遞子字串指定之邏輯進一步包含邏輯以傳遞一個以上 欲執行於指定之子字串上的運算。582156 VI. Scope of Patent Application 2 4 • If the authentication subsystem of the scope of application for patent No. 22, further contains logic to require typing a secret word before transmitting the electronic serial number. 2 5 · If the authentication subsystem of the scope of application for patent No. 24, the logic used to require password input includes more than one unsuccessful delay in password input. 2 6 · If the authentication subsystem of the scope of patent application No. 22, further includes logic to set the password ^ * 2 7 · If the authentication subsystem of the scope of patent application No. 26, the logic for setting the language is only operated in the interface When communicating with an initialization server that contains an electronic serial number. 2 8 · The authentication subsystem of item 26 of the patent application scope, wherein the logic used to set the password further includes logic to prevent the password from being changed. 2 9 · If the authentication subsystem of the scope of application for patent No. 26, the logic used to set the cryptic language further includes logic to prevent the cryptic language from being restored. 3 0 · If the authentication subsystem of the 26th scope of the patent application, the logic for setting the password further includes logic to prevent access to the password. 03 1 · If the authentication subsystem of the 22nd scope of the patent application, further includes Logic to prevent the restoration of recognition strings. 3 2 · If the authentication subsystem of the scope of patent application No. 22, further includes logic to prevent access to the identification string. 3 3 · If the authentication subsystem of item 22 of the patent application scope further includes more than one chaotic operation accessible to the processor, and logic to calculate the result of applying the chaotic operation to more than one specified substring. , This paper is suitable for China National Standard (CNS) A4 specifications (210 X 297 public 1 ~ " " " -29- (Please read the precautions on the back before filling this page) ^ ----- --- ^ · I ------ I Printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 582156 A8 B8 C8 D8 3 4 · If the certification subsystem of the 22nd patent application scope, further including more than one accessible To its application of designated operations and confusion 6. Chaotic operations of patent-applicable processors, and logic to calculate the results of the specified sub-strings. 3 5 · — A method for user authentication using electronic serial numbers and identification strings, It includes the following steps: (a) transmitting the electronic serial number; (b) receiving the majority of the substring designations applicable to the recognition string; (c) applying more than one operation to the designated substring to calculate the results: and (d) transmitting the results 。 Read. Note on the back% Fill in zero | | Split page I Printed by the Intellectual Property Bureau of the Ministry of Economic Affairs and Consumer Cooperatives II Order 3 6 · If the scope of the patent application further includes receiving for application step 3 7 · If the scope of patent application Ask the user to receive the majority of the sub-string means 3 8 · If the scope of the patent application, the user sets the step of setting the password. 