WO2009018684A1 - Clavier de chiffrement et d'authentification anti-cheval de troie à clef à usage unique - Google Patents

Clavier de chiffrement et d'authentification anti-cheval de troie à clef à usage unique Download PDF

Info

Publication number
WO2009018684A1
WO2009018684A1 PCT/CN2007/002383 CN2007002383W WO2009018684A1 WO 2009018684 A1 WO2009018684 A1 WO 2009018684A1 CN 2007002383 W CN2007002383 W CN 2007002383W WO 2009018684 A1 WO2009018684 A1 WO 2009018684A1
Authority
WO
WIPO (PCT)
Prior art keywords
keyboard
authentication
key
main chip
data
Prior art date
Application number
PCT/CN2007/002383
Other languages
English (en)
Chinese (zh)
Inventor
Kamfu Wong
Original Assignee
Kamfu Wong
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kamfu Wong filed Critical Kamfu Wong
Priority to CN200780100185.1A priority Critical patent/CN101933315B/zh
Priority to PCT/CN2007/002383 priority patent/WO2009018684A1/fr
Publication of WO2009018684A1 publication Critical patent/WO2009018684A1/fr
Priority to HK11105543.8A priority patent/HK1151660A1/xx

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Definitions

  • An encrypted authentication keyboard that can be used against Trojan horses with a disposable one-time key
  • the present invention relates to the field of information transmission security, and in particular to an encrypted authentication keyboard for authentication
  • Some organizations that require high network security such as financial institutions, use some two-factor authentication methods to combat hackers, such as using security tokens (Token).
  • Token security tokens
  • the security encoder when the user logs in to the financial institution's server, the security encoder generates a code. In addition to entering the correct user password, the user must enter the correct code to log in to the financial institution's server.
  • These security encoders usually have a built-in key. When used, the security coder generates a security code by complex algorithm calculation according to factors such as time, and uses the same key in the financial institution's server, according to time. The factor is calculated by the same algorithm to generate a code.
  • the code generated by the financial institution's server is the same as the security code generated by the security codec, the identity of the security coder can be authenticated, and the user password is checked. At the same time, the security code and user password can be authenticated to log in successfully.
  • this two-factor authentication method can improve the network security problem, some network security problems are still not properly solved. For example, some hackers use various intrusion methods to place the Trojan horse in the user's computer and connect to the user.
  • the financial institution's server intercepts the data input by the user on the computer keyboard through the Trojan horse program, including the account number, the account password and the security code input by the user, the hacker immediately logs in to the financial institution's server and steals the data according to the intercepted data. Money in the user's account. Many people I am afraid that my computer may be hacked and installed a Trojan horse program, so I dare not use the financial transaction service of financial institutions. This is an extremely problem to be solved.
  • the object of the present invention is to achieve such an encryption authentication keyboard for authenticating identity and encrypting data, characterized in that the main structure of the keyboard includes a main chip (1), a keyboard controller (2), Button (3), communication interface (4), mode button (5), display device (6), the encrypted authentication keyboard has a standard mode and an encryption mode, and in the standard mode, the data input on the button (3) It will be directly output on the communication interface (4).
  • the encryption mode the data input on the button (3) will be temporarily saved on the main chip (1).
  • press the mode button (5) once to switch to the standard mode.
  • the main chip (1) extracts an unused key according to a predetermined program (A) encrypts the temporarily stored data and then outputs it through the communication interface (4).
  • the main chip (1) is provided with a CPU and a memory, and is connected with a keyboard controller (2), a communication interface (4), a display device (6) and the like, and operates according to a predetermined program to realize the identity of the authenticated user in the server and
  • Each of the predetermined functions includes encrypting the data input by the user in the encryption mode, displaying the prompt information through the display device (6), transmitting the data through the communication interface (4), and the keyboard controller (2) and each button (3)
  • the mode key (5) is connected, operates according to a predetermined program, realizes reading the data input by the user through each button (3), and transmits the data input by the user to the main chip (1) for further processing; as well as,
  • the main chip ⁇ uses the key input by the user in the encryption mode through each button (3) to the key
  • ( ⁇ ) Encrypt the input data and transmit it to the server through the communication interface (4).
  • the server decrypts the data using the key ( ⁇ ) paired with the key ( ⁇ ) to restore the data input by the user, and Check the content of the data. After checking, the user's identity authentication is successful, and then the server will perform corresponding operations according to the data content.
