Summary of the invention
The object of the present invention is to provide the locked check system of a kind of USBKey of avoiding password, follow to attack and cause the locked problem of password to solve in prior art USBKey cryptographic check.
Another object of the present invention is to provide a kind of USBKey of avoiding password locked method of calibration.
In order to achieve the above object, the present invention adopts following technical scheme:
Avoid the locked check system of USBKey password, described checking system comprises:
USBKey management tool, described USBKey management tool and USBKey COS(chip operating system) between secure communication, carry out password check command;
USBKey COS, described USBKey COS is built in USBKey, the password check command sending according to USBKey management tool carries out password verification, and after verification number of times reaches maximal value, activate the outside input block of USBKey, coordinated password check with USBKey management tool according to the value of the outside input block input of USBKey;
The outside input block of USBKey, is arranged on USBKey upper, joins, and activate or cancel input function by USBKey COS with the USBKey COS data that are built in USBKey.
In the preferred version of this system, the outside input block of described USBKey is button or touch-screen.
As the second object of the present invention, a kind of locked method of calibration of USBKey password of avoiding, first described method of calibration is coordinated with USBKey and is carried out password verification by USBKey management tool, when verification number of times reaches after predetermined value, USBKey COS in USBKey activates the outside input block of USBKey, to USBKey input validation password, carry out the verification of discontinuous button password by the outside input block of USBKey.
Further, in described method of calibration, by password checking procedure, add user key-press operation to carry out control checking process initiatively, realize the verification of discontinuous button password.
Scheme provided by the invention can be carried out conventional password verification at USBKey and be occurred when abnormal, as careless manipulation (double hit management tool verification button) or illegally kidnapped by other people that (assailant follows the tracks of usb communication, and attempt password cracking), activate the outside input block function of USBKey of USBKey, carry out the verification of button password, and each button password verification can not be continuous, like this can be in the situation that assurance be safe, greatly reduce the locked probability of USBKey password, thereby can guarantee under the prerequisite of user information safety, improve greatly the convenience that uses USBKey.
Embodiment
For technological means, creation characteristic that the present invention is realized, reach object and effect is easy to understand, below in conjunction with concrete diagram, further set forth the present invention.
Referring to Fig. 1, it is depicted as the system chart of avoiding the locked check system of USBKey password 100.As seen from the figure, native system mainly comprisesUSBKey management tool 101, USBKey COS(chip operating system) 102 and outside input block 103 3 parts of USBKey.
Wherein,USBKey management tool 101 carries out user's authentication for managing USBKEY.ThisUSBKey management tool 101 runs on client'suse side 200, as PC end, produce corresponding authentication information input request according to different USBKEY, and produce corresponding authentication order according to the data of input, the for example USBKey to password authentication, in the time carrying out authenticating user identification, produce and require user to input the request of user password, and produce password check command according to the password data of user's input.
USBKey management tool 101 can be sent to the authentication order (as password check command) producing in the USBKey joining by USB interface and client's use side and carry out authentication.
Follow the tracks of usb communication for fear of assailant, guarantee user's information security, between USBKey inUSBKey management tool 101 and USB interface in client'suse side 200, carry out secure communication, make them before communicating, first carry out proof of identity between the two, verification by after the secure communication that is encrypted again.
Concrete, betweenUSBKey management tool 101 and USBKey, realize proof of identity between the two by timestamp, check code and unique registration match information, before guaranteeing each communication, USBKey carries out verification to the identity of information transmitter, guarantee that this information is to be sent by correspondingUSBKey management tool 101, but not the usb communication data that victim is followed the tracks of and utilized.
USBKey COS(chip operating system) 102 be integrated in USBKEY, carry out the operating process of safety certification verification for completing whole USBKEY.Concrete, between theUSBKey management tool 101 of this USBKey COS and the operation of PC end, carry out secure communication, confirming after identity, accept the order thatUSBKey management tool 101 sends, and respond this order and carry out authentication (as password verification), and response results is sent toUSBKey management tool 101.
USBKey COS(chip operating system) 102 send at responseUSBKey management tool 101 order time, can count responding the number of times that sameUSBKey management tool 101 orders, in the time that this counting reaches predetermined value X, no longer respond the order that thisUSBKey management tool 101 sends, 0≤X≤USBKey verification higher limit.Avoid like this USBKey locked because of frequent faulty operation, equally also can avoid assailant to carry out password cracking.
Simultaneously, this USBKey COS can activate key-press input function, this concrete USBKey COS can reach after predetermined value at safety certification verification number of times, activate the outside input block 103 of USBKey on USBKey, and only accept the associated password that the outside input block 103 of USBKey is inputted, carry out the verification of button password, further complete the verification of password with this; And the check results of response button password is returned toUSBKey management tool 101.