3 9 · If the scope of the patent application, the user sets the password that cannot be restored 4 0 · If the scope of the patent application The first step is to ask the user to set the code, at 4 1 · If the chaotic operation is on the top of the scope of the patent application, the method of applying the step should be 35 items, and the receiving step should be specified by more than one operation. The method of 35 items further includes Steps for typing passwords. The 37-item method further includes a 37-item method, and further includes a 37-item method. The 7-item method further includes when to connect and initialize the server. The 35-item method, which Use a chaotic operation to the specified sub-string 4 2 · As in the method of patent application No. 41, where the receiving step This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) -30 A 582156 A8 B8 C8 D8 6. The scope of patent application further includes receiving more than one operation designation, and the application steps apply the specified operation and chaotic operation. To the specified substring. (Please read the notes on the back before filling this page) 4 3-—A transaction server that connects to the client and the authorization server, which includes: (a) a processor: (b ) Use the logic of the processor to receive and identify an electronic serial number from the client and pass the electronic serial number to the authorization server; pass most substrings from the authorization server to the client; pass an authentication word from the client To the authorization server; receiving instructions from the authorization server as to whether the user is authenticated. 4 4 · If the transaction server of item 43 of the scope of patent application, the logic used to pass the substring designation further includes logic to pass more than one operation to be performed on the specified substring. 4 5 · —種獲取用戶認證之方法,包含下列步驟: 經濟部智慧財產局員工消費合作社印製 (a )接收且識別一來自用戶端之電子序號並將該電 子序號傳遞至授權伺服器: (b )從授權伺服器傳遞其可應用至用戶及授權伺服 器均已知之辨識字串的多數子字串指定至用戶 端; (c )從用戶端傳遞一認證字串至授權伺服器; (d )從授權伺服器接收用戶之認證的指示。 4 6 ·如申請專利範圍第45項的獲取用戶認證之方法 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -31 - 582156 A8 B8 C8 D8 六、申請專利範圍 ,其中傳遞子字串指定之步驟進一步包傳遞一個以上欲執 行於指定之子字串上的運算。 (請先閱讀背面之注意事項再填寫本頁) 4 7 · —種認證伺服器,包含: (a )具有用以接收輸入並傳輸輸出之介面的處理器 > (b )可存取至處理器之記錄電子序號及記錄辨識字 串的表列; (c )利用處理器之邏輯,以 接收電子序號; 選擇並傳輸多數子字串指定; 接收認證字串;及 比較認證字串與一藉由應用一個以上運算至多 數指定之子字串所計算得到的結果。 4 8 ·如申請專利範圍第47項之認證伺服器,其中用 以輸入多數子字串指定之邏輯進一步包含邏輯以選擇並傳 輸其欲執行之一·個以上運算的指定。 經濟部智慧財產局員工消費合作社印製 4 9 ·如申請專利範園第47項之認證伺服器,進一步 包含一個以上記錄混亂運算,及邏輯以計算其應用混亂運 算至一個以上指定之子字串所得的結果。 5 0 ·如申請專利範圍第4 7項之認證伺服器,進一步 包含一個以上記錄混亂運算,及邏輯以計算其應用指定運 算與混亂運算至指定之子字串所得的結果。 5 1 · —種利用記錄電子序號及記錄辨識字串的表列 之使用者認證的方法,包含.下列步驟: 1 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -32- 582156 A8 B8 C8 D8 六、申請專利範圍 (a)接收特定的電子序號: (b )選擇並傳送多數子字串指定; (c )接收認證字串; (d)應用一個以上運算至其相應於特定電子序號之 記錄辨識字串的指定子字串以計算一記錄結果 :及 (e )比較認證字串與記錄結果。 5 2 ·如申請專利範圍第5 1項之方法,其中選擇及傳 送步驟進一步包含選擇及傳送一個以上被使用於應用步驟 中之運算指定。 5 3 .如申請專利範圍第5 1項之方法,其利用一個以 上相應於特定電子序號之混亂運算,其中應用步驟應用混 亂運算至指定的子字串。 5 4 ·如申請專利範圍第53項之方法,其中選擇及傳 送步驟進一步包含選擇及傳送一個以上運算指定,而應用 步驟應用指定運算與混亂運算至指定的子字串。 5 5 · —種認證系統,其包含: 經濟部智慧財產局員工消費合作社印製 (a )包含一記錄電子序號與記錄辨識字串之表列的 認證伺服器,此認證伺服器亦包含邏輯以 輸入特定的電子序號: 選擇並輸出多數子字串指定; 輸入認證字串; 計算其使用記錄辨識字串之指定的子字串以執 行 , 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -33- 582156 A8 B8 C8 D8 、申請專利範圍 一個以上 比較認證 b )具有可靠 包含邏 傳遞特定 傳遞來自 傳遞認證 從授權伺 之結果 C )通連與交 電子序 輸出特定 輸入多數 計算其使 運算所得的記錄結果; 字串與記錄結果; 連結至授權伺服器之交易伺服器,其 輯以 電子序號傳遞至授權伺服器; 授權伺服器之多數子字串指定; 字串至授權伺服器、 服器接收其比較認證字串與記錄結果 的指示。 易伺服器之認證密鑰,其包含特定的 號、一辨識字串及邏輯以以 的電子序號; 子字串指定; 用記錄辨識字串之指定的子字串以執 請* 先 閱 讀. 背 面 注4 5 · A method for obtaining user authentication, including the following steps: The consumer cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs prints (a) receives and identifies an electronic serial number from the client and passes the electronic serial number to the authorization server: ( b) Pass from the authorization server to the client the majority of the substrings that can be applied to identification strings known to the user and the authorization server; (c) pass an authentication string from the client to the authorization server; (d) ) Receive the user's authentication instructions from the authorization server. 