CN108460299A - A kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic - Google Patents

A kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic Download PDF

Info

Publication number
CN108460299A
CN108460299A CN201710089942.5A CN201710089942A CN108460299A CN 108460299 A CN108460299 A CN 108460299A CN 201710089942 A CN201710089942 A CN 201710089942A CN 108460299 A CN108460299 A CN 108460299A
Authority
CN
China
Prior art keywords
keyboard
code
server
ciphertext
source document
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710089942.5A
Other languages
Chinese (zh)
Inventor
霍建军
吴震球
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Lsyw Polytron Technologies Inc
Original Assignee
Jiangsu Lsyw Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Lsyw Polytron Technologies Inc filed Critical Jiangsu Lsyw Polytron Technologies Inc
Priority to CN201710089942.5A priority Critical patent/CN108460299A/en
Publication of CN108460299A publication Critical patent/CN108460299A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to security technology areas, especially a kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic, encrypting keyboard system includes keyboard, encryption equipment, client and server-side, keyboard is for inputting keypad code, encryption equipment is for encrypting, client is used for login user system, and server-side is for decrypting and determining whether user can login custom system.The encryption equipment of the present invention is encrypted to obtain ciphertext based on asymmetric arithmetic to source document code, ciphertext is sent to server-side by encryption equipment, server-side decrypts and determines whether user can login custom system, the encryption equipment is a kind of general independent used encryption device, the input terminal of encryption equipment is connected by USB port or PS/2 mouthfuls with keyboard, the output end of encryption equipment and the client computer of client connect, common keyboard existing in this way can realize encrypting keyboard after being connect with client computer by encryption equipment, versatile.