Complete after this safety certification verification, USBKey COS will dormancy key-press input function, no longer receives any information that the outside input block 103 of USBKey is inputted.
It is upper that the outside input block 103 of USBKey is arranged on USBKey, for the COS in USBKEY is inputted to relevant password or numerical value.It is specifically as follows button or the touch-screen etc. of hardware, and in the time that USBKEY carries out conventional safety certification verification, in idle dormant state, cannot input any password or data to USBKEY; Only, in the time that USBKey COS activates key-press input function, the outside input block 103 of USBKey is just activated and realizes input function.
After the outside input block 103 of USBKey is activated, while carrying out input key password, input that can not continuous several times, can guarantee that like this USBKey COS activates the outside input block function of USBKey of USBKey, while carrying out the verification of button password, each button password verification can not be continuous, thereby can, in the situation that assurance is safe, greatly reduce the locked probability of USBKey password.
It realizes principle is exactly in password checking procedure, adds user key-press operation to carry out control checking process initiatively, prevents that password checking process from, in the unwitting situation of user, carrying out invalid password operation.
When specific implementation, when entering when needing button to carry out password checking mode, password verification implementation is controlled processing by the manual button of user, if user is button not, password verification can not be carried out completely, i.e. this operation is not effectively, can not produce password check results and affects password residue check number of times, thereby can not reach lower limit number of times and cause USBKey equipment locked because of password verification number of times.Under the control of above mechanism, because password verification causes USBKey equipment, locked probability greatly reduces.
In the time that the outside input block 103 of USBKey is hardware button, a LCD display also can be set on this USBKEY, carry out the demonstration of dependent instruction.
What form thus avoids the locked check system ofUSBKey password 100 in the time carrying out work, first carry out password verifying function by USBKey management tool, whether USBKeyCOS arrives and need to start keypress function according to residue check number of times, if condition does not meet, directly carries out password verification; Otherwise start password verification keypress function, management tool prompting user key-press, USBKey starts keypress function, and returns to key-press status (if support LCD to show, user key-press information is waited in LCD demonstration).
Below illustrate the operating process of avoiding the locked check system ofUSBKey password 100 to carry out password verification.
Before concrete operations, first carry out the preliminary work that checksystem 100 arranges, operationUSBKey management tool 101 in PC end, join being mounted with USBKey COS and the USBKEY of USBKey outside input block 103 and the USB interface of PC end simultaneously, set up usb communication with theUSBKey management tool 101 in PC end.
Now, the USBKey COS dormancy key-press input function in USBKEY, makes the outside input block 103 of USBKey on USBKEY export dormant state, cannot input any information and data.
Complete after above-mentioned preliminary work, user can carry out password verification by this system, detailed process following (referring to Fig. 2):
1, user logins PC end, and operationUSBKey management tool 101, inputs relevant password, starts password verifying function.
2,USBKey management tool 101 receives after the password of input, forms corresponding password check command, and is sent to the USBKEY that sets up usb communication with it.
3, USBKEY receives after this order, and the first sender's of this order of verification identity checks whether it is correspondingUSBKey management tool 101, if not, do not carry out password verification, return to error result; If so, whether inquiry needs to start keypress function (specifically whether reaching predetermined value X by inquiry verification number of times determines whether to start keypress function); If desired start, return to wait key-press status, now the COS in USBKEY will activate key-press input function, return to wait key-press status toUSBKey management tool 101, and no longer receive any information thatUSBKey management tool 101 sends; Start if do not need, the COS in USBKEY will directly carry out verification to password.
4, after the wait key-press status that USBKeymanagement tool 101 returns at the COS receiving in USBKEY, produce operation push-button hint instructions, hold and show and point out by PC.
5, the COS in USBKEY, activating after key-press input function, produces button operation hint instructions, and shows by the display screen on USBKEY, also can point out by sound or vibration.
6, user carries out button operation by the outside input block 103 of USBKey being activated, to the relevant information that confirms password of COS input in USBKEY.
7, the COS in USBKEY, receiving after the key command that the outside input block 103 of USBKey inputs, carries out password verification, and check results is returned toUSBKey management tool 101, completes this verification, and dormancy key-press input function again.
As from the foregoing, in the time carrying out password verification, in the time reaching verification number of times and reach predetermined value, need user to carry out physical operations to control flow process and the validity thereof of verification, thereby can guarantee safe in the situation that, greatly to reduce the locked probability of USBKey password.
More than show and described ultimate principle of the present invention, principal character and advantage of the present invention.The technician of the industry should understand; the present invention is not restricted to the described embodiments; that in above-described embodiment and instructions, describes just illustrates principle of the present invention; without departing from the spirit and scope of the present invention; the present invention also has various changes and modifications, and these changes and improvements all fall in the claimed scope of the invention.The claimed scope of the present invention is defined by appending claims and equivalent thereof.