4 6 · If you want to obtain user certification method in item 45 of the scope of patent application, this paper size is applicable to China National Standard (CNS) A4 specification (210 X 297 mm) -31-582156 A8 B8 C8 D8 The step of passing the specified substring further includes passing more than one operation to be performed on the specified substring. (Please read the precautions on the back before filling this page) 4 7 · —A kind of authentication server, including: (a) a processor with an interface for receiving input and transmitting output> (b) can be accessed to process The electronic serial number of the device and the list of recorded identification strings; (c) using the logic of the processor to receive the electronic serial number; selecting and transmitting the majority of the substring designation; receiving the authentication string; and comparing the authentication string with a loan Result calculated by applying more than one operation to most specified substrings. 4 8 · The authentication server according to item 47 of the patent application scope, wherein the logic specified by inputting a plurality of substrings further includes logic to select and transmit a designation of one or more operations to be performed. Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 4 9 · If the certification server of the 47th patent application for the patent application, further includes more than one record of chaotic operations, and logic to calculate the application of chaotic operations to more than one specified substring the result of. 50 · If the authentication server in the scope of patent application No. 47, further includes more than one record chaotic operation, and logic to calculate the results obtained by applying the specified operation and chaotic operation to the specified substring. 5 1 · —A method of user authentication using a list of recorded electronic serial numbers and recorded identification strings, including the following steps: 1 This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm)- 32- 582156 A8 B8 C8 D8 VI. Patent Application Scope (a) Receive specific electronic serial numbers: (b) Select and transmit most substring designations; (c) Receive authentication strings; (d) Apply more than one operation to it A designated substring corresponding to the record identification string of a specific electronic serial number to calculate a record result: and (e) comparing the authentication string with the record result. 5 2 · The method according to item 51 of the scope of patent application, wherein the selection and transmission steps further include selecting and transmitting more than one operation designation used in the application step. 53. The method according to item 51 of the scope of patent application, which uses one or more chaotic operations corresponding to a specific electronic serial number, wherein the application step applies the chaotic operations to a specified substring. 54. The method of claim 53, wherein the selecting and transmitting steps further include selecting and transmitting more than one operation designation, and the applying step applies the specified operation and chaotic operation to the specified substring. 5 5-An authentication system, including: printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs (a) an authentication server containing a list of recorded electronic serial numbers and recorded identification strings, this authentication server also contains logic to Enter a specific electronic serial number: Select and output the majority of the substring designation; Enter the authentication string; Calculate the designated substring of its use record identification string for execution. This paper size applies the Chinese National Standard (CNS) A4 specification (210 X 297 