CN101232380A - Method of intelligent cryptographic key equipment safety use and intelligent cryptographic key equipment - Google Patents

Method of intelligent cryptographic key equipment safety use and intelligent cryptographic key equipment Download PDF

Info

Publication number
CN101232380A
CN101232380A CNA2008101011012A CN200810101101A CN101232380A CN 101232380 A CN101232380 A CN 101232380A CN A2008101011012 A CNA2008101011012 A CN A2008101011012A CN 200810101101 A CN200810101101 A CN 200810101101A CN 101232380 A CN101232380 A CN 101232380A
Authority
CN
China
Prior art keywords
information
content
key equipment
cipher key
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008101011012A
Other languages
Chinese (zh)
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Feitian Technologies Co Ltd
Original Assignee
Beijing Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Feitian Technologies Co Ltd filed Critical Beijing Feitian Technologies Co Ltd
Priority to CNA2008101011012A priority Critical patent/CN101232380A/en
Publication of CN101232380A publication Critical patent/CN101232380A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a safe use method of a smart key device and the smart key device, which pertains to the information security field. The method comprises: the input content of a user is obtained by a fingerprint sensor, the content is processed to obtain the content features, the content is the fingerprint content, the composition of the fingerprint content or the action content; the content features are mapped to the corresponding information according to the preset corresponding relation of the content features and the information, the corresponding operation is implemented according to the information, and the information is at least one of the character information and the operation information. The device includes: an ID authentication module, an encryption and decryption module, a communication module, an acquisition module, a processing module and a mapping operation module. The method improves the safety of the information acquisition of the smart key device, compared with the prior smart key device which acquires the input information value of a user by a host that is connected with thereof, thus greatly improving the safety and avoiding the problems of the mutilation of the information and the identity theft of the user etc. due to the unsafety of the host.

