CN104125065A - Short-distance wireless communication authentication device and method - Google Patents

Short-distance wireless communication authentication device and method Download PDF

Info

Publication number
CN104125065A
CN104125065A CN201310216831.8A CN201310216831A CN104125065A CN 104125065 A CN104125065 A CN 104125065A CN 201310216831 A CN201310216831 A CN 201310216831A CN 104125065 A CN104125065 A CN 104125065A
Authority
CN
China
Prior art keywords
data
trackpad
card
wireless communication
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310216831.8A
Other languages
Chinese (zh)
Inventor
陈佳宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Elan Microelectronics Corp
Original Assignee
Elan Microelectronics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Elan Microelectronics Corp filed Critical Elan Microelectronics Corp
Publication of CN104125065A publication Critical patent/CN104125065A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a short-distance wireless communication authentication device and a method thereof, wherein the method comprises the following steps: reading a wireless communication card to obtain card data, wherein the card data comprises account data; temporarily storing the card data; inputting a decryption data through a touch pad, and comparing the decryption data with an encryption data; and when the decrypted data and the encrypted data are consistent, transmitting the account data to a server unit. By the invention, a layer of security authentication mechanism is additionally arranged on the authentication device/server unit, so that the risk of password logging can be greatly reduced.

Description

Short-distance wireless communication authenticate device and method thereof
Technical field
The present invention is relevant for a kind of short-distance wireless communication authenticate device and method thereof, to avoid the risk of the stolen brush of short-distance wireless communication card.
Background technology
The custom of modern's shopping starts to move towards network from traditional StoreFront, and on line, swiping the card is indispensable mode, yet, in the epoch of this network prosperity, with keyboard, input credit card number, easily have by not clear program side record and suffer hacker to steal the risk of stealing brush.On the other hand, although short-distance wireless communication is (as wireless radio frequency transmission identification (Radio Frequency Identification at present, RFID), wireless near field communication (near field communication, NFC) etc.) swipe the card and can significantly reduce the stolen probability of data, but the Security mechanism of the one deck of not arranging in pairs or groups again while using, therefore,, if credit card or stored value card are lost because of carelessness, stranger just can directly steal brush.
For solving the problem of the stolen brush of above-mentioned short-distance wireless communication card, therefore the present invention is proposed.
Summary of the invention
The invention provides a kind of short-distance wireless communication authenticate device and method thereof, to solve the higher problem of the stolen brush risk of the short-distance wireless communication card existing in prior art.
According to one embodiment of the invention, be to provide a kind of short-distance wireless communication authentication method, it comprises following steps: read a wireless communication card, to obtain a card data (card data), wherein this card data comprises an account data (account data); Temporary this card data; Via a Trackpad, input a data decryption (decryption data), and relatively this data decryption and an enciphered data (encryption data); And, when this data decryption and this enciphered data conform to, this account data are sent to a server unit (server unit).
According to another embodiment of the present invention, be to provide a kind of short distance without communication authentication method, it comprises following steps: read a wireless communication card, to obtain a card data, wherein this card data comprises an enciphered data and an account data; Temporary this card data is in a server unit; Input a data decryption, this server unit is this data decryption and an enciphered data relatively; And, when this data decryption and this enciphered data conform to, allow this server unit to read this account data.
According to another embodiment of the present invention, be to provide a kind of short-distance wireless communication authenticate device, comprise: a Trackpad, for handwriting input the corresponding sensing signal that produces; One Trackpad control unit, couples this Trackpad; One reading unit, is arranged at a surface of this Trackpad, in order to read a wireless communication card; And a communication control unit, couples this reading unit and this Trackpad control unit; Wherein, when this reading unit reads this wireless communication card, relatively an enciphered data of this wireless communication card and a user, via a data decryption of this Trackpad input, if when this data decryption and this enciphered data conform to, allow to transmit an account data of this wireless communication card.
Beneficial effect of the present invention is: at authenticate device/server unit, establish one deck security authentication mechanism more, can significantly reduce the risk that password is logged.
Detailed description and claims of hereby coordinating following diagram, embodiment, by address other objects and advantages of the present invention and be specified in after.
Accompanying drawing explanation
Fig. 1 is the configuration diagram of the short-distance wireless communication authenticate device of one embodiment of the invention;
Fig. 2 A is the radio area of authenticate device of the present invention and the vertical view of Trackpad;