  • the main chip (1) of the encrypted authentication keyboard of the present invention is instantly transmitted by the keyboard controller (2) to the main chip (1) by the main chip (1).
  • the display device (6) instantly displays the data input by the user, and temporarily stores the data in the main chip (1).
  • the main chip (1) When the data temporarily stored in the main chip (1) reaches the specified size, or when the operating mode of the main chip (1) is switched from the encryption mode to the standard mode, the main chip (1) will be from the main chip (1) according to a predetermined program. Extract an unused key ( ⁇ ) and an index number (C) corresponding to the key ( ⁇ ), and use the key ( ⁇ ) to encrypt the data temporarily stored in the encryption mode together with the chip number (D).
  • the ciphertext, and then the ciphertext, the index number (C), the chip number (D), and the like constitute an authentication package, and the authentication package is transmitted to the server through the communication interface (4) output, and the server adopts the key ( ⁇ )
  • the paired key ( ⁇ ) decrypts the ciphertext to restore the data entered by the user, and after the main chip (1) encrypts the temporarily stored data, the temporarily stored data is deleted, and the piece is deleted.
  • the key ( ⁇ ) is deleted or discarded or marked as used, so that the key ( ⁇ ) is not used again by the main chip (1).
  • the invention has the advantages that the user can input important information on the keyboard in the encryption mode, and the key data is encrypted by using the one-time key, and then sent out by the keyboard, even if the hacker uses the Trojan horse program to intercept The encrypted data sent from the keyboard is taken, and the content of the important data input by the user cannot be cracked.
  • the keyboard of the present invention is particularly suitable for the online banking service requiring high security, and the account number can be secretly entered through the keyboard of the present invention. , sensitive account information such as account password and amount.
  • FIG. 1 is a block diagram of a first embodiment of an encrypted authentication keyboard of the present invention
  • FIG. 2 is a block diagram of a second embodiment of the encrypted authentication keyboard of the present invention
  • FIG. 3 is an encrypted authentication of the present invention
  • FIG. 4 is a schematic perspective view of a fourth embodiment of the cryptographic authentication keyboard of the present invention
  • FIG. 5 is a perspective view of a fifth embodiment of the cryptographic authentication keyboard of the present invention.
  • Figure 6 is a schematic perspective view of a sixth embodiment of the encryption authentication keyboard of the present invention
  • Figure 7 is a block diagram showing a seventh embodiment of the encryption authentication keyboard of the present invention
  • FIG. 9 is a schematic perspective view showing the ninth embodiment of the cryptographic authentication keyboard of the present invention.
  • FIG. In the figures, the same numerals represent the same devices and components, and the drawings are schematic for illustrating the main features and configurations of the keyboard of the present invention.
  • FIG. 1 is a block diagram of a first embodiment of an encryption authentication keyboard of the present invention.
  • the main structure of the encryption authentication keyboard shown in the figure includes a main chip (1) and a keyboard controller (2).
  • the display device (6) and the like are connected, operate according to a predetermined program, and realize the identity of the authenticated user in the server and various predetermined functions, including encrypting the data input by the user in the encryption mode, displaying the prompt information through the display device (6),
  • the data is transmitted through the communication interface (4), and the keyboard controller (2) is connected to each button (3) and the mode button (5), and operates according to a predetermined program, so that the reading user inputs through each button (3).
  • the user input data is transferred to the main chip (1) for further processing; and, the main chip (1) will input the data input by the user through each button (3) in the encryption mode, and input with the key (A)
  • the data is encrypted, and then transmitted to the server through the communication interface (4>, and the server uses the key (B) paired with the key (A) to decrypt the data and restore the data input by the user, and check the data content, check After the error is correct, the user's identity authentication is successful, and then the server will perform corresponding operations according to the data content.
  • the communication interface (4) may be a wireless communication device, or a wired communication device, or a Bluetooth device, or an infrared device, or a USB interface, or an RS-232 interface, or a PS2 keyboard interface.
  • the main chip (1) shown in the figure further includes a unique chip number (D), and is provided with a plurality of keys (A) and a plurality of index numbers (C), each of which The index number (C) corresponds to a key (A), and each index number (C) is different from each other.
  • D unique chip number
  • the index number (C) corresponds to a key (A)