Description

The method and the intelligent cipher key equipment of intelligent cipher key equipment safe handling
Technical field
The present invention relates to information security field, particularly a kind of method and intelligent cipher key equipment of intelligent cipher key equipment safe handling.
Background technology
The fast development of present network and the very big facility that provides thereof, make the increasing dependency network means of people carry out comings and goings, comprise identification, Web bank and VPN (Virtual Private Network, VPN (virtual private network) is called virtual private net again) etc.
Correspondingly, the network information security also more and more causes people's attention, has occurred a kind of safety information product recently, i.e. the hardware device of a kind of portable removable use is commonly referred to as intelligent cipher key equipment, is a kind of small hardware equipment that has microprocessor.Intelligent cipher key equipment connects by the data communication interface and the main frame of main frame, processor in the equipment generally adopts the Safety Design chip, utilize its inside security mechanism, realize that key generates, secret key safety storage and preset function such as cryptographic algorithm, the computing relevant with key is fully in the inner execution of intelligent cipher key equipment, so safety of intelligent key equipment is very high.Because the above-mentioned advantage of intelligent cipher key equipment is so can be applied in it fields such as authentication, Web bank and VPN.
Many times all need with computer that intelligent cipher key equipment links to each other in import relevant information, thereby finish certain operations, generally adopt PIN code (Personal Identification Number such as intelligent cipher key equipment, Personal Identity Number) comes the legitimacy of identifying user identity, when carrying out authentication, intelligent cipher key equipment is linked to each other with computer, the user imports PIN code on computers, by communication interface this PIN code is transferred in the intelligent cipher key equipment, compare with the PIN code of the validated user of storing in advance in the intelligent cipher key equipment, consistent then illustrate that the PIN code that the user imports is correct, be validated user, just allow to use intelligent cipher key equipment this moment.For another example, the user often utilizes intelligent cipher key equipment to carry out network trading, after the general user utilizes intelligent cipher key equipment and network service end UNICOM, in client host, import Transaction Information etc., then by communication interface be sent to carry out encryption in the intelligent cipher key equipment after, be sent to the submission that the service end main frame is finished Transaction Information by client host.
The user utilizes intelligent cipher key equipment checking user legal identity, carry out under network trading or other a lot of situations, all need user's input information from client host, and be sent in the intelligent cipher key equipment, though the operation in intelligent cipher key equipment is safe, but can't guarantee that the information that the user imports in the computer is consistent with the information that communication interface by computer is sent in the intelligent cipher key equipment, because if subscriber computer has suffered trojan horse or has been seized on both sides by the arms by the hacker is long-range, then the user is probably distorted by client host input and the information that is sent to intelligent cipher key equipment or is lost etc., if this information is very important information, as user's PIN code, Transaction Information etc., then this information is also probably falsely used, and brings great potential safety hazard can for the normal use of validated user.
Summary of the invention
In order to improve the fail safe that intelligent cipher key equipment obtains information, the invention provides a kind of method and intelligent cipher key equipment of intelligent cipher key equipment safe handling.Described technical scheme is as follows:
On the one hand, the invention provides a kind of method of intelligent cipher key equipment safe handling, described method comprises:
Obtain the content of user input by fingerprint sensor, and described content handled obtain content characteristic, described content is the combination or the content of the act of fingerprint content, fingerprint content;
According to the default content characteristic and the corresponding relation of information, described content characteristic is mapped as corresponding information, and operates accordingly according to described information and executing, described information is at least a in character information and the operation information.
Described content of the act is by type of action, direction of action, operating frequency and at least one motion characteristic formed in operate time.
Described character information comprises at least a in numeral, letter, Chinese character and the symbol.
Describedly operate accordingly, be specially according to described information and executing:
According to the character information that mapping obtains, show that described character information is for user's affirmation.
Describedly operate accordingly, be specially according to described information and executing:
According to the character information that mapping obtains, the described character information of encryption.
Describedly operate accordingly, be specially according to described information and executing:
According to the character information that mapping obtains, carry out the authentication operation.
Describedly operate accordingly, be specially according to described information and executing:
The character information that obtains according to mapping, the communication interface by described intelligent cipher key equipment sends described character information to main frame.
On the other hand, the present invention also provides a kind of intelligent cipher key equipment, comprises authentication module, encrypting and decrypting module and communication module, and described intelligent cipher key equipment also comprises:
Acquisition module is used for obtaining the content that the user imports by fingerprint sensor, and described content is the combination or the content of the act of fingerprint content, fingerprint content;
Processing module is used for the content that described acquisition module obtains is handled, and obtains content characteristic;
The map operation module, be used for according to the default content characteristic and the corresponding relation of information, the content characteristic that described processing module is obtained is mapped as corresponding information, and carries out corresponding operation according to described breath, and described information is at least a in character information and the operation information.
Described content of the act is by type of action, direction of action, operating frequency and at least one motion characteristic formed in operate time.
Described character information comprises at least a in numeral, letter, Chinese character and the symbol.
Described map operation module is specially control chip.
The character information that described authentication module also is used to utilize described map operation module to obtain is carried out the authentication operation.
Described encrypting and decrypting module also is used for the character information that described map operation module obtains is carried out encryption.
Described communication module also is used for the character information that described map operation module obtains is sent to main frame.
In described authentication module, encrypting and decrypting module, communication module, acquisition module and the processing module at least one and described map operation module are integrated in the control chip.
Described control chip is the Safety Design chip, and described Safety Design chip comprises intelligent card chip.
Described intelligent cipher key equipment also comprises:
Display module is used to the information that shows that described map operation module obtains.
The beneficial effect of technical scheme provided by the invention is:
Intelligent cipher key equipment obtains content characteristic after treatment by the content that fingerprint sensor obtains user's input, and find and the corresponding value of information of this content characteristic according to default corresponding relation, improved the fail safe that intelligent cipher key equipment obtains information, compare by the mode that coupled main frame obtains the value of information of user's input with intelligent cipher key equipment in the prior art, greatly improved fail safe, avoided effectively problem such as being falsely used because of main frame dangerous causes information to be distorted with user identity.