Description

A kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic
Technical field
The present invention relates to security technology area more particularly to a kind of encrypting keyboard system and keyboard encrypting methods.
Background technology
With the high speed development of electronic information technology, uses a network for merchandising or transmission file is more and more universal, in order to The safety for ensureing password in process of exchange, needs that password is encrypted, prevents password from being intercepted and captured by trojan horse program.
In the prior art, user realizes client and user terminal usually using keyboard as instruction and data input unit Between application program response instruction operation, client is corresponding with server-side, and client provides local service journey to the user Sequence is typically mounted in common client computer, needs to work in coordination operation with server-side, and server-side provides service for client, And user related information is stored, such as user account password etc., user when client login application program by needing by close Code authentication, and user when keyboard input password by trojan horse program by can be recorded if client is encroached on by trojan horse Come, threatens to account safety, thus it has been proposed that a kind of Encryption Keyboard, such as " CN201220386190.1 " number, Referred to as the utility model patent of " Encryption Keyboard and the self-service device using the keyboard ", the Encryption Keyboard are close including being stored with first The memory module of key;The detecting module whether detecting Encryption Keyboard is destroyed;Be connected to memory module and detecting module, detecing Survey the first protection circuit that module detects the first key deleted when Encryption Keyboard is destroyed in memory module.Although above-mentioned add Close keyboard can realize cryptoguard, but its manufacturing cost is high, poor universality, what computer itself must be equipped with by when use Common keyboard replaces with this kind of Encryption Keyboard, and encryption efficiency is not high.
Invention content
The purpose of the present invention is overcoming the defect of Encryption Keyboard poor universality in the prior art, a kind of manufacturing cost is provided Low and versatile encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic.
The technical solution adopted by the present invention to solve the technical problems is:
The present invention the encrypting keyboard system based on asymmetric arithmetic include:
Keyboard, for inputting keypad code;
Encryption equipment, for encrypting, the encryption equipment is based on Encryption Algorithm and source document code is encrypted to obtain ciphertext, described to add The ciphertext is sent to server-side by close device;
Client is used for login user system;
Server-side, for decrypting, the server-side receives ciphertext and acquisition key is decrypted to ciphertext according to decipherment algorithm The source document code of disk input, it is described when the source document code that the source document code that the server-side is decrypted is stored with server-side matches Server authentication success, allows user's login user system.
The input terminal of encryption equipment of the present invention is connected by USB port or PS/2 mouthfuls with the keyboard, the encryption equipment Output end is connected with the client, and the client is in communication with each other with the server-side by cable network or wireless network.
Keypad code and ciphertext are transferred to the client by encryption equipment of the present invention simultaneously, and the client sends out ciphertext Give the server-side.
The present invention also provides a kind of keyboard encrypting methods based on asymmetric arithmetic, using above-mentioned based on asymmetric arithmetic Encrypting keyboard system, include the following steps:
S01 write-in program algorithms:Server-side first generates public key (e, N) and private key (d, N) at random, and by public key (e, N) Corresponding encipheror is sent to encryption equipment, while the corresponding decryption program of private key (d, N) is retained in server-side;
S02 is encrypted:Encryption equipment opens data receiver function and receives the single keypad code of keyboard input, to the single keyboard Code is handled, i.e., the source document code being combined into continuing addition machine code, clock code, random code on single keypad code, encryption equipment Ciphertext is obtained to source document code encryption according to encipheror, ciphertext is sent to server-side by encryption equipment;
S03 is decrypted:The server-side receives ciphertext and is decrypted to obtain source document code according to decryption program, and the server-side judges Whether the source document code of decryption gained matches with the source document code that server-side stores, and user is allowed to login the use of client if matching Family system.
The determination method of public key (e, N) of the present invention and private key (d, N) is N=p1*p2.....pn, n >=3,1≤i ≠ J≤n, piIt is prime number, e*d=1mod ((p1-1)*(p2-1)*......(pn-1))。
In encipheror of the present invention, the source document code is encrypted using the public key (e, N) and following formula, Obtain the ciphertext:AeModN=B, wherein A indicates that the source document code, B indicate the ciphertext.
In decryption program of the present invention, the ciphertext is decrypted using private key (d, N) and following formula, obtains institute State source document code:BdModN=A, wherein A indicates that the source document code, B indicate the ciphertext.
The advantageous effect of the encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic of the present invention is:
1. the encryption equipment of the present invention is encrypted source document code to obtain ciphertext based on asymmetric arithmetic, encryption equipment sends out ciphertext Server-side is given, by server-side decrypted authentication, which is a kind of general independent used encryption device, encryption equipment Input terminal be connected with keyboard by USB port or PS/2 mouthfuls, the client computer of the output end of encryption equipment and client connects, and shows in this way Encrypting keyboard can be realized after having common keyboard to be connect with client computer by encryption equipment, without installation safety control in a client Part is reequiped without to keyboard itself, therefore versatile;
2. the encryption equipment of the present invention can also be embedded in keyboard and use, the Encryption Keyboard of integral structure formula is formed with keyboard;
3. source document code and ciphertext can be transferred to client by the encryption equipment of the present invention simultaneously, can be as common keyboard It uses;
4. the encryption equipment of the present invention is according to encrypted instruction, ciphertext is obtained using public key (e, N) encryption source document code, and to service End send ciphertext, after server-side receives ciphertext, according to decryption instructions using private key (d, N) decrypt ciphertext, wherein parameter N by At least three prime numbers are multiplied to obtain, N=p1*p2.....pn, n >=3, the relationship between parameter e and parameter d meets e*d=1mod ((p1-1)*(p2-1)*......(pn- 1)), pass through the smaller p of several numerical valueiMultiplication can obtain a larger ginseng Number N, ensures encrypted safety, reduces the time for the N that gets parms before encrypting, improves encrypted efficiency.
Description of the drawings
The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.
Fig. 1 is the functional block diagram of the encrypting keyboard system based on asymmetric arithmetic of the present invention;
Fig. 2 is the keyboard encrypting method flow chart of the present invention.
Wherein:Keyboard 101, encryption equipment 102, client 103 and server-side 104.
Specific implementation mode
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects being described in detail in claims, of the invention.
As shown in Figure 1, the encrypting keyboard system based on asymmetric arithmetic of the present embodiment includes keyboard 101, encryption equipment 102, client 103 and server-side 104, wherein keyboard 101 includes but not limited to mechanical keys for inputting keypad code, keyboard 101 Disk, Plastic Diaphragm Type Servomotor keyboard, conductive rubber formula keyboard and contactless electrostatic capacitance keyboard, encryption equipment 102 obtain single keypad code After can continue on the basis of keypad code add machine code, clock code, random code generate source document code.
For encrypting, encryption equipment 102 adds source document code based on rivest, shamir, adelman the encryption equipment 102 of the present embodiment Close to obtain ciphertext, ciphertext is sent to server-side 104 by encryption equipment 102, which is a kind of general independent used The input terminal of encryption device, encryption equipment 102 is connected by USB port or PS/2 mouthfuls with keyboard 101, the output end of encryption equipment 102 with The client computer of client 103 connects, and client 103 can be in communication with each other with server-side 104 by cable network or wireless network, Common keyboard 101 existing in this way can realize that keyboard 101 is encrypted after being connect with client computer by encryption equipment 102, without in visitor Safe control is installed in the machine of family, is reequiped in itself without to keyboard 101, therefore versatile.
It is used it should be noted that the encryption equipment 102 of the present embodiment can also be embedded in keyboard 101, with the formation of keyboard 101 The Encryption Keyboard of integral structure formula, that is to say, that the keyboard for being embedded with the encryption equipment 102 of the present embodiment is also contained in the present invention's In protection domain.
Keypad code and ciphertext can be transferred to client 103 by the encryption equipment 102 of the present embodiment simultaneously, installation encryption in this way After device 102, keyboard 101 can still act as common keyboard use, and specifically, keyboard 101 sends keypad code to encryption equipment 102, Keypad code directly can be sent to 103 real-time display of client, while 102 interim storage keypad code of encryption equipment by encryption equipment 102 And machine code is added, clock code and random code generate source document code, are then encrypted to obtain ciphertext, client 103 can will be close It is given to server-side 104 in text, after the encryption equipment 102 of this sample embodiment is connected on keyboard 101, keyboard 101 can be as general Logical keyboard equally uses.
The client 103 of the present embodiment is used for login user system, and client 103 is in common client computer using i.e. Can, client 103 needs cipher authentication before login user system, and cipher authentication is not executed by client 103, but by Long-range server-side 104 is judged, accordingly even when trojan horse program intercepts and captures source document code also directly can not enter use by client 103 Family system.
Server-side 104 can store user information after user succeeds in registration in custom system, such as account, password, a The server-side 104 of people's authentication information etc., the present embodiment is used for decrypted authentication, and server-side 104 receives ciphertext and according to decipherment algorithm Ciphertext is decrypted and obtains source document code, when server-side 104 decrypts the source document code phase that obtained source document code is stored with server-side 104 When matching, 104 certification of server-side success allows user's login user system, and otherwise server-side 104 sends prompt message to client End 103, prompt cipher mistake.
Ciphertext can be sent to server-side 104 by the encryption equipment 102 in the present embodiment by client 103, can also be led to It crosses wireless mode and ciphertext is directly sent to server-side 104, the embodiment of wireless transmission ciphertext, encryption equipment 102 is given below Including shell and the integrated circuit board that is built in shell, encryption chip, wireless module and outer are integrated on integrated circuit board Circuit is enclosed, wireless module can be WIFI module, 3G module or 4G modules, and WIFI module can be that news raise WM200 WIFI moulds Block, ESP-12E serial ports WIFI module or ESP8266 serial ports WIFI modules, 3G module can be SL808X series 3G module, Q26 Serial sierra 3G modules or APTGT75TL60T 3G modules, 4G modules can be UI8300W 4G modules or L570 (TDD) Encipheror is written in 4G modules, encryption chip, which is the encipheror based on asymmetric arithmetic, on integrated circuit board Equipped with multiple interfaces, to realize that the connection with keyboard or other equipment, the concrete type of interface are not construed as limiting, such encryption equipment 102 can pass through wireless module and 104 direct communication of server-side, that is to say, that the encryption equipment 102 for being embedded with wireless module also wraps Containing within the scope of the present invention.
As shown in Figs. 1-2, the application method of the above-mentioned encrypting keyboard system based on asymmetric arithmetic includes the following steps:
S01 write-in program algorithms:Server-side 104 first generates public key (e, N) and private key (d, N) at random, and by public key (e, N) corresponding encipheror is sent to encryption equipment 102, while the corresponding decryption program of private key (d, N) is retained in server-side 104, public The determination method of key (e, N) and private key (d, N) is N=p1*p2.....pn, n >=3, piIt is prime number, N is at least three prime number Product, e*d=1mod ((p1-1)*(p2-1)*......(pn-1))。
S02 is encrypted:Encryption equipment 102 opens data receiver function and receives the single keypad code of the input of keyboard 101, to the list A keypad code is handled, i.e., is combined into source document code to continuing addition machine code, clock code, random code on single keypad code, adds Close device 102 obtains ciphertext according to encipheror to source document code encryption, and ciphertext is sent to server-side 104 by encryption equipment 102, encrypts journey In sequence, source document code is encrypted using public key (e, N) and following formula, obtains ciphertext:AeModN=B, wherein A indicates source Literary code, B indicate ciphertext.
S03 decrypted authentications:Server-side 104 receives ciphertext and is decrypted to obtain source document code according to decryption program, and server-side 104 is sentenced Whether the source document code of disconnected decryption gained matches with the source document code that server-side 104 stores, and allows user to login client if matching The custom system at end 103 in decryption program, is decrypted ciphertext using private key (d, N) and following formula, obtains source document code: BdModN=A, wherein A indicate source document code, B indicate ciphertext, wherein server-side 104 decrypt detailed process be:Service termination Ciphertext is received, then decrypts to obtain keypad code, machine code, clock code and random code in source document code according to private key decryption program, and Field in the source document code is analyzed, clock code is compared with the clock code in the source document code received before, from And judge whether the source document code received is the source document code sent in real time, the encryption to the machine code and server-side storage that receive The machine code of device is compared, if the clock code and machine code in source document code all meet the requirements, by server-side decryption gained The keypad code (password of typing when namely registering) that keypad code is stored with server-side is compared and judges whether to match, if Match the custom system for then allowing user to login client;If any one of clock code or machine code in source document code are not met It is required that then server-side sends out alarm signal.
In the specific implementation, since user is not aware that how parameter N obtains, only know the numerical value of parameter N, if Want decryption ciphertext, then needs to carry out factorization to parameter N, can just obtain the private key (d, N) used when decryption, and to parameter N progress factorization is relatively difficult, therefore ensure that the safety of ciphertext.
In addition, the secrecy timeliness due to ciphertext is time-consuming related with parameter N to decryption, parameter N is bigger, secrecy timeliness and decryption Time is longer, in order to reinforce the safety of ciphertext, it will usually select the parameter N that numerical value is larger;When parameter N is two prime number a1With a2Product when, to ensure parameter N it is very big, then need a1And a2Also very big, but the more difficult acquisition of the prodigious prime number of numerical value, It needs to expend the more time when selection parameter before encryption, encrypted efficiency is affected;Parameter N in the present embodiment is The product of at least three prime numbers, even if piNumerical value it is smaller, to enable parameter N numerical value need it is very big, it is only necessary to utilize several pi Multiplication need not expend the more time when selection parameter before encryption, be conducive to improve encryption efficiency.
The encryption equipment 102 of the present embodiment is handled to obtain source document code and then be encrypted using public key (e, N) to keypad code Server-side 104 is sent to after to ciphertext, server-side 104 decrypts ciphertext using private key (d, N) and obtains source document code, analyzing processing machine It can get keypad code after code, clock code and random code, the safety that keypad code transmits ensure that in transmission process.In addition, by In the user with bad motivation, such as hacker, it is not known that public key (e, N), even if having forged a string of characters to server-side 104, Server-side 104 is decrypted using private key (d, N) also cannot get correct matched keypad code, therefore the mesh of authentication may be implemented 's.Even if trojan horse program intercepts and captures the keypad code that keyboard 101 inputs and is unable to get correct ciphertext since public key (e, N) is unknown, It still can not can not login custom system by the certification of server-side 104, substantially increase safety.
The encryption equipment 102 of the present embodiment adds machine code, clock code, random code, main purpose on the basis of keypad code It is to increase the difficulty cracked and make data and time and machine ID binding, there is uniqueness, refer to further according to encryption It enables, after server-side 104 receives ciphertext, can also carry out Time-Series analysis to clock code in the source document code obtained after decryption, ensure to connect The real-time and uniqueness of the data of receipts, the form that can not be sent by duplicate packet are obscured, each source document code The clock code obtained after decryption only meet the requirements in the case of just can further by server-side 104 to client 103 into Row data feedback.
It should be appreciated that specific embodiment described above is only used for explaining the present invention, it is not intended to limit the present invention.By The obvious changes or variations that the spirit of the present invention is extended out are still in the protection scope of this invention.

Claims (7)

1. a kind of encrypting keyboard system based on asymmetric arithmetic, it is characterised in that:Including:
Keyboard (101), for inputting keypad code;
Encryption equipment (102), for encrypting, keypad code is generated source document code and is calculated based on asymmetric encryption by the encryption equipment (102) Method is encrypted source document code to obtain ciphertext, and the ciphertext is sent to server-side (104) by the encryption equipment (102);
Client (103) is used for login user system;
Server-side (104), is used for decrypted authentication, and the server-side (104) receives ciphertext and carried out to ciphertext according to decipherment algorithm Decryption obtains source document code, when the source document code phase that the source document code that the server-side (104) decryption obtains is stored with server-side (104) Timing, server-side (104) the certification success, allows user to login custom system.
2. the encrypting keyboard system according to claim 1 based on asymmetric arithmetic, it is characterised in that:The encryption equipment (102) input terminal is connected by USB port or PS/2 mouthfuls with the keyboard (101), the output end of the encryption equipment (102) and institute It states client (103) to be connected, the client (103) and the server-side (104) are mutual by cable network or wireless network Communication.
3. the encrypting keyboard system according to claim 1 based on asymmetric arithmetic, it is characterised in that:The encryption equipment (102) while by keypad code and ciphertext it is transferred to the client (103), ciphertext is sent to described by the client (103) Server-side (104).
4. a kind of keyboard encrypting method, special using the encrypting keyboard system as described in claim 1 based on asymmetric arithmetic Sign is:Include the following steps:
S01 write-in program algorithms:Server-side (104) first generates public key (e, N) and private key (d, N) at random, and by public key (e, N) Corresponding encipheror is sent to encryption equipment (102), while the corresponding decryption program of private key (d, N) is retained in server-side (104);
S02 is encrypted:The open data receiver function of encryption equipment (102) and the single keypad code for receiving keyboard (101) input, to the list A keypad code is handled to obtain source document code, i.e., continues addition machine code, clock code, random code on single keypad code and be combined into Source document code, encryption equipment (102) obtain ciphertext according to encipheror to source document code encryption, and ciphertext is sent to clothes by encryption equipment (102) It is engaged in end (104);
S03 decrypted authentications:The server-side (104) receives ciphertext and is decrypted to obtain source document code, the service according to decryption program End (104) judges whether the source document code of decryption gained matches with the source document code that server-side (104) stores, and allows to use if matching The custom system of client (103) is logined at family.
5. keyboard encrypting method according to claim 4, it is characterised in that:The public key (e, N) and private key (d, N) are really The method of determining is N=p1*p2.....pn, n >=3, piIt is prime number, e*d=1mod ((p1-1)*(p2-1)*......(pn-1))。
6. keyboard encrypting method according to claim 4, it is characterised in that:In the encipheror, the public key is utilized The source document code is encrypted in (e, N) and following formula, obtains the ciphertext:AeMod N=B, wherein A indicates the source Literary code, B indicate the ciphertext.
7. keyboard encrypting method according to claim 4, it is characterised in that:In the decryption program, utilize private key (d, N) The ciphertext is decrypted with following formula, obtains the source document code:BdMod N=A, wherein A indicates the source document code, B indicates the ciphertext.
CN201710089942.5A 2017-02-20 2017-02-20 A kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic Pending CN108460299A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710089942.5A CN108460299A (en) 2017-02-20 2017-02-20 A kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710089942.5A CN108460299A (en) 2017-02-20 2017-02-20 A kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic

Publications (1)

Publication Number Publication Date
CN108460299A true CN108460299A (en) 2018-08-28

Family

ID=63221949

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710089942.5A Pending CN108460299A (en) 2017-02-20 2017-02-20 A kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic

Country Status (1)

Country Link
CN (1) CN108460299A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109214147A (en) * 2018-09-28 2019-01-15 内蒙古师范大学 A kind of encryption system of accounting software
CN110851800A (en) * 2019-11-14 2020-02-28 苏州科达科技股份有限公司 Code protection method, device, system and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043326A (en) * 2006-03-22 2007-09-26 赵兴 Dynamic information encrypting system and method
CN101064595A (en) * 2006-04-27 2007-10-31 联想(北京)有限公司 Computer network safe input authentication system and method
CN101236591A (en) * 2007-01-31 2008-08-06 联想(北京)有限公司 Method, terminal and safe chip for guaranteeing critical data safety
WO2015017130A1 (en) * 2013-07-28 2015-02-05 Square, Inc. Raw sensor input encryption for passcode entry security
CN104618348A (en) * 2015-01-12 2015-05-13 中国科学院信息工程研究所 Method for resisting automatic programming batch illegalities

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043326A (en) * 2006-03-22 2007-09-26 赵兴 Dynamic information encrypting system and method
CN101064595A (en) * 2006-04-27 2007-10-31 联想(北京)有限公司 Computer network safe input authentication system and method
CN101236591A (en) * 2007-01-31 2008-08-06 联想(北京)有限公司 Method, terminal and safe chip for guaranteeing critical data safety
WO2015017130A1 (en) * 2013-07-28 2015-02-05 Square, Inc. Raw sensor input encryption for passcode entry security
CN104618348A (en) * 2015-01-12 2015-05-13 中国科学院信息工程研究所 Method for resisting automatic programming batch illegalities

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
戴莉 等: "关于网络会计安全问题的理性思考", 《当代经济》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109214147A (en) * 2018-09-28 2019-01-15 内蒙古师范大学 A kind of encryption system of accounting software
CN110851800A (en) * 2019-11-14 2020-02-28 苏州科达科技股份有限公司 Code protection method, device, system and readable storage medium
CN110851800B (en) * 2019-11-14 2021-07-23 苏州科达科技股份有限公司 Code protection method, device, system and readable storage medium

Similar Documents

Publication Publication Date Title
CN110995642B (en) Providing secure connections using pre-shared keys
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
JP3676735B2 (en) Method and apparatus for mutual authentication of two data processing units
US7366916B2 (en) Method and apparatus for an encrypting keyboard
EP2188942A2 (en) Information protection device
JP2008269610A (en) Protecting sensitive data intended for remote application
US9154480B1 (en) Challenge-response authentication of a cryptographic device
US20120124378A1 (en) Method for personal identity authentication utilizing a personal cryptographic device
US20100005519A1 (en) System and method for authenticating one-time virtual secret information
CN107548542B (en) User authentication method with enhanced integrity and security
CN111008400A (en) Data processing method, device and system
CN108460299A (en) A kind of encrypting keyboard system and keyboard encrypting method based on asymmetric arithmetic
CN109510711B (en) Network communication method, server, client and system
US20180063098A1 (en) Vehicle Network Interface Tool
CN106972928B (en) Bastion machine private key management method, device and system
US20230289424A1 (en) Security Chip-Based Security Authentication Method and System, Security Chip, and Readable Storage Medium
EP4020875A1 (en) Method, first server, second server, and system for transmitting securely a key
CN110098915B (en) Authentication method and system, and terminal
EP3236631B1 (en) Data checking device and data checking method using the same
CN101325492B (en) Universal serial bus cipher lock based on programmable on-chip system
KR20210101304A (en) communication module
WO2023138135A1 (en) Man-machine identification method and device
US11799632B1 (en) Optimized authentication system
US11856105B1 (en) Secure multi-factor authentication system including identity verification of an authorized user
US11979501B2 (en) Optimized access in a service environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180828

RJ01 Rejection of invention patent application after publication