  • each index number (C) is different from each other.
  • the working mode of the main chip (1) of the cryptographic authentication keyboard of the present invention includes a standard mode and an encryption mode, wherein, in the standard mode, the data input by the user on the button (3) is immediately controlled by the keyboard controller (2) Transferred to the main chip (1), the main chip (1) directly transfers the data input by the user to the communication interface (4) output; in the encryption mode, the data input by the user on the button (3) is instantly controlled by the keyboard
  • the device (2) is transferred to the main chip (1), and the main chip (1) displays the data input by the user through the display device (6), and temporarily stores the data in the main chip (1);
  • the working mode of the main chip (1) is switched from the encryption mode to the standard mode
  • the main chip (1) will be from the main chip (1) according to a predetermined program.
  • the ciphertext, and then the ciphertext, the index number, the chip number (D), and the like constitute an authentication package, and the authentication package is output to the server through the communication interface (4), and the main chip (1) will temporarily store the data.
  • the key (A) is deleted or discarded or marked as used, so that the key (A) is not used again by the main chip (1).
  • each authentication account corresponds to a main chip of the keyboard (1), and the chip number (D) of the main chip (1) corresponding to the account is stored in the authentication account and one Account password, each authentication account stores multiple keys (B) and multiple index numbers (C), and each index number (C) corresponds to one key (B).
  • the key (B) in each authentication account is paired with the key (A) in the main chip (1) corresponding to the account, and each key (B) has a matching key (A).
  • Each pair of paired keys (A) and keys (B) have the same index number (C).
  • an authentication account is opened in the server in advance, and the server generates a plurality of pairs of keys and a plurality of sequential index numbers (C) in a random manner by various methods, each pair
  • the key is assigned an index number (C)
  • each pair of keys is stored in the main chip (1) and the authentication account of the encrypted authentication keyboard together with the assigned index number (C), and stored in the main chip (1). It is called the key (A), and the key (B) stored in the authentication account.
  • the encryption algorithm used is an asymmetric cryptographic algorithm, the key (A) and the key (B) are pairs of each other.
  • the key (A) is a pair of identical keys.
  • the data can be decrypted using the key (B) paired with the key (A).
  • various algorithms can be used, such as Data Encryption Standard (DES), Triple Data Encryption Standard (Triple-DES), RSA algorithm (RSA algorithm), one-time password ( One Time Pad), Public Key Infrastructure (PKI) and other algorithms can well achieve the object of the present invention.
  • DES Data Encryption Standard
  • Triple-DES Triple Data Encryption Standard
  • RSA algorithm RSA algorithm
  • PKI Public Key Infrastructure
  • the mode key (5) shown in the figure is mainly used to select the working mode of the main chip (1).
  • the main chip (1) In the standard mode, when the user presses the mode key (5) once, the main chip (1) is immediately Switching the operating mode to the encryption mode, and when the user presses the mode button (5) once, the main chip (1) immediately switches the operating mode to the standard mode.
  • the main chip (1) of the keyboard of the present invention is further provided with an unlock password. Before the working mode of the main chip (1) is switched from the standard mode to the encryption mode, the user must input the correct unlock password through the button (3), the main chip ( 1) Switch the working mode to the encryption mode. This further enhances the security of the cryptographic authentication keyboard of the present invention.
  • the cryptographic authentication keyboard of the present invention can be applied to terminals that need to transmit important data to a server, such as a computer, a mobile phone, a set top box remote controller, etc., and the terminal and the server are provided by the user using the cryptographic authentication keyboard of the present invention.
  • a server such as a computer, a mobile phone, a set top box remote controller, etc.
  • the terminal and the server are provided by the user using the cryptographic authentication keyboard of the present invention.
  • the server In the package, find the ciphertext, index number (C), chip number (D) from the contents of the authentication package, and find the authentication account corresponding to the chip number (D) in the server from the chip number (D).
  • the user extracts a key (B) from the authentication account with the index number (C) to decrypt the ciphertext and restore the data and chip number (D) input by the user.
  • the chip number (D) is checked.
  • the server can confirm that the authentication package is from the main chip that owns the chip number (D).
  • the key (B) will be deleted or discarded or marked as used, so that the key (B) will not be used by the server again.
  • a server refers to a host of a computer to be accessed by a user, such as a server of various types of online banking, a database server, an email server, and the like, a computer host or a computer system or a computer program that requires authentication of a user.
