Method for automatic identification control and management
First Claim
1. A method for automatic identification control and management, including an installation process of an identity equipment, a login process to log in a host, and an auto-logout process of a host, the method comprising:
- (a) installing the identity equipment for generating a connection verification data and an identity value, the step of installing including;
(i) inputting a first identity code;
(ii) reading out a first identity value generated by the login process of the host;
(iii) decoding the first identity value of the login process by using the first identity code to get an identity certificate code;
(iv) inputting a second identity code to replace the first identity code;
(v) encoding a first identification value by using the second identity code to generate a second identity value, the first identification value being obtained by adding up the identity certificate code, a hardware serial of the host and a generation time;
(vi) encoding a second identification value by using the identity certificate code to generate on-line connection verification data, the second identification value being one element of the first identification value;
(vii) storing the connection verification data in the identity equipment; and
,(viii) storing the second identity value into the host;
(b) logging in the host to decode the connection verification data and the identity value for verifying an identification value;
(c) cyclically checking a connection condition between the identity equipment and the host after successful login; and
(d) jogging out the system automatically if the connection between the identity equipment and the host fails.
4 Assignments
0 Petitions
Accused Products
Abstract
An automatic control and management method for identification by using an identity equipment is proposed. The method includes using a login system to generate an identity certificate code; using a password to encode the identity certificate code and a unique random variable to generate an identity value; and generating an on-line connection verification data by using the identity certificate code and then storing the same into the login system. The process for logging in the login system includes using a portable identity equipment and inputting a password for identification so as to read out the encoded data. If disconnection occurs the login system automatically logs out to protect the confidential data. Thus, the identity equipment used in the present invention can be easily carried away.
-
Citations
11 Claims
-
1. A method for automatic identification control and management, including an installation process of an identity equipment, a login process to log in a host, and an auto-logout process of a host, the method comprising:
-
(a) installing the identity equipment for generating a connection verification data and an identity value, the step of installing including; (i) inputting a first identity code; (ii) reading out a first identity value generated by the login process of the host; (iii) decoding the first identity value of the login process by using the first identity code to get an identity certificate code; (iv) inputting a second identity code to replace the first identity code; (v) encoding a first identification value by using the second identity code to generate a second identity value, the first identification value being obtained by adding up the identity certificate code, a hardware serial of the host and a generation time; (vi) encoding a second identification value by using the identity certificate code to generate on-line connection verification data, the second identification value being one element of the first identification value; (vii) storing the connection verification data in the identity equipment; and
,(viii) storing the second identity value into the host; (b) logging in the host to decode the connection verification data and the identity value for verifying an identification value; (c) cyclically checking a connection condition between the identity equipment and the host after successful login; and (d) jogging out the system automatically if the connection between the identity equipment and the host fails. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for installing an identity equipment, which is a process for installing the identity equipment into a host, the method including:
-
inputting a first identity code; reading out a first identity value generated by a login process of the host; decoding the first identity value generated by the login process of the host by using the first identity code to obtain an identity certificate code; inputting a second identity code to replace the first identity code; encoding a first identification value by using the second identity code to generate a second identity value, the first identification value being obtained by adding up the identity certificate code, a hardware serial of the host and a generation time; encoding a second identification value by using the identity certificate code to generate on-line connection verification data, wherein the second identification value is one element of the first identification value; storing the connection verification data in the identity equipment; and storing the second identity value in the host. - View Dependent Claims (10, 11)
-
Specification