Method for realizing follow attack prevention in device with data sign determining function
A technology of data signature and function, applied in the direction of digital data authentication, electronic digital data processing, computer security devices, etc., can solve the problems of follower attack, etc., to achieve the effect of ensuring transaction security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] The present invention will be described in detail below in conjunction with the accompanying drawings and specific examples.
[0027] figure 2 A flow chart of a method for preventing follower attacks for a device with the function of confirming data signatures for online banking transactions. Such as figure 2 As shown in , combined with the transaction process, describe in detail where the attacker is attacked in this process, and how the security of the transaction process is reflected after the anti-following attack measures are adopted.
[0028] When anti-following attack measures are not adopted, the online banking transaction process is as follows.
[0029] Step 201): The user inputs information, and the online banking client forms correct transaction data template information.
[0030] Step 202): The online banking client sends the transaction data template information to be signed to the USBKey.
[0031] Step 203): It is judged in the USBKey whether the tra...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com