  • the encrypted authentication keyboard outputs the encrypted data to the server
  • the encrypted data is transmitted to the server through a device including a terminal connected to the encrypted authentication keyboard, a network, etc., for convenience of explanation, relevant in this specification. The description is omitted and is simply summarized as outputting data to the server.
  • FIG. 2 is a block diagram showing a second embodiment of the cryptographic authentication keyboard of the present invention.
  • the main structure of the main chip (1) shown in the figure includes a key card (101) and an interface circuit (102). And a connector (103), wherein the key fob (101) is a separate component separated from other components, and the interface circuit (102) is connected through the connector (103), the interface circuit (102) Connected to the keyboard controller (2), communication interface (4), mode button (5), display device (6) and other components, the key card (101) is equipped with CPU and memory, chip number (D), and more Strip key
  • the connector (103) may be a USB interface connector, or an SD memory card interface connector, or a MINI-SD memory card interface connector, or an MMC Memory card interface connector, or interface connector for memory card or memory card device such as RS-MMC memory card interface connector.
  • the second embodiment is different from the first embodiment in that, in the second embodiment, the main chip (1) is divided into two parts, a key card (101) and an interface circuit (102). Interface power The part of the road (102) and the keyboard controller (2), the button (3), the communication interface (4), the mode button (5), the display device (6), etc. are disposed in the keyboard, and through the connector (103) The key card (101) is plugged in. When the key card (101) is plugged into the keyboard through the connector (103), the user can encrypt the input data through the key card (101) in the encryption mode. The design of the keyboard and the key card (101) is different, so that different people can use the same encrypted authentication keyboard. As long as the user inserts his own key card (101) into the keyboard, the keyboard becomes the user immediately. The personal encryption authentication keyboard, after the use of the key card (101) is pulled out of the keyboard, the keyboard can be used by others.
  • FIG. 3 is a schematic perspective view showing the third embodiment of the encrypted authentication keyboard of the present invention
  • FIG. 4 is a schematic perspective view showing the fourth embodiment of the encrypted authentication keyboard of the present invention
  • 5 is a schematic perspective view of a fifth embodiment of the cryptographic authentication keyboard of the present invention
  • FIGS. 3 to 5 respectively show an example in which the present invention is applied to a terminal device, including the computer keyboard and the diagram shown in FIG.
  • the above examples are used to illustrate the features of the present invention.
  • the cryptographic authentication keyboard of the present invention can be applied to all devices having a keyboard for inputting data by the user.
  • the main chip (1) of the broken line portion shown in FIG. 1 and the keyboard controller (2) are combined into one controller, and for example, the interface circuit (102) and the connector of the broken line portion shown in FIG. 2 are 103) Combining with the keyboard controller (2) or the like as a controller, or combining the main chip (1), the keyboard controller (2), the communication interface (4), etc. into one unit, can also realize the present invention well The purpose is all within the scope of protection of the present invention.
  • FIG. 6 is a schematic perspective view of a sixth embodiment of the cryptographic authentication keyboard of the present invention, showing a portable small wireless keyboard, the main structure of the sixth embodiment and the second embodiment. Basically the same, except the communication of the encrypted authentication keyboard of the sixth embodiment
  • the interface (4) is an interface using a wireless communication method, and may be an infrared device, a Bluetooth device, or a wireless communication device used with a smart card wireless reader, or other wireless communication device.
  • the encryption authentication keyboard of this embodiment can be used for identity authentication purposes of bank cards such as credit cards and debit cards.
  • the key card ⁇ shown in FIG. 6 is a bank card issued by a financial institution, including various credit cards and loans.
  • a bank card such as a card is used in conjunction with an encrypted authentication keyboard and a store POS.
  • the key card (101) into the connector (103) of the encrypted authentication keyboard, input the bank account password and amount, encrypt the data input by the user by the encrypted authentication keyboard, and then put the card on the POS machine to read the card.
  • the encrypted data is transmitted to the bank's accounting server through the POS machine, and the bank's accounting server decrypts the encrypted data and checks the data content to verify the identity of the cardholder. After the verification is successful, the bank performs the relevant payment. operating.
  • FIG. 7 is a block diagram showing a seventh embodiment of the cryptographic authentication keyboard of the present invention.
