Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A security system based on usb-key and its application method

A security system and authentication module technology, applied in the Internet field, can solve problems such as system security and system resource waste, and achieve the effects of simplifying login steps, preventing troubles, and improving system resource utilization.

Inactive Publication Date: 2018-01-02
成都金安卓创科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above problems, the present invention provides a security system based on USB-key and its usage method, which aims to solve the problems caused by the behavior of the system always opening the service interface related to operation and maintenance and the way of using username / password for identity verification. System resource waste and system security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security system based on usb-key and its application method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described in detail below through specific embodiments in conjunction with the accompanying drawings.

[0025] Described a kind of safety system based on USB-key and using method thereof, comprise embedded device and the USB-key inserted in the embedded device, described embedded device comprises display module, receiving module, authentication module and service module; The built-in mapping port of the receiving module accepts and processes the signal triggered by verifying that the USB-key is inserted into the embedded device, detects whether the hardware connected to the USB port is the corresponding USB-key type, and only responds to the required USB-key type. After detecting that the hardware connected to the USB port is not a USB-key (such as a U disk or other USB port hardware), or is not the type of USB-key used by this system (such as other types of USB-key), the display module will issue an unrecognized Reminder, when the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a USB-key based security system and a usage method therefor. The USB-key based security system comprises an embedded device and a USB-key used by matching with the embedded device, wherein embedded device comprises a display module, a receiving module, an authentication module and a service module; the display module is used for displaying system statuses and prompting operation steps and results; the receiving module is provided with a built-in mapping port for receiving and processing a signal, which is triggered by verifying whether the USB-key is inserted into the embedded device, and transmitting a signal to open the authentication module after verification; the authentication module is provided with a built-in encryption certificate to perform identity authentication on the signal transmitted by the receiving module, and opening the service module after authentication; and the service module is used for opening external service functions. According to the USB-key based security system and the usage method therefor disclosed by the present invention, the use security of the embedded device can be improved, background resources of the security system can be saved, and the use convenience level is improved.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a USB-key-based security system and a usage method thereof. Background technique [0002] The USB-key is a hardware device with a USB interface. Its shape is the same as our common U disk. Unlike the U disk, the USB-key has a built-in CPU, memory, and chip operating system (COS), which can store the user's Key or digital certificate, using the built-in cryptographic algorithm of USB-key can realize the authentication of user identity. Each USB-key has hardware PIN code protection, and PIN code and USB-key constitute two necessary factors for users to use USB-key. Only when the user obtains the USB-key and the user PIN code at the same time, can he log in to the system through a terminal such as a PC, and then use the USB-key to perform corresponding operations. [0003] At present, in practical applications, when users need to configure the operation and maintenance of emb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/34
CPCG06F21/34
Inventor 张奕胡涛
Owner 成都金安卓创科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products