1. 1. USB key is a kind of hardware device with USB interface. It has a built-in MCU or smart card chip, has a certain storage space, can store the user's private key and digital certificate, and uses the built-in public key algorithm of USB key to realize the user's identity authentication. Usb-hdd is a hard disk simulation mode. After DOS starts, C: disk is displayed. The U disk made by HP U disk format tool uses this mode. The compatibility of this mode is very high, but for some computers that only support usb-zip mode, it can't be started. The two are only similar in writing, with very different meanings
2. Considering that it may be a writing error, briefly introce the other startup modes of USB flash disk:
a. usb-zip: large capacity floppy disk simulation mode. After DOS starts, a disk will be displayed. Usb-zip made by flashboot starts the USB flash disk in this mode. This mode is the only optional mode on some older computers, but it is not compatible with most new computers, especially the large capacity USB flash disk
B. usb-hdd +: enhanced usb-hdd mode. After DOS starts, C: disk is displayed, with high compatibility. The disadvantage is that it can't be started on the computer which only supports usb-zip
C, usb-zip +: enhanced usb-zip mode, support usb-hdd / usb-zip al-mode startup (according to different computers, some BIOS may display C: disk after DOS startup, some BIOS may display a: disk after DOS startup), so as to achieve high compatibility. The disadvantage is that some computers that support usb-hdd will start the USB disk in this mode as usb-zip, which will rece the compatibility of large capacity USB disk above 4GB
D. usb-cdrom: CD simulation mode, DOS can be started without occupying the drive letter, so the compatibility is general. The advantage is that XP / 2003 can be installed like a CD. Generally, it needs the mass proction tools corresponding to the specific USB flash disk model / batch number.
2. Detailed steps of opening USB key:
-
start the computer, and hold down del key until BIOS Setup window appears
-
select and enter the second item, "BIOS Setup". Find the item or group containing the boot text in it, and find the three items of "first", "second" and "third" in order, which represent "first start", "second start" and "third start" respectively
-
pay attention to USB startup, you should select u-hd (if you don't see the three e-texts on this page, usually the option menu on the right side of boot is "setup", then press enter to enter it) you should select "first", press enter, select CD-ROM in the submenu, and then press enter
-
after selecting the startup mode, press F10 to open the E-TEXT dialog box, press "Y" key (can be omitted), and enter to restart the computer automatically. Successfully opened

3. Different from single key dynamic password lock, USB key adopts double key (public key) encryption authentication mode. USB key is a hardware device with USB interface, and its appearance is shown in the figure below. It has a built-in MCU or smart card chip, has a certain storage space, can store the user's private key and digital certificate, and uses the built-in public key algorithm of USB key to realize the user's identity authentication. Because the user's private key is stored in the password lock, it can not be read in any way in theory, so the security of user authentication is guaranteed
USB key procts were first proposed by encryption lock manufacturers. The original USB encryption lock is mainly used to prevent software cracking and ing, and protect software from piracy. The purpose of USB key is different. USB key is mainly used for network authentication, and digital certificate and user's private key are stored in the lock
the hardware and pin code of USB key constitute two essential factors for using certificate. If the user's pin code is leaked, it is safe as long as the USB key itself is not stolen. If hackers want to crack the USB key by cracking the dongle, they need to steal the physical hardware of the user's USB key first. No user is stupid enough to give his key to hackers
one of the most important advantages of USB key is its low cost. The cost of some single-chip USB key can be less than 10 yuan, which is concive to large-scale popularization and application. However, although the cost of single-chip USB key is low, the chip is easy to be copied by hackers. The USB key of smart card chip is not easy to be copied by hardware, but it brings higher cost. Generally, the price of USB key of smart card chip is higher than 30 yuan<
USB key is widely used in online banking at present. You can see that some banks' U shield and Youkey are all such procts. However, it is strange that the charges for these procts seem to be higher than their actual prices
when logging into the online banking system, the USB key is inserted into the computer, and then the pin code is entered. If the verification is passed, the relevant transaction can be carried out. This encryption method uses double key encryption, and the private key is stored in the key safely. In the network application environment, it can be more secure and make up for some defects of dynamic password lock single key encryption