  • the structure of the cryptographic authentication keyboard further includes a storage device interface (7).
  • the device interface (7) is connected to the external storage device (8), and is mainly used for storing the authentication package through the storage device interface (7) to the external storage device (8), and the storage device (8) Including various types of USB memory devices, SD memory cards, Mini-SD memory cards, MMC memory cards, RS-MCC memory cards and other memory devices.
  • the encrypted authentication keyboard of this embodiment can store the encrypted data, that is, the authentication data packet, through the communication interface (4), and can store the authentication data package in the storage device (8), and then transmit it to the server through other channels. .
  • FIG. 8 is a schematic perspective view of the eighth embodiment of the cryptographic authentication keyboard of the present invention.
  • the present embodiment is different from the previous embodiments in that the display of the cryptographic authentication keyboard of the eighth embodiment is different.
  • the device (6) is externally connected to the encryption authentication keyboard.
  • the display device (6) is both a display of the computer (9) and a display device (6) for encrypting the authentication keyboard, as shown in FIG. (6) Connected to the encrypted authentication keyboard via cable (601)
  • the display device (6) is connected to the display interface of the computer (9) through another cable (602), and the communication interface (4) of the encrypted authentication keyboard is connected to the keyboard interface of the computer (9) through the keyboard cable (401).
  • the data input on the button (3) will be directly output to the computer (9) in the communication interface (4); in the encryption mode, the data input on the button (3) will Immediately transmitted from the keyboard controller (2) to the main chip (1), the input data is instantly transmitted to the display device (6) by the main chip (1), and the main chip (1) temporarily stores the input data.
  • the display device (6) when the display device (6) receives the data transmitted from the encrypted authentication keyboard, the display device (6) immediately displays the received data on the screen of the display device (6) according to a predetermined program.
  • the display device (6) ends the display of the data transmitted by the encrypted authentication keyboard.
  • the advantage of this embodiment is that the display of the original computer (9) is used as the display device (6).
  • the general computer display is provided with a processor and a memory device, etc., as long as an interface is added in the display to receive the encrypted authentication keyboard.
  • the data output in the secret mode is OK, so that the encryption of the authentication keyboard can reduce the cost of setting the display, and the screen of the computer (9) has a larger screen area and can display more input data.
  • the object of the present invention can be well achieved regardless of whether the display device (6) of the encrypted authentication keyboard is externally connected to the computer (9) display or the manner of the foregoing embodiments. The scope of protection.
  • FIG. 8 shows that the embodiment can be further improved.
  • the cable (601) can be incorporated into the keyboard cable (401) and the cable (602), that is, one more group is added to the original keyboard cable (401). Wiring and pins, and a set of such wiring and pins are added to the cable (602). This additional set of wiring and pins is the wiring and pins of the original cable (601), and then through the computer (9). The additional set of wires and pins are connected from the keyboard interface to the display interface, which reduces the number of cables that are externally wired to the encrypted authentication keyboard, although a new set of wires and pins are added.
  • FIG. 9 is a schematic perspective view of a ninth embodiment of the cryptographic authentication keyboard of the present invention.
  • the present embodiment is different from the eighth embodiment in that the cryptographic authentication keyboard of the embodiment is disposed at On a notebook computer, the display screen of the notebook computer is a display device (6) for encrypting the authentication keyboard, the notebook computer is equal to the computer (9) in the eighth embodiment, and the encryption authentication keyboard and the computer (9) are integrated.
  • the components of the encrypted authentication keyboard and the computer (9) and the display device (6) constitute a notebook computer, and their operation modes and functions are the same as those of the eighth embodiment, and the present invention can be well realized. The purpose is all within the scope of protection of the present invention.
  • the cryptographic authentication keyboard of the invention has the advantages of simple structure, easy operation, safety and reliability, low cost, and can effectively counter the Trojan horse program, and ensures that some important data input through the terminal keyboard can be safely transmitted to the server, especially for some online banking services. It is also suitable for servers that involve confidential information, and its implementation will bring good social and economic benefits.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)