mm) -33- 582156 A8 B8 C8 D8, more than one patent application for comparative certification b) Reliable inclusion of logical transfer of specific transfer from transfer of certification from authorized server results C) Connectivity and cross-sequence output of specific input majority Calculate the record results obtained by the calculation; String and record results; Transaction server linked to the authorization server, its series is passed to the authorization server by electronic serial number; Most substring designation of the authorization server; String to authorization The server and server receive their instructions for comparing the authentication string with the recording result. Easy server's authentication key, which contains a specific number, an identification string and an electronic serial number logically; substring designation; use the specified substring to identify the identification string to read * Please read first. Back Note I裝 頁 訂 經濟部智慧財產局員工消費合作社印製 行一個以上運算所得之結果而成爲認證字串 t 輸出認證字串。 5 6 . —種使用者認證之方法,包含下列步驟: (a )從用戶端傳送特定的電子序號至一伺服器; (b )從伺服器傳送多數子字串指定至用戶端; (c )應用一個以上運算至一特定辨識字串之指定的 子字串以計算一認證字串; (d )從用戶端傳送認證字串至伺服器; (e )應用一個以上運算至一記錄辨識字串之指定’的 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公釐) -34- 582156 A8 B8 C8 D8 六、申請專利範圍 子字串以計算一記錄結果;及 (f )比較認證字串與記錄結果。 5 7 .如申請專利範圍第56項之方法,進一步包含從 伺服器傳送其欲執行於指定之子字串上的一個以上運算之 指定至用戶端的步驟。 5 8 ·如申請專利範圍第56項之方法,其利用一個以 上相應於特定電子序號之記錄混亂運算,其中應用步驟應 用混亂運算至指定的子字串。 5 9 ·如申請專利範圍第58項之方法,其中選擇及傳 送步驟進一步包含選擇及傳送一個以上運算指定,而應用 步驟應用指定運算與混亂運算至指定的子字串。 (請先閱讀背面之注意· . I I — I I I I t — — — —— — — 1·丨 填寫本頁) 經濟部智慧財產局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS)A4規格(210 X 297公楚) -35 -I Binding Pages Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs and performing the results of one or more calculations to form the authentication string t Output the authentication string. 56. — A method for user authentication, including the following steps: (a) transmitting a specific electronic serial number from the client to a server; (b) transmitting a majority of substrings from the server to the client; (c) Apply more than one operation to a specified substring of a specific recognition string to calculate an authentication string; (d) send the authentication string from the client to the server; (e) apply more than one operation to a record identification string The designation of this paper applies to the Chinese National Standard (CNS) A4 specification (210 X 297 mm) -34- 582156 A8 B8 C8 D8 VI. Patent application sub-string to calculate a record result; and (f) comparison Authentication string and record result. 57. The method according to item 56 of the scope of patent application, further comprising the step of transmitting, from the server, the designation to the client of one or more operations to be performed on the specified substring. 5 8 · The method according to item 56 of the scope of patent application, which uses one or more record chaotic operations corresponding to a specific electronic serial number, wherein the application step applies chaotic operations to the specified substring. 5 9 · The method according to item 58 of the scope of patent application, wherein the selecting and transmitting steps further include selecting and transmitting more than one operation designation, and the applying step applies the specified operation and chaotic operation to the specified substring. (Please read the note on the back first. II — IIII t — — — — — — 1 · 丨 Fill in this page) The paper size printed by the Employees' Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs applies the Chinese national standard (CNS) A4 specification ( 210 X 297 male Chu) -35-
TW90110428A 2000-05-01 2001-05-01 Method of authenticating user TW582156B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US56238500A 2000-05-01 2000-05-01

