摘要:
The present invention discloses an authentication method and a key device and relates to the information security field. The authentication method comprises initiating user authentication, generating a dynamic code and then a first verification code on the basis of the dynamic code, and outputting the dynamic code, by a key device; and receiving a second verification code entered by a user via a host, and collating the second verification code with the first verification code, by the key device, and if a match is found, the user access is authorized to the key device; otherwise, the user access is prohibited. The key device comprises a trigger module, a generator module, an output module, a communication module, a collator module, a controller module and a security module. According to the present invention, better security is achieved by reducing the possibility of sensitive information disclosure and misuse in case of password theft for the key device.
摘要:
The invention, related to information security field, discloses a method for protecting software, and device and system thereof. The method includes that a security device is connected with a terminal device; the security device receives service instruction, determines whether the clock inside the security device is activated, reads the current time of the clock and determines whether the current time is valid; if so, the security device executes the service instruction and returns the executing result to the terminal device; otherwise, the security device returns false result to the terminal device. The invention provides more secure service to the protected software, meanwhile, extends lifetime of the security device.
摘要:
A method for authenticating an OTP (one time password) and an instrument therefor, in which the method includes determining whether the OTP token is authenticated successfully, if the OTP token is not authenticated successfully, setting size of an authentication window to be a first predetermined time length and authenticating the obtained OTP according to the authentication window; if the OTP token is authenticated successfully, determining whether the interval between the authentication success time and the current system time is longer than a second predetermined time length, if yes, setting size of the authentication window to be a third predetermined time length and authenticating the obtained OTP according to the authentication window and the authentication success time, in which the third predetermined time length is shorter than the first predetermined time length; otherwise, setting size of the authentication window to be a fourth predetermined time length and authenticating the obtained OTP according to the authentication window and the authentication success time, in which the fourth time length is shorter than the third predetermined time length. The invention can ensure both the authentication success rate and the authentication security.
摘要:
The present invention relates to the field of data processing, and specifically to a method and device for data processing. The method comprises: preprocessing an array-to-be-processed; carrying out by means of a predetermined processing method secondary processing on the array-to-be-processed so as to obtain secondary processing results; acquiring an index number from a predetermined place in the secondary processing results; acquiring from the secondary processing results data from predetermined digits on the basis of the index number; converting the acquired data into decimal data; determining whether the bit length of the decimal data is shorter than a second predetermined length; if shorter, adding zeros in front of the high-order bit of the decimal data until reaching the second predetermined length, and regarding the decimal data thereof as processed data; if not shorter, continuously acquiring data from the second predetermined length starting from the low-order bit of the decimal data and regarding said data as processed data. The processing method is simple, and the processed data is irreversible and therefore can be applied to forms of identification.
摘要:
Provided is a method for accessing e-book data, including: step A: e-book hardware establishes a connection with an electronic device and negotiates a reading key; step B: the electronic device downloads e-book data via a client, specifically is: firstly, the electric device establishes a connection with the client; the client sends a connection establishment request to a server; the server verifies the identification of the electronic device via the client; if the verification is not passed, then the access will be refused; if the verification is passed, then the server uses a downloaded key to encrypt the e-book data and sends the encrypted e-book data to the electronic device via the client; and step C: the electronic hardware establishes a connection with the electronic device, processes the encrypted e-book data using the downloaded key and/or the reading key, and the e-book hardware displays the e-book data. The method provided in the present embodiment not only enables the download and reading of the e-book to be more rapid but also protects the copyright of the e-book.
摘要:
The invention provides a method for identifying version type of a Windows operating system on a host by USB device, relating to operating system field and including steps: A, USB device is powered on and initialized; B, the USB device performs USB enumeration, determines whether a first predetermined instruction is received in process of USB enumeration, if yes, determines the operating system is a first operating system and goes to Step D, if no, goes to C; C, the USB device determines the device type returned in process of USB enumeration, if it is a CCID device, determines whether the received instruction includes a second predetermined instruction, if yes, determines the operating system is a second operating system, if no, determines the operating system is a third operating system; when the device is an SCSI device, the USB device determines whether the second received SCSI instruction is a third predetermined instruction or fourth predetermined instruction, if it is the third predetermined instruction, determines that the operating system is a second operating system, if it is the fourth predetermined instruction, determines that the operating system is a third operating system; D, the USB device establishes communication with the host, waits for instruction sent by the host and returns related information to the host according to the determined type of the host operating system.
摘要:
An audio communication based electronic signature system and a method thereof are provided. The system includes: an audio smart key device including an interface module, a data processing module, a smart key module and a power module; and a terminal including an audio output interface, an audio input interface and an application unit. The interface module of the audio smart key device communicates with the terminal in the form of audio signal and it can perform operations of A/D conversion and modulation and demodulation on the audio signal. In the signing method, the terminal sends an audio signal including important data to the smart key device, the audio smart key device receives and decodes the audio signal, demodulates the decoded data and decrypts the demodulated data, signs the decrypted data, encodes, modulates and encrypts the signature result subsequently, sends the crypted result to the terminal, where the encrypted result is sent to the server for signature verification.
摘要:
The invention relates to a one-time password generating method and an apparatus. The method includes steps of collecting fingerprint images, extracting fingerprint feature data from those fingerprint images, and comparing the fingerprint feature data with one or more pre-stored fingerprint feature templates for authentication. After the authentication is passed, a one-time password is generated by the corresponding fingerprint feature template or a user's secret corresponding to the template. The invention also discloses a one-time password apparatus, including a fingerprint collecting unit, a fingerprint feature extracting unit, a storage unit, a comparison unit, a one-time password generating unit, a control unit, and an output unit. By adding fingerprint authentication function to a one-time password generating apparatus, the invention avoids disadvantages such as no user authentication in the present apparatus, only for a single user, and imitation of the apparatus by others when it is lost or theft, as a result, increases security of the apparatus.
摘要:
A working method for information security device with CF interface and working system thereof are disclosed in the invention. The method includes that the card reading apparatus sends instruction to the information security device with CF interface, and the information security device with CF interface determines the object being operated by the instruction, if the object is flash module in the information security device with CF interface, the information security device with CF interface operates the flash module as normal, or else if the object is information security chip of the information security device with CF interface, the information security device with CF interface performs information security operation on the information security chip; or the card reading apparatus determines whether the object being operated by the instruction is a storage device or an information security device, if the object is storage device, the card reading apparatus operates the flash module of the information security device with CF interface as normal, otherwise the card reading apparatus performs information security operation on the information security chip of the information security device with CF interface.
摘要:
A data converting method and device therefor are disclosed by the invention, relating to data converting algorithm field, solving the problem of complicate data converting method in prior art. Steps of the invention are obtaining offset from the predetermined byte of the data string to be converted; obtaining the predetermined bits of data from the data string to be converted according to the offset; converting the obtained bits to decimal number; determining whether size of the decimal number is smaller than the first predetermined length, if so, keeping adding 0 to the upper digit of the decimal number till the first predetermined length is reached, and taking the data with added 0 as the converted data; otherwise keeping obtaining data from low bit of the decimal number, till the first predetermined length is reached, and taking the obtained data as the converted data. The method of the invention is mainly used for devices and methods requiring data converting, e.g. one time password generating method and device therefor.