Abstract

L'invention porte sur un clavier de chiffrement et d'authentification comportant un mode normal et un mode chiffrement. Dans le mode normal, l'information introduite au moyen du clavier (3) est transmise directement via l'interface de communication (4). Dans le mode chiffrement, l'information introduite au moyen du clavier (3) est sauvegardée temporairement sur la puce principale (1). Quand toute l'information est introduite et que la touche de mode (5) est pressée pour passer du mode chiffrement au mode normal, la puce principale (1) utilise une clef (A) n'ayant pas été utilisée auparavant, pour chiffrer l'information sauvegardée, et la transfère via l'interface de communication (4). Puisque l'information n'est pas transférée en mode chiffrement et que l'information est chiffrée par la clef à usage unique avant son transfert, même si l'information chiffrée est obtenue par le cheval de Troie du pirate informatique, elle ne peut être déchiffrée correctement.
PCT/CN2007/002383 2007-08-08 2007-08-08 Clavier de chiffrement et d'authentification anti-cheval de troie à clef à usage unique WO2009018684A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN200780100185.1A CN101933315B (zh) 2007-08-08 2007-08-08 可对抗木马程式采用用完即弃一次性密钥的加密认证键盘
PCT/CN2007/002383 WO2009018684A1 (fr) 2007-08-08 2007-08-08 Clavier de chiffrement et d'authentification anti-cheval de troie à clef à usage unique
HK11105543.8A HK1151660A1 (en) 2007-08-08 2011-06-02 The keyboard for encrypting and authenticating against trojan horse with one time key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2007/002383 WO2009018684A1 (fr) 2007-08-08 2007-08-08 Clavier de chiffrement et d'authentification anti-cheval de troie à clef à usage unique

Publications (1)

Publication Number Publication Date
WO2009018684A1 true WO2009018684A1 (fr) 2009-02-12

Family

ID=40340929

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2007/002383 WO2009018684A1 (fr) 2007-08-08 2007-08-08 Clavier de chiffrement et d'authentification anti-cheval de troie à clef à usage unique

Country Status (3)

Country Link
CN (1) CN101933315B (fr)
HK (1) HK1151660A1 (fr)
WO (1) WO2009018684A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297399A (zh) * 2012-03-01 2013-09-11 董建飞 提高智能密钥设备安全性的方法和系统

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI488067B (zh) * 2012-11-29 2015-06-11 Chi Pei Wang A method and a device for preventing the computer device from being screened on the screen
CN107729775B (zh) * 2014-07-17 2020-04-10 天地融科技股份有限公司 实现智能密钥设备模式间切换的方法和装置
CN107590383A (zh) * 2017-08-30 2018-01-16 浙江九州量子信息技术股份有限公司 一种基于soc的主密码防护系统与方法

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002045339A1 (fr) * 2000-11-29 2002-06-06 Temasek Polytechnic Systeme et procede ameliores d'autorisation pour securite informatique
CN1427351A (zh) * 2001-12-17 2003-07-02 北京兆日科技有限责任公司 动态电子密码设备及其资源共享系统的用户身份认证方法
CN1622508A (zh) * 2004-12-13 2005-06-01 刘云清 基于动态密码表的动态密码生成和认证系统及方法
CN2794067Y (zh) * 2005-06-06 2006-07-05 刘亚宁 语音通讯工具中按键信号的加密装置
CN1832596A (zh) * 2005-03-07 2006-09-13 蔡林川 一种对小灵通手机加密方法
WO2007051769A1 (fr) * 2005-11-02 2007-05-10 Gemplus Procede de depot securise de donnees numeriques, procede associe de recuperation de donnees numeriques, dispositifs associes pour la mise en œuvre des procedes, et systeme comprenant les dits dispositifs
CN1992592A (zh) * 2005-12-30 2007-07-04 腾讯科技(深圳)有限公司 动态口令认证系统和方法