Publications (1)

Publication Number Publication Date
TW582156B true TW582156B (en) 2004-04-01

Family

ID=24246080

Family Applications (1)

Application Number Title Priority Date Filing Date
TW90110428A TW582156B (en) 2000-05-01 2001-05-01 Method of authenticating user

Country Status (4)

Country Link
CN (1) CN1333610A (en)
AU (1) AU2001257297A1 (en)
TW (1) TW582156B (en)
WO (1) WO2001084768A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI396112B (en) * 2004-08-17 2013-05-11 Google Inc A system, method, service method, and program product for managing entitlement with identity and privacy applications for electronic commerce
TWI567584B (en) * 2012-03-30 2017-01-21 Tokyo Electron Ltd Operation restriction device, operation restriction method and computer program

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020128067A1 (en) 2001-03-09 2002-09-12 Victor Keith Blanco Method and apparatus for creating and playing soundtracks in a gaming system
US7203835B2 (en) * 2001-11-13 2007-04-10 Microsoft Corporation Architecture for manufacturing authenticatable gaming systems
EP1328102A1 (en) * 2002-01-14 2003-07-16 Alcatel Method and system for managing the access to a communication network based on authentication data
US6973554B2 (en) 2003-04-23 2005-12-06 Microsoft Corporation Systems and methods for multiprocessor scalable write barrier
US7519989B2 (en) 2003-07-17 2009-04-14 Av Thenex Inc. Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions
US8407479B2 (en) * 2003-12-31 2013-03-26 Honeywell International Inc. Data authentication and tamper detection
US8131955B2 (en) 2004-04-15 2012-03-06 Microsoft Corporation Ephemeral garbage collection using a tracking mechanism on a card table to determine marked bundles
CN100395990C (en) * 2004-12-23 2008-06-18 华为技术有限公司 Method of authorization and license for devices
CN100459792C (en) * 2005-03-16 2009-02-04 华为技术有限公司 Method of recording user's electronic sequence numbers
CN104954131B (en) * 2014-03-31 2019-09-17 腾讯科技(深圳)有限公司 The verification method and system of identifying code
CN106600790A (en) * 2016-12-27 2017-04-26 北京群菱能源科技有限公司 RFID electronic lock and unlocking method
CN113395392B (en) * 2021-06-11 2022-08-05 哈尔滨海能达科技有限公司 Call access control method, system, simulcast system and terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5091942A (en) * 1990-07-23 1992-02-25 Ericsson Ge Mobile Communications Holding, Inc. Authentication system for digital cellular communications
US5875394A (en) * 1996-12-27 1999-02-23 At & T Wireless Services Inc. Method of mutual authentication for secure wireless service provision
US5974312A (en) * 1997-07-10 1999-10-26 Ericsson Inc. System and method for updating a memory in an electronic device via wireless data transfer

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI396112B (en) * 2004-08-17 2013-05-11 Google Inc A system, method, service method, and program product for managing entitlement with identity and privacy applications for electronic commerce
TWI567584B (en) * 2012-03-30 2017-01-21 Tokyo Electron Ltd Operation restriction device, operation restriction method and computer program

Also Published As

Publication number Publication date
WO2001084768A1 (en) 2001-11-08
CN1333610A (en) 2002-01-30
AU2001257297A1 (en) 2001-11-12

Similar Documents

Publication Publication Date Title
US7437757B2 (en) Token for use in online electronic transactions
US8392978B2 (en) Secure authentication using hardware token and computer fingerprint
EP2927836B1 (en) Anytime validation for verification tokens
JP5066827B2 (en) Method and apparatus for authentication service using mobile device
KR100548638B1 (en) Creating and authenticating one time password using smartcard and the smartcard therefor
US10148648B1 (en) Virtual smart card to perform security-critical operations
EP1379930B1 (en) Security method for transferring shared keys
US20020129261A1 (en) Apparatus and method for encrypting and decrypting data recorded on portable cryptographic tokens
TW582156B (en) Method of authenticating user
AU2001258103A1 (en) Security system for high level transactions between devices
KR101125088B1 (en) System and Method for Authenticating User, Server for Authenticating User and Recording Medium
EP2690589A1 (en) Method and system for security information interaction based on internet
KR100914905B1 (en) Smart Card Having Function of One Time Password Generation and Electronic Banking System Using That
US20170032360A9 (en) Systems and methods for enrolling a token in an online authentication program
Itoi et al. Smartcard Integration with Kerberos V5.
JP2002312326A (en) Multiple authentication method using electronic device with usb interface
Otterbein et al. The German eID as an authentication token on android devices
TWM539668U (en) System for opening account online and applying for mobile banking
AU2009202963B2 (en) Token for use in online electronic transactions
Iwuoha et al. Comparative Analysis of Connected and Disconnected Tokens in Enhanced Multi-Factor Authentication
AU2016203264A1 (en) System and methods for secure authentication of electronic transactions
ZA200502178B (en) Systems and methods for secure authentication of electronic transactions

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees