-
公开(公告)号:US10387633B2
公开(公告)日:2019-08-20
申请号:US15671028
申请日:2017-08-07
发明人: Zhou Lu , Huazhang Yu
摘要: Disclosed is a working method of a voice authentication system and a device. The method includes that: an application server sends user information sent by an application interface and a stored application name to an authentication server; the authentication server generates a push authentication request according to a generated challenge value, the user information and the application name and sends the push authentication request to a mobile terminal token; the mobile terminal token generates voice information, collects the voice response of user, generates a first response value according to the challenge value and sends the challenge value to the authentication server when determining that logon is authorized; the authentication server generates a second response value, returns successful authentication when two response values are identical. The invention prevents click errors caused by mistaken operations, and is convenient to remind user of current information, avoids authentication delay and enhances security.
-
公开(公告)号:US10334410B2
公开(公告)日:2019-06-25
申请号:US15940934
申请日:2018-03-29
发明人: Zhou Lu , Huazhang Yu
摘要: Disclosed is a method and device for Bluetooth communication, the method including: initializing a center device object; obtaining a first device object corresponding to a device of Bluetooth 4.0 according to the center device; pairing with the device of Bluetooth 4.0 according to the first device object to obtain a second device object; obtaining a third device object according to the first or second device object; obtaining a target service corresponding to a preset service identification from the third device object; obtaining a first service according to the target service; obtaining target feature corresponding to a preset feature identification from the first service, realizing communicating with the device of Bluetooth 4.0 via the target feature. The target feature corresponding to the preset feature identification in the target Bluetooth device is obtained according to the center device, and communication with the target Bluetooth device is realized by using the target feature.
-
23.
公开(公告)号:US10241936B2
公开(公告)日:2019-03-26
申请号:US15557151
申请日:2016-02-24
发明人: Zhou Lu , Huazhang Yu
摘要: A method for actively initiating a connection to and communicating with an Apple device via USB, relating to the field of communications, and comprising: an Apple device attachment, when detecting access by a USB device, determines whether the accessing USB device is an Apple device (S1); the Apple device attachment establishes a device address for the Apple device (S2); the Apple device attachment acquires the current communication protocol setup of the Apple device, and determines whether the current communication protocol configuration of the Apple device is a preset configuration (S3); the Apple device attachment sets the current communication protocol configuration of the Apple device as the preset configuration (S4); the Apple device attachment notifies the Apple device to register the Apple device attachment to the Apple device (S5); the Apple device attachment establishes a connection with the Apple device (S6); the Apple device attachment periodically queries whether communication data has been sent by the Apple device, and when detecting communication data has been sent by the Apple device, receiving the communication data sent by the Apple device and implementing communication with the Apple device (S7). The present method can actively initiate a connection with an Apple device without using an Apple authentication chip, acting as a primary device implementing communication with the Apple device.
-
公开(公告)号:US10152593B2
公开(公告)日:2018-12-11
申请号:US14237619
申请日:2013-05-08
发明人: Zhou Lu , Huazhang Yu
摘要: A method and a device for identifying pirated dongle are provided. The method includes: determining by an identification device whether any dongle is connected to host; obtaining preset data from a detection list having data volume larger than storage capacity of the dongle; obtaining first input data and first output data; sending the first input data to the dongle; receiving fifth output data; judging whether the fifth output data is identical to the first output data; determining the dongle as legitimate if judgment result is positive; determining the dongle as pirated if judgment result is negative. The detection list has data volume larger than storage capacity of the dongle; during identification, the legitimate dongle returns correct output data based on a cryptographic algorithm, while the pirated dongle without the correct cryptographic algorithm returns wrong data; therefore, the identification device may identify pirated dongle, and protection for dongle is improved.
-
公开(公告)号:US10142318B2
公开(公告)日:2018-11-27
申请号:US15502865
申请日:2015-08-21
发明人: Zhou Lu , Huazhang Yu
摘要: A self-adaptive communication method for an encryption dongle, comprising: an upper-layer software platform sets communication mode information of self, when connection of an encryption dongle to a host is detected, acquires communication mode information of the encryption dongle, determines whether or not the communication mode information of self matches the communication mode information of the encryption dongle, if yes, then communicates with the encryption dongle via an interrupt transmit pipeline, and if not, then transmits a communication instruction to the encryption dongle via a control transmit pipeline; the encryption dongle sets a communication mode identifier on the basis of the communication mode information of the upper-layer software platform in the communication instruction, and, the encryption dongle resets and resets communication mode information of self on the basis of the communication mode identifier. As such, when connection of the encryption dongle to the host is re-detected, the upper-layer software platform re-acquires the communication mode information of the encryption dongle, determines that the communication mode information is a match, and then communicates via the interrupt transmission pipeline, thus solving the technical problem that an existing encryption dongle can only support one communication mode of the host, and implementing self-adaptive communication for the encryption dongle.
-
公开(公告)号:US10114953B2
公开(公告)日:2018-10-30
申请号:US12455637
申请日:2009-06-04
申请人: Zhou Lu , Huazhang Yu
发明人: Zhou Lu , Huazhang Yu
摘要: The invention discloses a method and a system of upgrading firmware of a card reader. In the method, a card reader is connected to an IC card; the card reader determines whether the IC card is an IC card for upgrading, if it is, the card reader makes one-way or mutual authentication with the IC card; after a successful authentication, the card reader acquires files for upgrading the firmware of the card reader. The system includes a card reader and an IC card. The firmware of card reader is upgraded in the invention by acquiring the files for upgrading from an IC card in which the files for upgrading are pre-stored. The invention improves the efficiency of upgrading the card reader and also improves the security of the upgrading by the authentication between the card reader and the IC card.