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002045339A1 (fr) * 2000-11-29 2002-06-06 Temasek Polytechnic Systeme et procede ameliores d'autorisation pour securite informatique
CN1427351A (zh) * 2001-12-17 2003-07-02 北京兆日科技有限责任公司 动态电子密码设备及其资源共享系统的用户身份认证方法
CN1622508A (zh) * 2004-12-13 2005-06-01 刘云清 基于动态密码表的动态密码生成和认证系统及方法
CN1832596A (zh) * 2005-03-07 2006-09-13 蔡林川 一种对小灵通手机加密方法
CN2794067Y (zh) * 2005-06-06 2006-07-05 刘亚宁 语音通讯工具中按键信号的加密装置
WO2007051769A1 (fr) * 2005-11-02 2007-05-10 Gemplus Procede de depot securise de donnees numeriques, procede associe de recuperation de donnees numeriques, dispositifs associes pour la mise en œuvre des procedes, et systeme comprenant les dits dispositifs
CN1992592A (zh) * 2005-12-30 2007-07-04 腾讯科技(深圳)有限公司 动态口令认证系统和方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297399A (zh) * 2012-03-01 2013-09-11 董建飞 提高智能密钥设备安全性的方法和系统

Also Published As

Publication number Publication date
CN101933315A (zh) 2010-12-29
HK1151660A1 (en) 2012-02-03
CN101933315B (zh) 2014-03-26

Similar Documents

Publication Publication Date Title
US20200074469A1 (en) Secure wireless card reader
CN100495430C (zh) 生物体认证装置、终端装置及自动交易装置
US9413535B2 (en) Critical security parameter generation and exchange system and method for smart-card memory modules
US6594759B1 (en) Authorization firmware for conducting transactions with an electronic transaction system and methods therefor
EP1349034B1 (fr) Système de fourniture de services dans lequel des services sont fournis d'un appareil de fourniture de services à un appareil d'utilisateur de services via unréseau
US8132244B2 (en) Mobile smartcard based authentication
US7861015B2 (en) USB apparatus and control method therein
US20020016913A1 (en) Modifying message data and generating random number digital signature within computer chip
EP2098985A2 (fr) Architecture sûre pour lecteurs financiers
JP2000222362A (ja) 多重セキュリティ・チェック・ポイントを可能にする方法及び装置
CN101483654A (zh) 实现认证及数据安全传输的方法及系统
JP2010170561A (ja) 携帯型電子的課金/認証デバイスとその方法
CN101770619A (zh) 一种用于网上支付的多因子认证方法和认证系统
AU2010324525A1 (en) A method and system for providing an internet based transaction
CN101000703A (zh) 可保证信息传输机密性与完整性的电子支付终端
CN101933315B (zh) 可对抗木马程式采用用完即弃一次性密钥的加密认证键盘
WO2000017758A1 (fr) Peripherique sur d'introduction de donnees
WO2008154872A1 (fr) Terminal mobile, procédé et système pour télécharger des informations de carte de banque ou des informations d'application de paiement
KR101872261B1 (ko) Ic 카드 정보 보안 전송 시스템 및 이를 이용한 온라인 결제 및 인증 방법
WO2011060739A1 (fr) Système et procédé de sécurité
CN201947283U (zh) 基于多界面安全智能卡的网上银行远程支付的安全认证装置
KR20090132818A (ko) 유에스비 토큰과 지문을 이용한 이중 보안 시스템
JPH10149103A (ja) 認証方法及び認証システム
JP2009020783A (ja) 非接触icと携帯情報端末を使用した認証システム及び認証方法
KR101394147B1 (ko) 모바일에서 안전하게 인증서를 사용하는 방법

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200780100185.1

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07785293

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07785293

Country of ref document: EP

Kind code of ref document: A1