CN110832485A - Method for inputting verification code, hardware wallet and transaction equipment - Google Patents

Method for inputting verification code, hardware wallet and transaction equipment Download PDF

Info

Publication number
CN110832485A
CN110832485A CN201880022612.7A CN201880022612A CN110832485A CN 110832485 A CN110832485 A CN 110832485A CN 201880022612 A CN201880022612 A CN 201880022612A CN 110832485 A CN110832485 A CN 110832485A
Authority
CN
China
Prior art keywords
hardware wallet
character
user
target
characters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201880022612.7A
Other languages
Chinese (zh)
Inventor
任锋
刘玉峰
李响
黄昀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Guang Xin Cheng Technology Co Ltd
Original Assignee
Beijing Guang Xin Cheng Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Guang Xin Cheng Technology Co Ltd filed Critical Beijing Guang Xin Cheng Technology Co Ltd
Publication of CN110832485A publication Critical patent/CN110832485A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses a method for inputting a verification code, a hardware wallet and transaction equipment, wherein the verification code comprises N-bit characters, and the method comprises the following steps: the hardware wallet displays random characters to a user on a display area corresponding to an ith target character in the N target characters, wherein i is more than or equal to 1 and less than or equal to N; the hardware wallet receives an adjusting instruction which is sent by the transaction equipment and input by a user on the transaction equipment; and the hardware wallet adjusts the random character according to the adjusting instruction and the preset character sequence until the random character is adjusted to the ith target character. Therefore, the hardware wallet displays the random number in the display area corresponding to each verification code, and adjusts the random number based on the adjustment instruction input by the user on the transaction device to obtain each character to be verified. Even if the transaction device is monitored by a hacker, since the hacker does not know the random number generated by the hardware wallet, the authentication code cannot be inferred, thereby improving the security of authentication code input.