unfortunately, although USB key is superior to dynamic password technology in some places, there are some security problems in practical use that dynamic password does not have. This security problem mainly lies in the client rather than the server. Because the pin code is entered on the user's computer, hackers can still intercept the user's pin code through the program, If the user does not take the USB key in time, the hacker can obtain false authentication by intercepting the pin code, which still has security risks. The dynamic password lock uses random one-time password, and there is no such problem
there are several solutions. One is to transform the existing USB key and add an input key, so that the pin code can be input on the USB key, so that it will not be intercepted by the Trojan horse on the computer
another ideal security mode is to combine the two encryption methods. The pin code of USB key is generated by dynamic password. In this way, the security of server and client can be guaranteed by combining the two encryption locks. The pin code intercepted by hackers is one-time, while the online banking administrator cannot obtain the user password of USB key for authentication. Such online banking, its security is relatively high
however, the problem of implementing this scheme is also obvious: cost. Each encryption lock costs dozens of yuan, and the total cost of two locks may exceed 100 yuan. If it is used on a large scale, it is impossible for the bank to pay the cost, and users may not be willing to pay the cost themselves. Therefore, it is not realistic to implement this scheme
in a word, for the current online banking system in China, strengthening the identity authentication management of online banking users and preventing the disclosure of user information are effective measures to eliminate the potential security risks of online banking. If there is no perfect two-way identity authentication mechanism, then the security of online banking is not guaranteed. At present, the Internet banking system of most banks in the world is based on public key system (PKI) and digital certificate
at present, the dynamic password lock and USB key I mentioned are good security procts, but if it is based on PKI system, it is easier to build a PKI compliant key management platform using USB key, which is one of the reasons why USB key is more widely used.
4. Is to put your Internet banking password on the U disk, so that the U disk is like a key
if you don't have this key, you can't open your bank. Make sure you're safe
5. USB key is a kind of hardware device with USB interface. It has a built-in MCU or smart card chip, has a certain storage space, can store the user's private key and digital certificate, and uses the built-in public key algorithm of USB key to realize the user's identity authentication
because the user's private key is stored in the password lock, it can't be read in any way in theory, so the security of user authentication is guaranteed
USB key procts were first proposed by encryption lock manufacturers. The original USB encryption lock is mainly used to prevent software cracking and ing, and protect software from piracy. The purpose of USB key is different. USB key is mainly used for network authentication, and digital certificate and user's private key are stored in the lock
{rrrrrrr}
extended materials:
advantages of use:
1, safer transactions
U shield, when dealing with online banking business, you don't need to worry about hackers, fake websites, Trojans and other risks, U shield can ensure the security of online banking funds
2. More convenient payment
3. More comprehensive functions
with U shield, you can sign personal financial management agreements through online banking and enjoy our unique financial management services P>
4 and services are more diverse.
has U shield. It can bind the ICBC U shield to Alipay account, and use U shield to authenticate Alipay's behavior, so as to protect the security of Alipay account. p>
6. Both USB key and USB token are information security procts, which are used for users to log in to a system, and their functions are the same.
7. 1、 What is u-shield? U-shield, the customer certificate USBKEY issued by ICBC in 2003 and obtained the national patent, is a high-level security tool provided by ICBC to handle online banking business. It looks like a U disk, like a shield, always protecting the security of your online banking funds. From a technical point of view, shield is a tool for e-signature and digital authentication of online banking. It has a built-in micro smart card processor, and uses 1024 bit asymmetric key algorithm to encrypt, decrypt and digitally sign online data, so as to ensure the confidentiality, authenticity, integrity and non repudiation of online transactions. Working principle] U shield is also used as mobile digital certificate, which stores your personal digital certificate and is not readable. Similarly, the bank records your digital certificate. When you try to conct online transactions, the bank will send you the string a encrypted by the combination of time string, address string, transaction information string and anti replay attack string. Your U shield will perform irreversible operation on the string a according to your personal certificate to get the string B, and send the string B to the bank. The bank will also perform the irreversible operation at the same time, If the bank's calculation result is consistent with your calculation result, you will be considered legal and the transaction can be completed. If not, you will be considered illegal and the transaction will fail.