Fig. 2 B is the Trackpad of authenticate device of the present invention and the side view of reading unit, and wherein the aerial radiation direction (making progress) of reading unit is the direction towards touch surface;
Fig. 2 C is the Trackpad of authenticate device of the present invention and the side view of reading unit, and wherein the aerial radiation direction (downwards) of reading unit is towards the opposite direction toward touch surface;
Fig. 3 shows an example of input password/signature window that computer screen shows;
Fig. 4 A is shown in Trackpad and uses an example that singly refers to input a character;
Fig. 4 B is shown in Trackpad and uses an example that refers to input click dummy keyboard more;
Fig. 4 C is shown in Trackpad and uses to refer to that outer sliding gesture is with an example of input password more simultaneously;
Fig. 4 D~Fig. 4 H is shown in Trackpad and uses to refer to that rotation, upper cunning, downslide, right cunning, left sliding gesture are to input the example of password more simultaneously;
Fig. 5 A~Fig. 5 D is the different pieces of information flow diagram between wireless communication card of the present invention, authenticate device and server unit;
Fig. 6 is the flow chart of the short-distance wireless communication authentication method of first embodiment of the invention;
Fig. 7 is the flow chart of the short-distance wireless communication authentication method of second embodiment of the invention;
Fig. 8 A is the flow chart of the short-distance wireless communication authentication method of third embodiment of the invention;
The flow chart of the short-distance wireless communication authentication method that Fig. 8 A~Fig. 8 B is fourth embodiment of the invention.
Reference numeral
100 short-distance wireless communication authenticate devices
110 Trackpad control units
120 communication interfaces
130 Trackpads
140 reading units
140a wireless-communication-capable area
150 communication control units
160 identification units
170 memory cell
180 user sides
190 server units
210a encrypted wireless communication card
210b unencryption wireless communication card
220 bonding layers
251 touch surface
252 assembling faces
Step S602: read the encrypted wireless communication card 210a that is positioned at radio area 140a
Step S603: the encryption card data of encrypted wireless communication card 210a is temporary in authenticate device 100
Step S604: by the encryption card data deciphering of encrypted wireless communication card 210a and be temporary in authenticate device 100
Step S606: the window that produces input data decryption
Step S608: by Trackpad 130 input data decryptions
Step S610: judge whether data decryption is inputted complete
Step S612: judge whether encrypted wireless communication card 210a is still placed in the 140a of radio area
Step S614: judge whether two enciphering/deciphering data conform to
Step S616: send account data to user side 180 and server unit 190
Step S618: blocked account's data
Step S630: this input data decryption and this encryption card data are sent to server unit 190
Step S632: compare this input data decryption and this enciphered data and whether conform to
Step S634: read this account data
Step S636: block this account data
Step S802: read the unencryption wireless communication card 210b that is positioned at radio area 140a
Step S804: account data is temporary in authenticate device 100
Step S806: the window that produces input data decryption
Step S808: by Trackpad 130 input data decryptions
Step S810: judge whether data decryption is inputted complete
Step S812: judge whether unencryption wireless communication card 210b is still placed in the 140a of radio area
Step S814: the identification code of this input data decryption and this account data is sent to this server unit 190
Step S816: server unit 190 comparisons this input data decryption and this enciphered data
Step S818: comparative result information is returned to authenticate device 100 by server unit 190
Step S820: this comparative result information represents whether two enciphering/deciphering data conform to
Step S822: send account data to user side 180 and server unit 190
Step S824: block this account data
Step S830: authenticate device is converted to encryption card data by this account data and the encryption of this input data decryption
Step S832: this encryption card data is sent to server unit 190 by authenticate device 100
Step S834: judge whether this input data decryption and this enciphered data conform to
Step S836: read this account data
Step S838: block this account data
Embodiment
Adopt at present short-distance wireless communication technology, credit card for example, the existing a set of perfect encryption mechanism of transfer of data (NFC financial certification authority mechanism) on network.One of characteristic of the present invention is after reading wireless communication card and uses before account data, establishes one deck security authentication mechanism, with the risk of avoiding card to brush more at authenticate device/server unit.
Because NFC card reader and notebook computer (note book) are integrated application, day by day popularize, especially also reach its maturity with Trackpad integration technology.Another characteristic of the present invention is to integrate reading unit and Trackpad to carry out transfer of data, the algorithm of detection technique, handwriting identification and gesture identification is pointed in collocation simultaneously, can be in the situation that reading password/signature without main frame (or user side), in authenticate device/server unit, complete after the input/comparison of password/signature, then carry out transmission or the processing of account data.Because the present invention is not inputted/compared password/signature of holder by main frame (or user side), therefore can significantly reduce the risk that password is logged.
Short-distance wireless communication authenticate device of the present invention and method thereof are applicable to encrypted wireless communication card 210a and unencryption wireless communication card 210b.Encrypted wireless communication card 210a includes an encryption card data, and during this encryption card data encryption including but not limited to following two kinds of modes: the first cipher mode (being referred to as below to encrypt golden key method) is according to an encryption algorithm, utilizes an enciphered data to be encrypted an account data to form; The second cipher mode (being referred to as below to encrypt transformation approach) is the n part additive cipher table according to many parts of additive cipher tables, this enciphered data and this account data are encrypted and are formed, wherein, n value leaves the ad-hoc location (for example first hyte or last hyte) of this encryption card data in.Comparatively speaking, during above-mentioned encryption card data deciphering including but not limited to following two kinds of modes: the first manner of decryption (being referred to as below to decipher golden key method) is according to a deciphering algorithm (with respect to this encryption algorithm), utilize the data decryption that user inputs that above-mentioned encryption card data is decrypted or is decoded, to be reduced into this account data, and this account data are carried out to a data check or inspection, such as but not limited to cyclic redundancy check (CRC) (cyclic redundancy check, CRC), judge that whether the data decryption of this user input is correct.The second manner of decryption (being referred to as below to decipher transformation approach) is the n value of taking out according to the ad-hoc location of this encryption card data, from many parts of additive cipher tables, capture n part additive cipher table, above-mentioned encryption card data is decrypted, to be reduced into this enciphered data and this account data.Note that aforementioned various encipher-decipher method, is only one embodiment of the invention, but not restriction of the present invention.Wherein, above-mentioned enciphering/deciphering data can be one group of password or a picture group case (including but not limited to signature).
As for, unencryption wireless communication card 210b only includes an account data.Wherein, account data is including but not limited to card recognition code, holder's identity code, transaction data, trade date etc.
Fig. 1 is the configuration diagram of the short-distance wireless communication authenticate device of one embodiment of the invention.Please refer to Fig. 1, short-distance wireless communication authenticate device 100 of the present invention comprises a Trackpad control unit 110, a communication interface 120, a Trackpad (comprising a plurality of sensors) 130, one reading unit 140, a communication control unit 150, an identification unit 160 and a memory cell 170.
In one embodiment, reading unit 140 is to implement with NFC Anneta module.
The present invention integrates reading unit 140 and Trackpad 130, and to carry out, holder authenticates and account data transmission.During practical application, for dwindling single unit system area, reading unit 140 and Trackpad 130 are overlapped.In general, Trackpad 130 has a touch surface 251 and an assembling face 252, and touch surface 251 is available for users to carry out touch-control behavior thereon by finger or object, and assembling face 252 can be laid a bonding layer 220 accordingly.At reading unit 140 of the present invention and Trackpad 130, be under the situation overlapping, if wish, can allow wireless communication card 210a/210b be read unit 140 in the position of contiguous touch surface 251 (in radio area 140a) and to read, the radiation direction of reading unit 140 must be just the direction of touch surface 251 (towards) up.And the signal sending for reading unit 140 can radiate the space between Trackpad 130 cablings, and not conductively-closed ground plane 220 masks, between reading unit 140 and Trackpad 130, just can not lay bonding layer 220, certainly, non-overlapped part at reading unit 140 and Trackpad 130 still can be laid bonding layer 220, as shown in Figure 2 A and 2 B.In one embodiment, as shown in Figure 2 C, between reading unit 140 and Trackpad 130, still overlap, but the radiation direction of reading unit 140 is down (towards the outside of touch sensitive surface module or toward opposite directions of touch surface 251), in other words, the signal that reading unit 140 sends does not have the problem of conductively-closed ground plane 220 shieldings, so the assembling face of Trackpad 252 still can be laid a bonding layer 220.In another embodiment, non-overlapped setting between reading unit 140 and Trackpad 130 (figure does not show, is all located in touch surface 251 such as but not limited to the two), now, the assembling face of touch sensitive surface module 252 also can be laid a ground plane.Following embodiment and graphic in, be the reading unit 140 that overlaps and Trackpad 130 and aerial radiation direction be to explain for example towards the direction (as Fig. 2 B) of touch surface 251.
Get back to Fig. 1, when user side 180 need read wireless communication card 210a/210b, by communication interface 120, transmit one and start Card Reader instruction to Trackpad control unit 110 and communication control unit 150, to start relevant control function and card-reading function.Wherein, communication interface 120 can be utilized wired or wireless mode, transmits mutually data, information or order between authenticate device 100 and a user side 180.The wireline interface that communication interface 120 is supported is such as but not limited to interfaces such as USB and RS232, and the wave point that communication interface 120 is supported is such as but not limited to interfaces such as bluetooth (bluetooth) and Wireless Fidelities (Wi-Fi).In addition, user side 180 is including but not limited to main frame, personal computer (PC), notebook computer (NB), panel computer (Tablet), hand-held moving device and NFC card reader.
Trackpad 130, comprises a plurality of sensors (sensor), in order to sensing handwriting input to produce a sensing signal.Near an encrypted wireless communication card 210a is placed on a wireless-communication-capable area (the Huo Cheng antenna induction district) 140a (as shown in Figure 2 A) of touch surface 251 and while locating with approximately 0~10 centimeter of touch sensitive surface module vertical range, encryption card data in encrypted wireless communication card 210a can be sent to communication control unit 150 from reading unit 140, and is temporary in a memory cell 170.Communication control unit 150 is received after the card data of encryption, can send and successfully read card image to Trackpad control unit 110, Trackpad control unit 110 is again by communication interface 120, transmit an information that produces input data decryption (password or signature) interface to user side 180, the interface that makes user side 180 produce an input data decryption (password or signature), for example, make the screen 180a of user side 180 produce a window of inputting data decryption (password or signature), as shown in Figure 3, afterwards, authenticate device 100 and user side 180 just start to wait for that user sequentially inputs data decryption (password or pattern).
According to the present invention, if user need input one group of password, can input in the following manner by Trackpad 130: can utilize single only finger to carry out handwritten numeral, symbol or word in Trackpad 130 (140a is overlapping with wireless-communication-capable area), as shown in Figure 4 A; Or, can utilize list only point or give more directions and hit the dummy keyboard on Trackpad 130, as shown in Figure 4 B; Or, available one or many fingers the interior execution of Trackpad 130 sliding, rotation outward, on the gesture such as cunning, downslide, left cunning, right cunning or its combine, as shown in Fig. 4 C~Fig. 4 H.According to the password of user's input, Trackpad 130 produces a sensing signal, Trackpad control unit 110 is changed out one group of coordinate data by this sensing signal, Trackpad control unit 110 is sent to identification unit 160 by these coordinate datas afterwards, so that to analyze these coordinate datas be handwritten numeral or Freehandhand-drawing symbol or hand-written various countries word or singly refer to gesture or multi-finger gesture or single indication are hit dummy keyboard or give more directions and hit dummy keyboard, and by the corresponding code picking out, send communication control unit 150 to, by the temporary input password of communication control unit 150.One group of password that user inputs by Trackpad 130 can be the one of set of number, a group code, one group of word, one group of gesture and one group of virtual key.
On the other hand, if user by Trackpad 130 input one picture group cases, signature for example, Trackpad control unit 110 coordinate data of being directly correlated with sends communication control unit 150 to, and need not carry out identification by this identification unit 160.Therefore, because of this identification unit 160 inessential element, therefore illustrate with dotted line in Fig. 1.
After receiving password or signature, communication control unit 150 sends one and successfully inputs password/signing messages to Trackpad control unit 110, Trackpad control unit 110 is again by communication interface 120, transmit one and successfully input data decryption information to user side 180, make correspondence in the window of screen 180a demonstrate a symbol (such as but not limited to " * ").Note that this information non-password data, but a fixed data.Whenever user successfully inputs a password/signature, in the window of screen 180a, will correspondence demonstrate a symbol (such as but not limited to " * "), and can not show the true password that user inputs, in case password leaks or recorded by trojan horse program side.In the example of Fig. 3, user successfully inputs two password/signatures.In addition, please note, in Password Input process, because passing through user side 180 show candidate words, therefore one group of password only can be selected a kind of recognition mode, such as but not limited to DIGITAL IDENTIFICATION pattern, coded identification pattern, text-recognition pattern, dummy keyboard recognition mode, gesture recognition mode etc., to promote the success rate of identification.
In one embodiment, communication control unit 150 is received in card 210a and is encrypted after card data, according to aforementioned deciphering transformation approach, according to n value, this particular conversion password table n of the many parts of additive cipher tables that the firmware of taking-up communication control unit 150 prestores, to this encryption card data deciphering to be reduced to an enciphered data and an account data, then wait for that user inputs a data decryption, and compare two enciphering/deciphering data and whether conform to, if conforming to, two enciphering/deciphering data just can by communication interface 120 and user side 180, send account data to server unit 190; If two enciphering/deciphering data are not inconsistent, with regard to blocked account's data.
In another embodiment, communication control unit 150 is received in card 210a and is encrypted after card data, just waits for that user inputs a data decryption.After receiving the data decryption that user inputs, according to the golden key method of aforementioned deciphering, communication control unit 150 is encrypted card data deciphering with reduction account data according to a deciphering algorithm to this, and the account data being reduced is carried out to data verification or inspection, such as but not limited to CRC, verify, to obtain a result value, last, according to this result value, whether equal a preset value and judge that whether the data decryption of this user's input is correct.If the data decryption of user's input correctly just can send account data to server unit 190 by communication interface 120 and user side 180; If incorrect, with regard to blocked account's data.
For simplifying narration, following Fig. 5 A~Fig. 5 D, Fig. 6, Fig. 7 and Fig. 8 A~Fig. 8 B take enciphering/deciphering transformation approach to describe as example, yet, this is only one embodiment of the invention, but not restriction of the present invention, during practical application, is also suitable for other enciphering/deciphering mode.
Fig. 5 A~Fig. 5 D is the different pieces of information flow diagram between wireless communication card of the present invention, authenticate device and server unit.Fig. 6 is the flow chart of the short-distance wireless communication authentication method of first embodiment of the invention.Below, please refer to Fig. 1, Fig. 3, Fig. 4 A~Fig. 4 H, Fig. 5 A and Fig. 6, the institute of the present embodiment is described in steps.
Step S602: read the encrypted wireless communication card 210a that is positioned at radio area 140a.If complete, read, jump to step S604; Otherwise, repeat this step.In the present embodiment, be to utilize reading unit 140 to read the encryption card data in encrypted wireless communication card 210a.
Step S604: by the encryption card data deciphering of encrypted wireless communication card 210a and be temporary in authenticate device 100.In the present embodiment, communication control unit 150 is temporary in memory cell 170 after this encryption card data deciphering is an enciphered data and an account data.
Step S606: the window that produces an input data decryption.When communication control unit 150, receive and encrypt after card data, can send and successfully read card image to Trackpad control unit 110, Trackpad control unit 110 is again by communication interface 120, transmit one and produce input data decryption interface to user side 180, make the screen 180a of user side 180 produce a window of inputting data decryption (signature/password), as shown in Figure 3.
Step S608: by Trackpad 130 input one data decryptions (password/pattern).If user is that this group password can be the one for set of number, a group code, one group of word, one group of gesture and one group of virtual key by one group of password of Trackpad 130 inputs.
Step S610: judge whether data decryption is inputted complete.If so, jump to step S612; If not, get back to step S608.
Step S612: judge encrypted wireless communication card 210a whether still position in the 140a of radio area.If so, jump to step S614; Otherwise, come back to step S602.
Step S614: judge whether two enciphering/deciphering data conform to.If conform to, jump to step S616; Otherwise, jump to step S618.
Step S616: send account data to user side 180, then pass to server unit 190 by world-wide web, complete authentication method of the present invention.
Step S618: blocked account's data, do not allow the outer user side 180 that reaches, and finish to carry out authentication method of the present invention.
Fig. 7 is the flow chart of the short-distance wireless communication authentication method of second embodiment of the invention.Note that in a second embodiment, step S602, S606~S612 are identical with the step of the first embodiment, therefore not in repeating, below, please also refer to data flow and Fig. 7 of Fig. 5 B, only description of step S603, S630~S636.In addition, note that the application of the second embodiment is not limited to authenticate device 100, also applicable to separately or independently Trackpad and card reader.
Step S603: the encryption card data of encrypted wireless communication card 210a is temporary in authenticate device 100.In the present embodiment, communication control unit 150 is temporary in memory cell 170 by this encryption card data.
Step S630: this input data decryption and this encryption card data are sent to server unit 190.In one embodiment, this input data decryption and this encryption card data are by authenticate device 100, to be sent to a memory cell (not shown) of this server unit 190, and then this server unit 190 is an enciphered data and an account data by this encryption card data deciphering again.
Step S632: whether server unit 190 these input data decryptions of comparison and this enciphered data conform to.If conform to, jump to step S634; Otherwise, jump to step S636.。
Step S634: server unit 190 reads this account data, to carry out subsequent treatment.
Step S636: server unit 190 blocks this account data, does not allow subsequent treatment.
Fig. 8 A is the flow chart of the short-distance wireless communication authentication method of third embodiment of the invention.Below, please refer to Fig. 1, Fig. 3, Fig. 5 C and Fig. 8 A, the institute of the present embodiment is described in steps.
Step S802: read the unencryption wireless communication card 210b that is positioned at radio area 140a.If complete, read, jump to step S804; If not, repeat this step.In the present embodiment, be to utilize reading unit 140 to read the account data in unencryption wireless communication card 210b.
Step S804: the account data of unencryption wireless communication card 210b is temporary in authenticate device 100.In the present embodiment, communication control unit 150 is temporary in memory cell 170 by this account data.
Step S806: the window that produces an input data decryption.When communication control unit 150 is received after account data, can send and successfully read card image to Trackpad control unit 110, Trackpad control unit 110 is again by communication interface 120, transmit one and produce input data decryption window to user side 180, make the screen 180a of user side 180 produce a window of inputting signature or password, as shown in Figure 3.
Step S808: input a data decryption by Trackpad.Definite, if user is by Trackpad 130 input one picture group cases (as signature), Trackpad control unit 110 coordinate data of being directly correlated with directly sends communication control unit 150 to, and does not need through this identification unit 160; If user is by one group of password of Trackpad 130 inputs, Trackpad control unit 110 coordinate data of being first correlated with sends this identification unit 160 to, for this identification unit 160, carry out identification, this identification unit 160 by the corresponding code picking out, sends communication control unit 150 to again.
Step S810: judge whether data decryption is inputted complete.If so, jump to step S812; If not, get back to step S808.
Step S812: judge whether unencryption wireless communication card 210b is still placed in the 140a of radio area.If so, jump to step S814; If not, come back to step S802.
Step S814 a: identification code of this input data decryption and this account data is sent to this server unit 190.Wherein, this identification code is such as but not limited to card recognition code or holder's identity code.In one embodiment, this input data decryption and this identification code are by authenticate device 100, to be sent to a memory cell (not shown) of this server unit 190.
Step S816: server unit 190 is according to this identification code, the database of search own to be to obtain an enciphered data, then compares this input data decryption and this enciphered data, to produce a comparative result information.
Step S818: this comparative result information is returned to authenticate device 100 by server unit 190.In one embodiment, this comparative result information is returned to the communication control unit 150 of authenticate device 100 by server unit 190.
Step S820: this comparative result information represents whether two enciphering/deciphering data conform to.If conform to, jump to step S822; Otherwise, jump to step S824.
Step S822: send account data to user side 180 by authenticate device 100, then pass to server unit 190 by world-wide web, and complete authentication method of the present invention.In one embodiment, this account data send server unit 190 to by communication control unit 150.
Step S824: authenticate device 100 blocks this account data, does not allow the outer user side 180 that reaches, and finishes to carry out authentication method of the present invention.
Fig. 8 A~8B is the flow chart of the short-distance wireless communication authentication method of fourth embodiment of the invention.The flow chart of the short-distance wireless communication authentication method of fourth embodiment of the invention comprises step S802~S812 and S830~S838.Note that, in the 4th embodiment, step S802~S812 is identical with the step of the 3rd embodiment, therefore not in repeating, below, please also refer to data flow and Fig. 8 A~Fig. 8 B, only the description of step S830~S838 of Fig. 5 D.
Step S830: this account data and the encryption of this input data decryption are become to an encryption card data.In one embodiment, utilize communication control unit 150 according to a particular conversion password table n, this account data and the conversion of this input data decryption are encrypted to an encryption card data, wherein, n value leaves the ad-hoc location of this encryption card data in.
Step S832: this encryption card data is sent to a server unit 190 by authenticate device 100.In one embodiment, this encryption card data is by authenticate device 100, to be sent to a memory cell (not shown) of this server unit 190.
Step S834: judge with server unit 190 whether this input data decryption and this enciphered data conform to.In one embodiment, the n value that the ad-hoc location that server unit 190 is encrypted card data according to this takes out, from many parts of additive cipher tables, capture n part additive cipher table, above-mentioned encryption card data is decrypted, to reduce after this input data decryption and this account data, again according to the identification code of this account data, the database of search own to be to obtain an enciphered data, then compares this input data decryption and this enciphered data.If this input data decryption and this enciphered data conform to, jump to step S836; Otherwise, jump to step S838.
Step S836: read this account data with server unit 190, to carry out subsequent treatment.
Step S838: block this account data with server unit 190, do not allow subsequent treatment.
Note that according to different application or demand, the Trackpad control unit 110 in Fig. 1, communication control unit 150 and identification unit 160 at least it two can be located at same integrated circuit (IC) or three is located at respectively different IC.
Above are only preferred embodiment of the present invention, and not in order to limit claim of the present invention; All other do not depart from the equivalence completing under disclosed spirit and change or modify, and all should be included in claim protection range.

Claims (19)

1. a short-distance wireless communication authentication method, is characterized in that, described method comprises following steps:
Read a wireless communication card, to obtain a card data, wherein said card data comprises an account data;
Temporary described card data;
Via a Trackpad, input a data decryption, and more described data decryption and an enciphered data; And
When described data decryption and described enciphered data conform to, described account data is sent to a server unit.
2. method according to claim 1, is characterized in that, described enciphered data is comprised in described card data, and described card data is temporary in a memory cell.
3. method according to claim 2, is characterized in that, compares the step of described data decryption and described enciphered data via a communication control unit.
4. method according to claim 1, is characterized in that, described enciphered data is stored in described server unit, and described card data is temporary in a memory cell.
5. method according to claim 4, is characterized in that, compares the step of described data decryption and described enciphered data via described server unit.
6. method according to claim 1, is characterized in that, after reading described wireless communication card step, described method more comprises:
Transmit the first information to user side, make described user side show an inputting interface.
7. method according to claim 6, is characterized in that, inputs in the step of described data decryption via described Trackpad, and described method more comprises:
Described Trackpad is sent to described user side by one second information, makes the inputting interface of described user side show a corresponding symbol.
8. method according to claim 7, is characterized in that, when inputting described data decryption via described Trackpad, further comprises:
When reading object on described Trackpad time, described Trackpad produces a sensing signal;
Convert described sensing signal to relevant coordinate data; And
One identification unit carries out handwriting identification according to described relevant coordinate data, to produce accordingly described data decryption.
9. method according to claim 1, is characterized in that, described data decryption is the one of set of number, a group code, one group of word, a group of gesture, a picture group case and one group of virtual key.
10. a short-distance wireless communication authentication method, is characterized in that, described method comprises following steps:
Read a wireless communication card, to obtain a card data, wherein said card data comprises an enciphered data and an account data;
Temporary described card data is in a server unit;
Input a data decryption, the more described data decryption of described server unit and an enciphered data; And
When described data decryption and described enciphered data conform to, allow described server unit to read described account data.
11. methods according to claim 10, is characterized in that, described data decryption is the one of set of number, a group code, one group of word, a group of gesture, a picture group case and one group of virtual key.
12. 1 kinds of short-distance wireless communication authenticate devices, is characterized in that, described device comprises:
One Trackpad, for handwriting input the corresponding sensing signal that produces;
One Trackpad control unit, couples described Trackpad;
One reading unit, is arranged at a surface of described Trackpad, in order to read a wireless communication card; And
One communication control unit, couples described reading unit and described Trackpad control unit;
Wherein, when described reading unit reads described wireless communication card, one enciphered data of more described wireless communication card and a user are via a data decryption of described Trackpad input, when if described data decryption and described enciphered data conform to, allow to transmit an account data of described wireless communication card.
13. devices according to claim 12, is characterized in that, the more described data decryption of described communication control unit and described enciphered data.
14. devices according to claim 12, is characterized in that, described device more comprises:
One communication interface, couples described communication control unit, described Trackpad control unit and a user side.
15. devices according to claim 14, it is characterized in that, when described user inputs described data decryption via described Trackpad, described Trackpad control unit transmits an information to described user side, makes the inputting interface of described user side show a corresponding symbol.
16. devices according to claim 12, is characterized in that, described device more comprises:
One identification unit, is coupled between described Trackpad control unit and described communication control unit, in order to carry out handwriting identification according to relevant coordinate data, to produce accordingly described data decryption.
17. devices according to claim 12, is characterized in that, described data decryption is the one of set of number, a group code, one group of word, a group of gesture, a picture group case and one group of virtual key.
18. devices according to claim 12, is characterized in that, described reading unit is an Anneta module.
19. devices according to claim 18, is characterized in that, the relative two side faces of described Trackpad is respectively a touch surface and an assembling face, and described reading unit is directly attached at the assembling face of described Trackpad.
CN201310216831.8A 2013-04-26 2013-06-03 Short-distance wireless communication authentication device and method Pending CN104125065A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
TW102115114A TWI527393B (en) 2013-04-26 2013-04-26 Authentication device of short-range wireless communication and method thereof
TW102115114 2013-04-26

Publications (1)

Publication Number Publication Date
CN104125065A true CN104125065A (en) 2014-10-29

Family

ID=51770338

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310216831.8A Pending CN104125065A (en) 2013-04-26 2013-06-03 Short-distance wireless communication authentication device and method

Country Status (2)

Country Link
CN (1) CN104125065A (en)
TW (1) TWI527393B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107615705A (en) * 2015-03-25 2018-01-19 科智库公司 In the dynamic assets certification based in neighbouring network of communication equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1403942A (en) * 2001-09-03 2003-03-19 王柏东 Biological specificity confirming equipment based on network
CN101373507A (en) * 2007-08-24 2009-02-25 英业达股份有限公司 Data management method and data management system using the same
CN101667060A (en) * 2008-09-04 2010-03-10 黄轶 Input equipment and input method
CN102143482A (en) * 2011-04-13 2011-08-03 中国工商银行股份有限公司 Method and system for authenticating mobile banking client information, and mobile terminal
US20120151575A1 (en) * 2010-12-13 2012-06-14 Samsung Electronics Co., Ltd. Apparatus and method for certificating security in portable terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1403942A (en) * 2001-09-03 2003-03-19 王柏东 Biological specificity confirming equipment based on network
CN101373507A (en) * 2007-08-24 2009-02-25 英业达股份有限公司 Data management method and data management system using the same
CN101667060A (en) * 2008-09-04 2010-03-10 黄轶 Input equipment and input method
US20120151575A1 (en) * 2010-12-13 2012-06-14 Samsung Electronics Co., Ltd. Apparatus and method for certificating security in portable terminal
CN102143482A (en) * 2011-04-13 2011-08-03 中国工商银行股份有限公司 Method and system for authenticating mobile banking client information, and mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107615705A (en) * 2015-03-25 2018-01-19 科智库公司 In the dynamic assets certification based in neighbouring network of communication equipment
CN107615705B (en) * 2015-03-25 2021-04-13 科智库普若西米特公司 Method, server and communication device for asset authentication in a dynamic proximity-based network

Also Published As

Publication number Publication date
TWI527393B (en) 2016-03-21
TW201442450A (en) 2014-11-01

Similar Documents

Publication Publication Date Title
US11580208B2 (en) System and method for PIN entry on mobile devices
US10592653B2 (en) Encoding methods and systems
US20150100498A1 (en) Secure passcode entry user interface
US9940503B2 (en) Authentication device including template validation and related methods
KR101010977B1 (en) Electronic liquidation server and method for user authentication
CN103678976A (en) Method for authenticating identity through handwriting input device and handwriting input device
EP2713328B1 (en) Validating a transaction with a secure input without requiring pin code entry
GB2543323A (en) Secure biometric authentication
EP3593269B1 (en) Methods for enrolling a user and for authentication of a user of an electronic device
CN104125065A (en) Short-distance wireless communication authentication device and method
US20180239884A1 (en) Detection System, Fingerprint Sensor, and Method of Finger Touch Authentication Thereof
KR20130117371A (en) Method to unlock screen and perform secret task by finger tapping for touch screen devices
CA3151591A1 (en) Secure authentication based on passport data stored in a contactless card
TW201324373A (en) Fingerprint inputting direction control system and the control method thereof
Tolosana et al. BioTouchPass Demo: Handwritten Passwords for Touchscreen Biometrics
US20170270380A1 (en) Fingerprint enrollment in smart device
TW202320510A (en) Biosignature verification system and biosignature verification method to greatly improve the accuracy and security of identity verification during transactions
JP5705167B2 (en) INPUT INFORMATION AUTHENTICATION DEVICE, SERVER DEVICE, INPUT INFORMATION AUTHENTICATION SYSTEM, AND DEVICE PROGRAM
CN103914648A (en) Method and device for adding fingerprint recognition to Android system
WO2013074096A1 (en) Authentication device including template validation and related methods
TW201738791A (en) Information processing system and method for allowing a user to use a touch screen of an electronic device to input authentication data, which is at least one of point data, line data and surface data, in a touch manner
WO2012076939A1 (en) Method, apparatus, and computer program product for implementing graphical authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141029

WD01 Invention patent application deemed withdrawn after publication