Description

Method for inputting verification code, hardware wallet and transaction equipment Technical Field
The embodiments of the present application relate to the field of digital currency, and more particularly, to a method of inputting a verification code, a hardware wallet, and a transaction apparatus.
Background
Each hardware wallet has its own Personal Identification Number (PIN) that the user needs to enter for authentication before use. Therefore, how to safely realize the input of the PIN code without affecting the user experience becomes an urgent problem to be solved.
Disclosure of Invention
The embodiment of the application provides a method for inputting a verification code, a hardware wallet and transaction equipment, which can improve the safety of inputting the verification code under the condition of not influencing user experience.
In a first aspect, a method of inputting a validation code, the validation code including an N-bit target character, the method comprising: the hardware wallet displays random characters to a user on a display area corresponding to an ith target character in the N target characters, wherein i is more than or equal to 1 and less than or equal to N, and N is a positive integer; the hardware wallet receives an adjusting instruction which is sent by a transaction device and input by a user on the transaction device; and the hardware wallet adjusts the random character according to the adjustment instruction and according to a preset character sequence until the random character is adjusted to the ith target character.
Therefore, the hardware wallet displays the random number through the display area corresponding to each character in the verification code, and adjusts the random number based on the adjustment instruction input by the user on the transaction device to obtain each character to be verified. Even if the transaction device is monitored by a hacker, the hacker cannot deduce the verification code because the hacker does not know the random number generated by the hardware wallet, so that the purpose that the verification code cannot depart from the hardware wallet is realized through the combination of the transaction device and the hardware wallet, and the input security of the verification code is improved.
With reference to the first aspect, in a possible implementation manner of the first aspect, the displaying, by the hardware wallet, a random character to a user on a display area corresponding to an ith target character of the N-bit target characters includes: the hardware wallet displays random characters to a user on a display area corresponding to an ith target character in the N target characters, and the method comprises the following steps: when the character displayed on the display area corresponding to the (i-1) th target character in the N-bit target characters is adjusted to be the (i-1) th target character, the hardware wallet displays the random character to a user on the display area corresponding to the (i) th target character.
With reference to the first aspect or any one of the foregoing possible implementation manners, in another possible implementation manner of the first aspect, the method further includes: the hardware wallet displays random characters to a user on a display area corresponding to an ith target character in the N target characters, and the method comprises the following steps: and the hardware wallet simultaneously and respectively displays N random characters on the N display areas corresponding to the N target characters.
With reference to the first aspect or any one of the foregoing possible implementation manners, the adjustment instruction is input by a user using a keyboard, a soft keyboard, or a mouse of the transaction device.
With reference to the first aspect or any one of the foregoing possible implementation manners, the verification code is a personal identification number PIN of the hardware wallet.
With reference to the first aspect or any one of the foregoing possible implementation manners, the N-bit target character includes at least one of a number and a letter.
In a second aspect, there is provided a method of inputting a validation code, the validation code comprising an N-bit target character, the method comprising: the transaction equipment acquires an adjusting instruction input by a user; the transaction device sends the adjustment instruction to a hardware wallet, and the adjustment instruction is used for instructing the hardware wallet to adjust the random character displayed on the display area corresponding to the ith target character in the N-bit target characters according to a preset character sequence until the random character is adjusted to the ith target character.
Therefore, the transaction device sends the acquired adjustment instruction input by the user to the hardware wallet, so that after the hardware wallet displays the random number in the display area corresponding to each character of the verification code, the random number can be adjusted according to the adjustment instruction, and each character to be verified is obtained. Even if the transaction device is monitored by a hacker, the hacker cannot deduce the verification code because the hacker does not know the random number generated by the hardware wallet, so that the purpose that the verification code cannot depart from the hardware wallet is realized through the combination of the transaction device and the hardware wallet, and the input security of the verification code is improved.
With reference to the second aspect, in a possible implementation manner of the second aspect, the adjustment instruction is input by a user using a keyboard, a soft keyboard, or a mouse of the transaction device.
With reference to the second aspect or any one of the foregoing possible implementations, in another possible implementation of the second aspect, the verification code is a personal identification number PIN of the hardware wallet.
With reference to the second aspect or any one of the foregoing possible implementation manners, the N-bit target character includes at least one of a number and a letter.
In a third aspect, there is provided a hardware wallet that may perform the method of the first aspect or any alternative implementation of the first aspect. In particular, the hardware wallet may comprise functional modules for performing the method of the first aspect or any possible implementation manner of the first aspect.
In a fourth aspect, there is provided a transaction device that may perform the method of the second aspect or any alternative implementation of the second aspect. In particular, the transaction device may comprise functional modules for performing the method of the second aspect described above or any possible implementation of the second aspect.
In a fifth aspect, a hardware wallet is provided that includes a processor and a memory. The memory is used for storing a computer program, and the processor is used for calling and running the computer program stored in the memory to execute the method of the first aspect or any possible implementation manner of the first aspect.
In a sixth aspect, a transaction device is provided that includes a processor and a memory. The memory is used for storing a computer program, and the processor is used for calling and running the computer program stored in the memory to execute the method of the second aspect or any possible implementation manner of the second aspect.
In a seventh aspect, a chip is provided, where the chip includes a processor, and the processor is configured to call and run a computer program from a memory, so that a device in which the chip is installed executes the method according to the first aspect or any possible implementation manner of the first aspect.
In an eighth aspect, a chip is provided, which comprises a processor for calling and running a computer program from a memory, so that a device in which the chip is installed performs the method as in the second aspect or any possible implementation manner of the second aspect.
A ninth aspect provides a computer readable storage medium storing a computer program for causing a computer to perform the method of the first aspect or any possible implementation manner of the first aspect.