8. CCB's "USBKEY" ---- in order to ensure the security of online banking customer certificates, our bank has launched the "electronic certificate storage" -- "USBKEY", which is similar to the U disk. The customer's certificates can be stored in the disk, and can be used with the plug, which is very safe< The dongle is the hardware used for software encryption<
the former is a memory
the latter is an encryptor
I don't know if I understand the answer like this
similar to USB flash disk is only a superficial statement, and there is corresponding software and hardware encryption inside
9. USB key is a kind of hardware device with USB interface. It has a built-in MCU or smart card chip, has a certain storage space, can store the user's private key and digital certificate, and uses the built-in public key algorithm of USB key to realize the user's identity authentication. Because the user's private key is stored in the password lock, it can not be read in any way in theory, so the security of user authentication is guaranteed. USB key procts were first proposed by encryption lock manufacturers. The original USB encryption lock is mainly used to prevent software cracking and ing, and protect software from piracy. The purpose of USB key is different. USB key is mainly used for network authentication, and digital certificate and user's private key are stored in the lock. At present, the USB key proct of ICBC is "U shield", and the USB key proct of CMB is "friend key". The main suppliers of both are Jiede company, a professional manufacturer of USB key. USB key is relatively safe, but USB key is not absolutely safe and may be cracked, For detailed technical analysis, please refer to the following two articles: China online banking security analysis: USB key http://www.williamlong.info/archives/753.html Security vulnerability of USB key http://www.williamlong.info/archives/927.html The convenience and risk of USB key online banking in today's Internet driven society, online banking is also called online banking, It has become an indispensable part of the overall development strategy of financial institutions. In recent years, the number of users using online banking has increased greatly, and maintained a stable momentum of development every year. Online banking brings many convenient services to its users, saves expenses and brings more profit growth points to the bank, but also bears a lot of security risks. Many banks are aware of this and take actions one after another, including continuously ecating users to improve their own security awareness, installing anti-virus software and anti Trojan horse software; Using hardware USB key or dynamic password card for identity authentication. The OTP (one time password) of the current online banking client adopts the authentication method of dynamic password, that is, each time the user logs in, in addition to the conventional static password, it also needs to enter a dynamic password that changes every time. There are many ways to obtain the dynamic password, such as scratch card, two-dimensional matrix card and electronic token. The electronic token is what we call the dynamic password, such as VeriSign's dynamic token VIP service. Scraping card and two-dimensional matrix card are both provided in the form of paper card, but they have inherent defects. Scraping card has a strict limit on the number of times it can only be used 30 times, while two-dimensional matrix card can be used infinitely, but it is easy to be copied. Compared with dynamic token, scraping card and two-dimensional matrix card have no timeliness. Now many foreign banks and a few domestic banks use this kind of dynamic password card in the application of online banking. Advantages of dynamic password card: no need to install software, simple operation. It has nothing to do with the client's computer. You can directly use the online banking service without installing any other program. One password at a time solves the problem of customer password stolen. This should be the biggest security benefit of dynamic password. USB key (hardware digital certificate carrier), which is the client solution adopted by most domestic banks, uses USB key to store the digital certificate representing the user's unique identity and the user's private key. In this overall solution based on PKI system, the user's private key is generated in the high security USB key, and can not be exported to the external USB key for life. In the application of online banking, the digital signature of transaction data is completed in the USB key and protected by the pin code of the USB key. In the field of payment, we can see that Alipay and Print-Rite integrity Digital Certification Center launched the third party payment tool "payment shield" the advantage of adopting USB Key mode: the private key representing user identity is generated in USB Key, and the security intensity is high. OCL key adds a physical key in hardware form. Using OCL (operation control list) technology proposed by Zhanqi, when the private key in USB key is needed for signature, the key waiting operation will be started. Within the valid time limit (the user can set the time limit by himself), the signature can succeed only after pressing the physical key, otherwise the signature operation fails. Even if the password of the USB key is intercepted, the Trojan program initiates an illegal transaction application, and the whole transaction cannot be carried out e to the physical key operation. What's more, this implementation method has no influence on the bank side. What we need to change is the user's operating habits. In addition, in the face of the risk of transaction data being tampered in the process of user client submitting to the USB key, OCL key adds a display mole or voice mole, which can display or read the transaction data information sent to the USB key. The display mole or voice mole of OCL key is directly controlled by the security chip in USB key, and the displayed or read content will not be changed by Trojan horse program. Therefore, the data content displayed or read through USB key is the real signed content. The "what you see is what you sign" is realized. The user can complete the whole transaction by pressing the physical button after confirming that the displayed or read contents are correct. OCL key can not only ensure the security of identity authentication, but also support the transaction authentication function to ensure the security of network transactions to the greatest extent, providing customers with a solid identity recognition and password management scheme. Based on the existing theoretical analysis and authoritative investigation, the USBKEY based on OCL technology is the most ideal and convenient security authentication terminal.
10. Bitcoin, lightcoin, Tianrui coin, dogcoin, etc.
How do you invest in the central service contract digital network