-
公开(公告)号:US20170337366A1
公开(公告)日:2017-11-23
申请号:US15671028
申请日:2017-08-07
发明人: ZHOU LU , HUAZHANG YU
CPC分类号: G06F21/32 , G06F21/33 , G06F21/62 , G06F2221/2103 , G10L17/24 , H04L9/3215 , H04L9/3231 , H04L9/3234 , H04L29/06 , H04L63/0861 , H04L63/10
摘要: Disclosed is a working method of a voice authentication system and a device. The method includes that: an application server sends user information sent by an application interface and a stored application name to an authentication server; the authentication server generates a push authentication request according to a generated challenge value, the user information and the application name and sends the push authentication request to a mobile terminal token; the mobile terminal token generates voice information, collects the voice response of user, generates a first response value according to the challenge value and sends the challenge value to the authentication server when determining that logon is authorized; the authentication server generates a second response value, returns successful authentication when two response values are identical. The invention prevents click errors caused by mistaken operations, and is convenient to remind user of current information, avoids authentication delay and enhances security.
-
公开(公告)号:US09787393B2
公开(公告)日:2017-10-10
申请号:US15164757
申请日:2016-05-25
发明人: Zhou Lu , Huazhang Yu
IPC分类号: H04B7/00 , H04B7/26 , H04W4/00 , H04W12/04 , H04W12/06 , H04W52/02 , H04W76/00 , G06F21/43 , G06F21/44 , H04L29/06 , H04L29/12 , H04W88/02 , H04W8/00 , H04W84/20
CPC分类号: H04B7/26 , G06F21/43 , G06F21/445 , G06F2221/2105 , G06F2221/2107 , H04L61/6022 , H04L63/0876 , H04W4/00 , H04W8/005 , H04W12/04 , H04W12/06 , H04W52/0209 , H04W76/00 , H04W84/20 , H04W88/02 , Y02D70/144 , Y02D70/449
摘要: The present invention discloses a method for realizing bluetooth-binding between a smart key device and a mobile device, which belongs to the field of information security. The method comprises: the smart key device performs bluetooth pairing with a current paired mobile device, obtains and determines a bind identification when the pairing succeeds; in case that the bind identification is bind, it determines whether a mac address of the current mobile device is the same as a stored mac address of the bound mobile device, and, if yes, executes a data interactive operation, otherwise, reports an error; in case that the bind identification is unbind, it takes the mac address of the current paired mobile device as the mac address of the bound mobile device and the address, and sets the bind identification as bind, and executes the data interactive operation.
-
公开(公告)号:US09754142B2
公开(公告)日:2017-09-05
申请号:US14376864
申请日:2012-12-21
发明人: Zhou Lu , Huazhang Yu
IPC分类号: G06K7/10
CPC分类号: G06K7/10366 , G06K7/10128
摘要: A method for detecting that a contactless CPU card leaves a radio-frequency field relates to the field of smart cards. The method comprises: receiving and judging whether a valid instruction sent by an upper computer is received, and conducting a corresponding operation according to the received instruction; as a notification card search instruction, conducting a card search operation, and judging whether returned information is received; obtaining card number information about a contactless card according to the returned information; as an APDU instruction, sending A data to the card in accordance with a designated format, judging whether a response is received, and sending the operation result to the upper computer; as an extension instruction, executing a corresponding operation, and sending the operation result to the upper computer; when a valid instruction is not received, judging the mark of the card in the radio-frequency field, and if the card is in the radio-frequency field, conducting a card detection operation, and sending the operation result to the upper computer; and if the card is not in the radio-frequency field, conducting a card search operation. The present invention can detect the problem that a CPU card leaves a radio-frequency field in real time.
-
公开(公告)号:US20170237775A1
公开(公告)日:2017-08-17
申请号:US15502797
申请日:2015-08-21
发明人: Zhou Lu , Huazhang Yu
CPC分类号: H04L63/1483 , H04L63/101 , H04L63/168 , H04L67/02 , H04L67/146
摘要: A method for implementing online anti-phishing, related to the field of information security, comprising: a browser loads an online anti-phishing control, the control acquires a blacklist and a whitelist, if a received URL of the browser is in the blacklist, the browser is stopped from loading, if the URL is in the whitelist, the browser is notified to load, and if the URL is neither in the blacklist nor in the whitelist, a determination is made on whether or not the URL of the browser satisfies a preset fuzzy match criterion, if same is satisfied, then a user is prompted of danger, when the user chooses to proceed, a preset account combination is acquired, when received keypress information is numerals and an input focus is an input box control, the keypress information is compared with the preset account combination, if both are identical then the user is prompted of danger, and either stop or load as chosen by the user. The method allows processing of the blacklist and the whitelist to be implemented and addition of fuzzy query, thus implementing processing of the blacklist and the whitelist, preventing a hacker from stealing banking information of the user by using a fraudulent URL identical to one in the whitelist, and enhancing security.
-
-
-
-
-
-
-
-
-