A tenth aspect provides a computer-readable storage medium for storing a computer program for causing a computer to perform the method of the second aspect or any possible implementation manner of the second aspect.
In an eleventh aspect, there is provided a computer program product comprising computer program instructions to cause a computer to perform the method of the first aspect or any possible implementation manner of the first aspect.
In a twelfth aspect, there is provided a computer program product comprising computer program instructions to cause a computer to perform the method of the second aspect or any possible implementation manner of the second aspect.
In a thirteenth aspect, there is provided a computer program which, when run on a computer, causes the computer to perform the method of the first aspect or any possible implementation manner of the first aspect.
In a fourteenth aspect, there is provided a computer program which, when run on a computer, causes the computer to perform the method of the second aspect or any possible implementation of the second aspect.
In a fifteenth aspect, a computer-readable storage medium is provided for storing a computer program for causing a computer to perform the method of the first aspect or any possible implementation manner of the first aspect.
In a sixteenth aspect, a computer-readable storage medium is provided for storing a computer program for causing a computer to perform the method of the second aspect or any possible implementation manner of the second aspect.
In a seventeenth aspect, a transaction system is provided that includes a hardware wallet and a transaction device. In particular, the hardware wallet is configured to perform a method of the first aspect or any possible implementation of the first aspect, and the transaction device is configured to perform a method of the second aspect or any possible implementation of the second aspect.
Drawings
Fig. 1 is a flowchart of an interaction of a method of inputting a verification code according to an embodiment of the present application.
Fig. 2(a), 3(a), 4(a) and 5(a) are schematic diagrams of a hardware wallet display screen when a verification code is input in the embodiment of the present application.
Fig. 2(b), fig. 3(b), fig. 4(b), fig. 5(b) are schematic diagrams of an input keyboard of the transaction device in the embodiment of the present application.
Fig. 6 is a schematic block diagram of a hardware wallet of an embodiment of the present application.
Fig. 7 is a schematic block diagram of a transaction device of an embodiment of the present application.
Fig. 8 is a schematic configuration diagram of a hardware wallet according to an embodiment of the present application.
Fig. 9 is a schematic configuration diagram of a transaction apparatus according to an embodiment of the present application.
Fig. 10 is a schematic structural diagram of one chip of the embodiment of the present application.
Fig. 11 is a schematic structural diagram of another chip of the embodiment of the present application.
Fig. 12 is a schematic block diagram of a transaction system of an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings.
The hardware wallet needs to acquire the PIN code input by the user in the processes of setting the PIN code of the hardware wallet or verifying the PIN code input by the user and the like. There are several ways to enter the PIN code.
One way is that the user can directly enter a PIN code on a computer or a mobile phone to which the hardware wallet is connected. However, this method has a great safety hazard, and a hacker can acquire the PIN code by monitoring the keyboard or the mouse, etc.
Alternatively, the user can switch and input the PIN code through two limited buttons on the hardware wallet, and after the user switches and selects the required number by using the two buttons, the user can press the two buttons simultaneously for confirmation, and then the user needs to repeat the PIN code again for confirmation. This is extremely inconvenient for the user, takes a long time to input the PIN code, and also reduces the life span due to the frequent use of the two buttons.
In another mode, a full keyboard is arranged on the hardware wallet, similar to a numeric keypad on the right side of a computer keyboard, and a user can directly use the full keyboard on the hardware wallet to input a PIN code. However, the full keyboard used at low frequency not only increases the cost of the hardware wallet, but also makes the hardware wallet very large and not portable.
In order to overcome the problems caused by the above manner, in the embodiment of the application, when the verification code is input into the hardware wallet, the random number is displayed in the display area corresponding to each verification code, and is adjusted based on an adjustment instruction input by a user on the transaction device, so as to obtain the bit character to be verified. Even if the transaction device is monitored by a hacker, the hacker cannot deduce the verification code because the hacker does not know the random number generated by the hardware wallet, so that the purpose that the verification code cannot depart from the hardware wallet is realized through the combination of the transaction device and the hardware wallet, and the input security of the verification code is improved.
Fig. 1 is a flowchart of an interaction of a method of inputting a verification code according to an embodiment of the present application. The method shown in fig. 1 may be performed by a transaction device and a security device. The security device comprises a security chip, the security chip can independently perform operations such as key generation, encryption and decryption, and the like, and can store keys, feature data and the like so as to provide encryption and security authentication services for the device. The following description will take the security device as a hardware wallet as an example, but the application is not limited thereto. The transaction device in the embodiment of the present application may be any device capable of performing digital currency transactions, such as a computer, a mobile phone, a tablet computer, and the like. The hardware wallet in the embodiment of the present application may also be referred to as a "currency shield" or the like. Optionally, the transaction device and the hardware wallet may communicate via a USB interface, bluetooth, or radio frequency, etc.
The verification code includes N target characters, where N is a positive integer, and the verification code may be, for example, the PIN code, a mnemonic word, a set question answer, or other passwords. As shown in FIG. 1, the transaction method 100 may include some or all of the following steps. Wherein:
at 110, the hardware wallet displays the random character to the user on a display area corresponding to an ith target character of the N target characters. Wherein i is more than or equal to 1 and less than or equal to N.
At 120, the transaction device obtains adjustment instructions entered by the user.
And the adjusting instruction is used for instructing the hardware wallet to adjust the random character displayed on the display area corresponding to the ith target character according to a preset character sequence until the random character is adjusted to the ith target character.
At 130, the transaction device sends the adjustment instruction to the hardware wallet.
At 140, the hardware wallet adjusts the random character according to the adjustment instruction according to a predetermined character sequence until the random character is adjusted to the ith target character.
Specifically, if the verification code to be input by the user includes N target characters, the hardware wallet may display a random character on a display area corresponding to each target character, and after the user sees the random character from the display screen of the hardware wallet, the user may input an adjustment instruction on the transaction device, where the adjustment instruction may be used to adjust the random character. The adjustment instruction may include, for example, a first adjustment instruction that adjusts the random character in a forward order or a second adjustment instruction that adjusts the random character in a reverse order. The user inputs an adjustment command until the random character displayed on the display area corresponding to the bit target character is adjusted to be equal to the bit target character. When the characters displayed on the N display areas corresponding to the N-bit target characters are all adjusted to be corresponding target characters, the N target characters displayed on the N display areas are the verification codes input to the hardware wallet by the user. After the hardware wallet obtains the N target characters in the verification code, corresponding operations, such as verifying or processing the N target characters, may be performed on the N target characters.
Wherein, the adjusting instruction can be input by the user by using a keyboard, a soft keyboard or a mouse of the transaction device. For example, the user can adjust the random characters according to the character sequence by using an up key "↓" and a down key "↓" of the computer keyboard; or, the user can use the left turn key "←" and the right turn key "→" of the computer keyboard to adjust the random characters in the character order; or, the user also adjusts the random characters according to the character sequence by the up-and-down rolling of the mouse wheel; or, the user can also use a soft keyboard or a volume key on the mobile phone to realize the adjustment of the random characters; alternatively, the user may use other keys to effect the adjustment. The embodiment of the present application is not limited to this, and any manner that can realize inputting the adjustment instruction to the transaction device should fall within the protection scope of the embodiment of the present application.
The verification code input to the hardware wallet comprises N-bit characters which can be numbers, letters, a combination of numbers and letters, or other characters which can be used as the verification code.
Optionally, at 110, the displaying, by the hardware wallet, a random character to the user on a display area corresponding to an i-th target character of the N-bit target characters includes: and when the character displayed on the display area corresponding to the (i-1) th target character in the N-bit target characters is adjusted to be the (i-1) th target character, the hardware wallet displays the random character to the user on the display area corresponding to the (i) th target character.
That is, when the user adjusts the random character displayed on the display region corresponding to the i-1 th target character among the N-bit target characters of the authentication code to the i-1 th target character, a confirmation instruction may be input to the transaction apparatus and transmitted to the hardware wallet by the transaction apparatus. And after receiving the confirmation instruction, the hardware wallet displays a random character to the user on the display area corresponding to the ith target character. Similarly, when the random character displayed on the display area corresponding to the ith target character is adjusted to the ith target character by the user, the user inputs a confirmation instruction, and after receiving the confirmation instruction, the hardware wallet continues to display the random character to the user on the display area corresponding to the (i + 1) th target character. And sequentially, adjusting characters displayed on N display areas corresponding to the N-bit target characters to be respectively corresponding target characters, thereby completing the input of the N-bit target characters.
For example, assume that the verification code includes 6 target digits, respectively 180531. Fig. 2(a), 3(a), 4(a) and 5(a) show the display screen of the hardware wallet, and the dashed boxes on the display screen represent six display areas, which correspond to the 6-digit numbers in the verification code one by one from front to back. Fig. 2(b), fig. 3(b), fig. 4(b) and fig. 5(b) show a computer keyboard, which includes an up key "↓" and a down key "↓" for inputting an adjustment instruction, an Enter key (Enter) for inputting a confirmation instruction, and a delete key (Backspace) for inputting a delete instruction.
Fig. 2(a) and 2(b) are schematic diagrams illustrating a user adjusting the random number in the display area corresponding to the first target digit. The hardware wallet first displays a random number (assumed here to be 2) to the user on a first display area. When the user presses "≠ once on the computer keyboard, the value of the random number displayed on the first display area is added with 1; and when the user presses "↓" once on the keyboard of the computer, subtracting 1 from the value of the random number displayed on the first display area. Therefore, after the user presses "↓" once on the keyboard of the computer, the computer sends the adjusting instruction to the hardware wallet, and after the hardware wallet receives the adjusting instruction of "↓" once, the random number 2 displayed on the first display area is adjusted to the first target number 1. The user confirms by pressing the enter key after seeing that the random number 2 displayed on the first display area becomes the target number 1. Of course, similarly, the user may also press "%" 9 times in succession to adjust 2 to 1.
As shown in fig. 3(a) and 3(b), after receiving the confirmation instruction for the first target number 1, the hardware wallet displays a random number (assumed to be 6) to the user in the second display area. At this time, the user may continuously press "×" twice on the computer keyboard to adjust the random number 6 to the target number 8 and press the enter key for confirmation. Alternatively, the user may also adjust 6 to 8 by pressing "↓" 8 times in succession.
As shown in fig. 4(a) and 4(b), after the hardware wallet receives the confirmation instruction for the second digit target number 8, it continues to display a random number (assumed to be 4 here) to the user on the third display area. At this time, the user can continuously press "↓" 4 times on the computer keyboard to adjust the random number 4 to the target number 0 and press the enter key for confirmation. Alternatively, the user may continuously press "×" 6 times to adjust 4 to 0.
As shown in fig. 5(a) and 5(b), the random number 7 displayed on the fourth display area is adjusted to the target number 5, the random number 3 displayed on the fifth display area is adjusted to the target number 3 (since both the random number displayed on the fifth display area and the fifth target number are 3, the user can directly input a confirmation instruction without adjustment), and the random number 9 displayed on the sixth display area is adjusted to the target number 1, in this order. To this end, the hardware wallet obtains the 6 target digits in the authentication code entered by the user.
In this embodiment, the user may input the confirmation instruction by pressing the enter key, but the embodiment of the present application is not limited thereto. For example, the user may also input the confirmation instruction by stopping inputting the adjustment instruction for a fixed time period (e.g., 2 seconds or 3 seconds), and if the hardware wallet does not receive the adjustment instruction input by the user within the fixed time period, the currently displayed character on the default display area is the target character input by the user, and after the user has adjusted all the N-bit random numbers, the user may input an instruction for confirmation to the transaction device.
Optionally, if the user finds that a certain number displayed on the hardware wallet is adjusted incorrectly, the user may delete the certain number through the delete key and input the certain number again in the manner described above. Alternatively, the user may delete the last character currently displayed each time the user presses the delete key.
Above, taking numbers as an example, if the verification code includes 6-digit letters, the random letters displayed in each display area can also be adjusted according to the alphabetical order in this way.
Alternatively, if the verification code includes a combination of numbers and letters, the user can also switch numbers/letters by a specific key on the computer keyboard. For example, assuming that the verification code is 123ABC, after the user adjusts the random number displayed on the third display area to the target number 3 according to the arabic number order, the user can input a switching instruction to the transaction device through the specific key, and after receiving the switching instruction, the hardware wallet displays a random letter instead of the random number on the fourth display area, so that the user can adjust the random letter displayed on the fourth display area according to the letter order to obtain the target letter a.
The above describes a way to input the verification code to the hardware wallet, that is, after the character displayed on the display area corresponding to the i-1 th target character in the N-bit target characters is adjusted to the i-1 th target character, the hardware wallet displays a random character to the user on the display area corresponding to the i-th target character. That is, after the hardware wallet confirms that the user has adjusted one random number, the hardware wallet displays the next random number to the user. Alternatively, however, at 110, the hardware wallet may simultaneously display N random characters on N display areas corresponding to the N-bit target characters, respectively.
For example, assume that the verification code includes 6 target digits, respectively 180531. The hardware wallet may simultaneously display six random numbers on six display areas shown in fig. 2, for example, 264739 for the six random numbers displayed simultaneously. The user may adjust the random number displayed on each display area to the corresponding target number in any of the manners described above, and instruct the hardware wallet through a confirmation instruction to complete the input of the verification code. In this embodiment, the order in which the user adjusts each digit of the random number is not limited, and for example, the user may adjust 180531 displayed to 264739 in order from front to back, or may adjust the digits in order from back to front or in a random order.
It can be seen that, by using the input method according to the embodiment of the application, even if a hacker monitors an input keyboard of a computer or a mobile phone and knows how many times "↓" or "↓" the user has pressed, since the hacker does not know how many random numbers displayed by a hardware wallet, it is not possible to infer the adjusted target character, and thus it is not possible to obtain the verification code. Because the verification code is always positioned in the hardware wallet and cannot be leaked to a computer or a mobile phone, the verification code cannot be leaked due to the fact that the computer or the mobile phone is monitored, and the safety of inputting the verification code is greatly improved.
It should be noted that, without conflict, the embodiments and/or technical features in the embodiments described in the present application may be arbitrarily combined with each other, and the technical solutions obtained after the combination also fall within the protection scope of the present application.
It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
The transaction method according to the embodiment of the present application is described above in detail, and the device according to the embodiment of the present application will be described below with reference to fig. 6 to 11, and the technical features described in the embodiment of the method are applicable to the following embodiments of the device.
Fig. 6 is a schematic block diagram of a hardware wallet 600 according to an embodiment of the present application. The authentication code to be entered into the hardware wallet 600 includes N target characters. As shown in fig. 6, the hardware wallet 600 includes a display unit 610, a receiving unit 620, and a processing unit 630. Wherein:
a display unit 610, configured to display a random character to a user in a display area corresponding to an ith target character in the N target characters, where i is greater than or equal to 1 and is less than or equal to N, and N is a positive integer;
a receiving unit 620, configured to receive an adjustment instruction sent by a transaction device and input by a user on the transaction device;
a processing unit 630, configured to adjust the random character according to the adjustment instruction and according to a predetermined character sequence until the random character is adjusted to the i-th target character.
Therefore, the hardware wallet displays the random number in the display area corresponding to each verification code, and adjusts the random number based on the adjustment instruction input by the user on the transaction device to obtain each character to be verified. Even if the transaction device is monitored by a hacker, the hacker cannot deduce the verification code because the hacker does not know the random number generated by the hardware wallet, so that the purpose that the verification code cannot depart from the hardware wallet is realized through the combination of the transaction device and the hardware wallet, and the input security of the verification code is improved.
Optionally, the display unit is specifically configured to: and when the character displayed on the display area corresponding to the (i-1) th target character in the N-bit target characters is adjusted to be the (i-1) th target character, displaying the random character to a user on the display area corresponding to the (i) th target character.
Optionally, the display unit 610 is specifically configured to: and simultaneously displaying N random characters on the N display areas corresponding to the N target characters respectively.
Optionally, the adjustment instruction is input by a user using a keyboard, a soft keyboard or a mouse of the transaction device.
Optionally, the verification code is a personal identification number PIN of the hardware wallet.
Optionally, the N-bit target character includes at least one of a number and a letter.
It should be understood that the hardware wallet 600 may perform the corresponding operations performed by the hardware wallet in the method 100, and therefore, for brevity, will not be described again.
Fig. 7 is a schematic block diagram of a transaction device 700 according to an embodiment of the present application. The authentication code to be entered into the hardware wallet comprises N target characters. As shown in fig. 7, the transaction equipment package 700 includes an acquisition unit 710 and a transmission unit 720. Wherein:
an obtaining unit 710, configured to obtain an adjustment instruction input by a user;
a sending unit 720, configured to send the adjustment instruction to the hardware wallet, where the adjustment instruction is used to instruct the hardware wallet to adjust a random character displayed on a display area corresponding to an i-th target character in the N-bit target characters according to a predetermined character sequence until the random character is adjusted to the i-th target character.
Therefore, the transaction device sends the acquired adjustment instruction input by the user to the hardware wallet, so that after the hardware wallet displays the random number in the display area corresponding to each verification code, the random number can be adjusted according to the adjustment instruction, and each character to be verified is obtained. Even if the transaction device is monitored by a hacker, the hacker cannot deduce the verification code because the hacker does not know the random number generated by the hardware wallet, so that the purpose that the verification code cannot depart from the hardware wallet is realized through the combination of the transaction device and the hardware wallet, and the input security of the verification code is improved.
Optionally, the adjustment instruction is input by a user using a keyboard, a soft keyboard or a mouse of the transaction device.
Optionally, the verification code is a personal identification number PIN of the hardware wallet.
Optionally, the N-bit target character includes at least one of a number and a letter.
It should be understood that the transaction device 700 can perform the corresponding operations performed by the transaction device in the method 100, and therefore, for brevity, the description is omitted here.
Fig. 8 is a schematic block diagram of a hardware wallet 800 according to an embodiment of the present application. As shown in fig. 8, the hardware wallet 800 includes a processor 810, and the processor 810 can call and run a computer program from a memory to implement the corresponding processes implemented by the hardware wallet in the methods of the embodiments of the present application.
Optionally, as shown in fig. 8, the hardware wallet 800 may also include a memory 820. The processor 810 can call and run a computer program from the memory 830 to implement the corresponding processes implemented by the hardware wallet in the methods of the embodiments of the present application. The memory 820 may be a separate device from the processor 810 or may be integrated into the processor 810.
Optionally, the hardware wallet 800 includes a secure chip, such as an Integrated Circuit (IC) chip. The secure chip includes the processor 810 and the memory 820.
Optionally, as shown in fig. 8, the hardware wallet 800 may further include a transceiver 830, and the processor 810 may control the transceiver 830 to communicate with the transaction device, and specifically, may transmit information or data to the transaction device or receive information or data transmitted by the transaction device. The transceiver 830 may include a receiver and a transmitter, among others.
Optionally, the hardware wallet 800 further comprises a display screen for displaying information such as random characters and authentication codes to the user.
Fig. 9 is a schematic block diagram of a transaction device 900 according to an embodiment of the present application. As shown in fig. 9, the transaction device includes a processor 910, and the processor 910 can call and run a computer program from a memory to implement the corresponding processes implemented by the transaction device in the methods of the embodiments of the present application.
Optionally, as shown in fig. 9, the transaction device 900 may also include a memory 920. The processor 910 can call and run a computer program from the memory 930 to implement the corresponding processes implemented by the transaction device in the methods of the embodiments of the present application. The memory 920 may be a separate device from the processor 910, or may be integrated in the processor 910.
Optionally, as shown in fig. 9, the transaction device 900 may further include a transceiver 930, and the processor 910 may control the transceiver 930 to communicate with other transaction devices or hardware wallets, and in particular, may transmit information or data to or receive information or data transmitted by other transaction devices or hardware wallets. The transceiver 930 may include a receiver and a transmitter, among others.
Fig. 10 is a schematic block diagram of a chip 1000 according to an embodiment of the application. The chip 1000 shown in fig. 10 includes a processor 1010, and the processor 1010 may call and run a computer program from a memory to implement the corresponding processes implemented by the hardware wallet in the methods of the embodiments of the present application.
Optionally, as shown in fig. 10, the chip 1000 may further include a memory 1020. From the memory 1020, the processor 1010 may call and run a computer program to implement the corresponding processes implemented by the hardware wallet in the methods of the embodiments of the present application. The memory 1020 may be a separate device from the processor 1010 or may be integrated into the processor 1010.
Wherein, optionally, the chip 1000 is a secure chip, such as an IC chip.
Optionally, chip 1000 may also include an input interface 1030. The processor 1010 may control the input interface 1030 to communicate with other devices or chips, and specifically may obtain information or data transmitted by the other devices or chips.
Optionally, the chip 1000 may further include an output interface 1040. The processor 1010 may control the output interface 1040 to communicate with other devices or chips, and may particularly output information or data to the other devices or chips.
Fig. 11 is a schematic block diagram of a chip 1100 according to an embodiment of the present application. The chip 1100 shown in fig. 11 includes a processor 1110, and the processor 1110 can call and run a computer program from a memory to implement the corresponding flow implemented by the transaction device in the methods of the embodiments of the present application.
Optionally, as shown in fig. 11, the chip 1100 may further include a memory 1120. From the memory 1120, the processor 1110 can call and run a computer program to implement the corresponding processes implemented by the hardware wallet in the methods of the embodiments of the present application. The memory 1120 may be a separate device from the processor 1110, or may be integrated into the processor 1110.
Optionally, chip 1100 may also include an input interface 1130. The processor 1110 may control the input interface 1130 to communicate with other devices or chips, and in particular, may obtain information or data sent by other devices or chips.
Optionally, the chip 1100 may further include an output interface 1140. The processor 1110 may control the output interface 1140 to communicate with other devices or chips, and in particular, may output information or data to the other devices or chips.
The aforementioned processors may be general purpose processors, Digital Signal Processors (DSPs), Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), or other Programmable logic devices, transistor logic devices, discrete hardware components, etc. The general purpose processor mentioned above may be a microprocessor or any conventional processor etc.
The above-mentioned memories may be either volatile or nonvolatile memories, or may include both volatile and nonvolatile memories. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. The volatile Memory may be a Random Access Memory (RAM).
It should be understood that the above memories are exemplary but not limiting illustrations, for example, the memories in the embodiments of the present application may also be Static random access memory (Static RAM, SRAM), Dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double data rate Synchronous Dynamic random access memory (Double data SDRAM, DDR SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Direct Rambus RAM (DR RAM), and so on. That is, the memory in the embodiments of the present application is intended to comprise, without being limited to, these and any other suitable types of memory.
Fig. 12 is a schematic block diagram of a transaction system 1200 according to an embodiment of the present application. As shown in fig. 12, the transaction system 1200 includes a hardware wallet 1210 and a transaction device 1220.
The hardware wallet 1210 may be configured to implement corresponding functions implemented by the hardware wallet in the method 100, and the components of the hardware wallet 1210 may be as shown in the hardware wallet 600 in fig. 6 or the hardware wallet 800 shown in fig. 8, which is not described herein again for brevity.
The transaction device 1220 may be configured to implement corresponding functions implemented by the transaction device in the method 100, and the components of the transaction device 1220 may be as shown in the transaction device 700 in fig. 7 or the transaction device 900 shown in fig. 9, which are not described herein again for brevity.
It should be understood that in the embodiment of the present invention, "B corresponding to (corresponding to) a" means that B is associated with a, from which B can be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may be determined from a and/or other information.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the unit is only one logical functional division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (27)

  1. A method of inputting a validation code, wherein the validation code includes N target characters, the method comprising:
    the hardware wallet displays random characters to a user on a display area corresponding to an ith target character in the N target characters, wherein i is more than or equal to 1 and less than or equal to N, and N is a positive integer;
    the hardware wallet receives an adjusting instruction which is sent by a transaction device and input by a user on the transaction device;
    and the hardware wallet adjusts the random character according to the adjustment instruction and according to a preset character sequence until the random character is adjusted to the ith target character.
  2. The method of claim 1, wherein the hardware wallet displaying random characters to a user on a display area corresponding to an i-th target character of the N-bit target characters comprises:
    when the character displayed on the display area corresponding to the (i-1) th target character in the N-bit target characters is adjusted to the (i-1) th target character, the hardware wallet displays the random character to a user on the display area corresponding to the (i) th target character.
  3. The method of claim 1, wherein the hardware wallet displaying random characters to a user on a display area corresponding to an i-th target character of the N-bit target characters comprises:
    and the hardware wallet simultaneously and respectively displays N random characters on the N display areas corresponding to the N target characters.
  4. The method of any one of claims 1 to 3, wherein the adjustment instruction is entered by a user using a keyboard, a soft keyboard or a mouse of the transaction device.
  5. The method of any one of claims 1 to 4, wherein the verification code is a Personal Identification Number (PIN) of the hardware wallet.
  6. The method of any of claims 1-5, wherein the N-bit target character comprises at least one of a number and a letter.
  7. A method of inputting a validation code, wherein the validation code includes N target characters, the method comprising:
    the transaction equipment acquires an adjusting instruction input by a user;
    the transaction device sends the adjustment instruction to a hardware wallet, and the adjustment instruction is used for instructing the hardware wallet to adjust the random characters displayed on the display area corresponding to the ith target character in the N-bit target characters according to a preset character sequence until the random characters are adjusted to the ith target character.
  8. The method of claim 7, wherein the adjustment instruction is entered by a user using a keyboard, a soft keyboard, or a mouse of the transaction device.
  9. The method of claim 7 or 8, wherein the verification code is a Personal Identification Number (PIN) of the hardware wallet.
  10. The method of any of claims 7 to 9, wherein the N-bit target character comprises at least one of a number and a letter.
  11. A hardware wallet, wherein a passcode to be entered into the hardware wallet comprises N target characters, the hardware wallet comprising:
    the display unit is used for displaying random characters to a user on a display area corresponding to an ith target character in the N target characters, i is more than or equal to 1 and less than or equal to N, and N is a positive integer;
    the receiving unit is used for receiving an adjusting instruction which is sent by transaction equipment and input by a user on the transaction equipment;
    and the processing unit is used for adjusting the random character according to the adjusting instruction and a preset character sequence until the random character is adjusted to the ith target character.
  12. The hardware wallet of claim 11, wherein the display unit is specifically configured to:
    and when the character displayed on the display area corresponding to the (i-1) th target character in the N-bit target characters is adjusted to the (i-1) th target character, displaying the random character to a user on the display area corresponding to the (i) th target character.
  13. The hardware wallet of claim 11, wherein the display unit is specifically configured to:
    and simultaneously displaying N random characters on the N display areas corresponding to the N target characters respectively.
  14. The hardware wallet of any one of claims 11 to 13, wherein the adjustment instruction is entered by a user using a keyboard, a soft keyboard or a mouse of the transaction device.
  15. The hardware wallet of any one of claims 11 to 14, wherein the verification code is a personal identification number, PIN, of the hardware wallet.
  16. The hardware wallet of any one of claims 11 to 15, wherein the N-bit target characters comprise at least one of numbers and letters.
  17. A transaction device, wherein a validation code to be entered into a hardware wallet comprises N target characters, the transaction device comprising:
    the acquisition unit is used for acquiring an adjustment instruction input by a user;
    a sending unit, configured to send the adjustment instruction to the hardware wallet, where the adjustment instruction is used to instruct the hardware wallet to adjust a random character displayed on a display area corresponding to an i-th target character in the N-bit target characters according to a predetermined character sequence until the random character is adjusted to the i-th target character.
  18. The transaction device of claim 17, wherein the adjustment instruction is entered by a user using a keyboard, a soft keyboard, or a mouse of the transaction device.
  19. The transaction device of claim 17 or 18, wherein the verification code is a personal identification number, PIN, of the hardware wallet.
  20. The transaction arrangement according to any of claims 17 to 19, wherein the N-digit target character comprises at least one of a number and a letter.
  21. A hardware wallet comprising a processor to invoke instructions stored in a memory to perform the method of any one of claims 1 to 6.
  22. A transaction device, comprising a processor configured to invoke instructions stored in a memory to perform the method of any of claims 7 to 10.
  23. A storage medium storing a computer program, wherein the computer program, when executed by a computing device, causes the storage medium to implement the method of any one of claims 1 to 6.
  24. A storage medium storing a computer program, wherein the computer program, when executed by a computing device, causes the storage medium to implement the method of any one of claims 7 to 10.
  25. A chip, characterized in that the chip comprises a processor for calling up and running a computer program from a memory, so that a device in which the chip is installed performs the method of inputting a validation code according to any of claims 1 to 6.
  26. A chip, characterized in that the chip comprises a processor for calling up and running a computer program from a memory, so that a device in which the chip is installed performs the method of inputting a validation code according to any of claims 7 to 10.
  27. A transaction system, characterized in that it comprises a hardware wallet according to any one of claims 11 to 16 and a transaction device according to any one of claims 17 to 20.
CN201880022612.7A 2018-06-07 2018-06-07 Method for inputting verification code, hardware wallet and transaction equipment Pending CN110832485A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/090323 WO2019232767A1 (en) 2018-06-07 2018-06-07 Method for inputting verification code, hardware wallet and trading device

Publications (1)

Publication Number Publication Date
CN110832485A true CN110832485A (en) 2020-02-21

Family

ID=68769136

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880022612.7A Pending CN110832485A (en) 2018-06-07 2018-06-07 Method for inputting verification code, hardware wallet and transaction equipment

Country Status (2)

Country Link
CN (1) CN110832485A (en)
WO (1) WO2019232767A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231676A (en) * 2020-10-09 2021-01-15 中国银联股份有限公司 Method, device, equipment and storage medium for generating, displaying and verifying graphic verification code

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101695066A (en) * 2009-09-28 2010-04-14 北京深思洛克软件技术股份有限公司 Security authentication method and information security authentication equipment
US20130276102A1 (en) * 2012-04-13 2013-10-17 Abine Limited Methods and systems for enabling a secure password entry using a non-secure device
US20130276103A1 (en) * 2012-04-13 2013-10-17 Abine Limited Methods and systems for enabling a secure password entry using a non-secure device
CN103714624A (en) * 2013-12-19 2014-04-09 吴根佑 Method, system and server for recharging electronic wallet and recharging operating terminal
US20150112872A1 (en) * 2013-10-23 2015-04-23 Mastercard International Incorporated System and method for guided passcode entry
CN105308898A (en) * 2013-02-26 2016-02-03 维萨国际服务协会 Systems, methods and devices for performing passcode authentication

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014107618A1 (en) * 2013-01-04 2014-07-10 Gary Stephen Shuster Cognitive-based captcha system
CN105718783B (en) * 2014-12-03 2020-03-27 阿里巴巴集团控股有限公司 Verification code interaction method and device, client and server
CN106446660A (en) * 2016-09-21 2017-02-22 泰康保险集团股份有限公司 Method and system for providing verification code and terminal device
CN107317805A (en) * 2017-06-21 2017-11-03 北京洋浦伟业科技发展有限公司 One kind checking code verification method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101695066A (en) * 2009-09-28 2010-04-14 北京深思洛克软件技术股份有限公司 Security authentication method and information security authentication equipment
US20130276102A1 (en) * 2012-04-13 2013-10-17 Abine Limited Methods and systems for enabling a secure password entry using a non-secure device
US20130276103A1 (en) * 2012-04-13 2013-10-17 Abine Limited Methods and systems for enabling a secure password entry using a non-secure device
CN105308898A (en) * 2013-02-26 2016-02-03 维萨国际服务协会 Systems, methods and devices for performing passcode authentication
US20150112872A1 (en) * 2013-10-23 2015-04-23 Mastercard International Incorporated System and method for guided passcode entry
CN103714624A (en) * 2013-12-19 2014-04-09 吴根佑 Method, system and server for recharging electronic wallet and recharging operating terminal

Also Published As

Publication number Publication date
WO2019232767A1 (en) 2019-12-12

Similar Documents

Publication Publication Date Title
US20180089404A1 (en) Authenticating apparatus for executing user authentication
JP2013528857A (en) Password safe input system using password key movement value and password safe input method
US11868169B2 (en) Enabling access to data
CN101986670A (en) Method for protecting password input security at mobile phone by using password keyboard
EP3631782B1 (en) Method and system for entry of a personal identification number (pin)
CN110832485A (en) Method for inputting verification code, hardware wallet and transaction equipment
CN107895268A (en) A kind of method that safety input PIN is realized on intelligent payment terminal
CN105678131A (en) Information processing method, information device, mobile terminal and server
US20190370772A1 (en) Device and method for secure identification of a user
CN106712967B (en) Dynamic token and control method thereof
CN111758243A (en) Mobile storage device, storage system and storage method
KR20130107497A (en) User authentication system by using touch pattern
KR101368518B1 (en) User authentication method with parameterized security and usability
KR101692919B1 (en) Inputting system and method for for security keypad using smart device
CN106873772A (en) A kind of VR virtual units encryption method and equipment
US20170063837A1 (en) Password checking method based on random sequence
KR101629495B1 (en) Inputting system and method for for security key using one time keypad
KR20070040983A (en) Method for verifying user of electronic terminal and electronic terminal thereof
KR101769695B1 (en) Inputting system and method for security key key-pad for security using one-time keypad
KR20120082555A (en) Method and apparatus for inputting password in electronic device
KR101170068B1 (en) Method for Displaying Agreement Method Key Button Matrix with Wireless Non-faced Banking, Wireless Terminal and Recording Medium
KR20170094112A (en) Inputting system and method for security key key-pad for security using one-time keypad
KR20180031252A (en) A device for secret number input
KR20170026071A (en) Inputting system and method for for security key using one time keypad
KR20190072095A (en) Apparatus and method for authenticating user of wearable device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200221