Description of drawings
Fig. 1 is the method flow diagram of the intelligent cipher key equipment safe handling that provides of the embodiment of the invention 1;
Fig. 2 is the intelligent cipher key equipment structure chart that the embodiment of the invention 2 provides.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, embodiment of the present invention is described further in detail below in conjunction with accompanying drawing.
Embodiment 1
Referring to Fig. 1, the embodiment of the invention provides a kind of method of intelligent cipher key equipment safe handling, specifically comprises:
Step 101: obtain the content of user's input by fingerprint sensor, this content is specially the combination or the content of the act of fingerprint content, fingerprint content.
The combination of fingerprint content is meant the combination of the finger print information that obtains different fingers simultaneously; Content of the act is meant that by type of action, direction of action, operating frequency and at least one motion characteristic formed in operate time the type of action is drawn wave or the like such as drawing a circle, draw horizontal line, draw vertical line, drawing oblique line; And the direction ratio of action such as clockwise direction, counterclockwise, left, to the right, upwards, downwards, to the lower right, from left to right or the like; The frequency ratio of action is as with number of times of the continuous striking fingerprint sensor of certain frequency or the like; The time ratio of action such as time of striking fingerprint sensor is less than 5 seconds, and perhaps the striking fingerprint sensor was greater than 10 seconds or the like.
Particularly, can obtain the fingerprint content of user's input, perhaps obtain the combination of the fingerprint content of user's input, perhaps obtain the content of the act of user's input by the fingerprint sensor on the intelligent cipher key equipment.Fingerprint sensor can be one-touch type transducer, scratching type transducer or optical pickocff etc.The one-touch type transducer requires finger to touch reliably in the fingerprint collecting district, and whole fingerprint can disposablely collect; Scratching type transducer need nuzzle up at sensor surface with finger, transducer can be gathered the continuous finger print image of a cover, each the piece fingerprint image that collects splices again, could form complete fingerprint image, and wherein the fingerprint sensor of AT77C101B model is exactly a scratching type transducer; Optical pickocff is that what detect the concrete input of user is the fingerprint of which finger of which hand by the inner concavo-convex variation that causes light transmission rate of relative fingerprint that exists of detection fingerprint skin histology.In addition, can also utilize fingerprint sensor to get access to the action of user's finger, for scratching type transducer, owing to when gathering fingerprint, can collect a series of continuous fingerprint images, after these continuous fingerprint images are compared and analyze, just can learn that the user points information such as the type of action of scratching, direction, such as the action of user finger is the horizontal line drawn left, or the horizontal line of drawing to the right, upwards the vertical line of drawing, the vertical line still drawn are downwards still drawn oblique line or the like to the upper left corner to the oblique line that draw in the lower right corner; For the one-touch type transducer, can work as finger when touching reliably in the fingerprint collecting district, information such as the frequency that touches or touch time are detected, also can learn information such as the frequency of user's finger touch action and time.The embodiment of the invention is not limited to this three kinds of fingerprint sensors, when selecting the fingerprint sensor of other types for use, also is applicable to the present invention.
Step 102: the above-mentioned content of obtaining is handled, obtained content characteristic, this content characteristic is fingerprint characteristic or behavioural characteristic.
This processing comprise combination or the content of the act to the fingerprint content of obtaining, fingerprint content strengthen, cut apart, smoothly, processing such as refinement, incomplete same to the processing procedure that the fingerprint content is carried out with the processing procedure that content of the act is carried out, when the fingerprint content is handled, what obtain specifically is the fingerprint feature, when content of the act was handled, what obtain specifically was behavioural characteristic.
Step 103: according to the default content characteristic and the corresponding relation of information, be corresponding information with the foregoing Feature Mapping, this information comprises at least a in character information and the operation information.
Wherein, character information comprises at least a in numeral, letter, Chinese character and the symbol, operation information is confirmed operation, cancellation operation, end operation for another example, is checked operation, retouching operation, storage operation, cryptographic operation, decryption oprerations, authentication operation, upload operation or the like such as upwards operation, operation downwards, operation left, operation to the right, operation or the like down to the right.
The corresponding relation of content characteristic and information can design as required, but also can be regularly or revise the corresponding relation of having established aperiodically.This corresponding relation is exemplified below, and table 1 is depicted as the combination of fingerprint characteristic and fingerprint characteristic and the corresponding relation of character information, and table 2 is depicted as the corresponding relation of behavioural characteristic and operation information:
Table 1
The combination of fingerprint characteristic or fingerprint characteristic Character information
The left hand little finger of toe 0
The left hand third finger 1
The left hand middle finger 2
Left index finger 3
The left hand thumb 4
Hand thumb 5
Right hand forefinger 6
Right hand middle finger 7
Right ring finger 8
Right hand little finger of toe 9
Left hand little finger of toe+left hand the third finger ¥1000.00
Right hand little finger of toe+right ring finger $1000.00
Left hand middle finger+left index finger QQ pet name: $%# *
Right hand middle finger+right hand forefinger PIN=123456
Right hand little finger of toe+right hand forefinger+right hand middle finger youxiang@gmail.com
Left hand little finger of toe+left hand middle finger+left index finger sina.com
Table 2
Behavioural characteristic Operation information
The picture vertical line makes progress Upwards operation
Draw vertical line downwards Operation downwards
Draw horizontal line left Operation left
Draw horizontal line to the right Operation to the right
Striking is 1 time fast Confirm operation
With the continuous striking of the frequency of 2.5Hz 2 times The cancellation operation
The time that striking is 1 time was greater than 10 seconds Storage operation
Draw oblique line to the lower right corner Cryptographic operation
For example, when utilizing intelligent cipher key equipment to carry out network trading, the user imports one group of fingerprint characteristic as Transaction Information by fingerprint sensor, be followed successively by " hand thumb ", " right ring finger ", " left hand little finger of toe ", according to the mapping relations in the table 1, one group of character information that intelligent cipher key equipment mapping obtains after handling is " 580 ", promptly the user to import the amount of money to be transacted be 580.For the end of representing to import, the user can also represent for 1 time to confirm to import to finish by quick striking fingerprint sensor, and intelligent cipher key equipment resolves to the information of user's input " affirmation " according to the mapping relations in the table 2.
Certainly, more than two forms only provide a simple example, in actual applications, behavioural characteristic can also corresponding character information, the combination of fingerprint characteristic or fingerprint characteristic can also respective operations information etc.
Step 104: operate accordingly according to the information and executing that maps out.
Such as, can utilize the character information that maps out to carry out authentication operation, this character information of encryption, store this character information, show this character information, upload this character information or the like to main frame by communication interface; Wherein, the form of main frame includes but not limited to desktop computer, notebook computer, server, special machine, card reader, communication apparatus, digital camera, hub or PDA etc.
Also can carry out corresponding operation according to operation information, such as upwards operation, operation downwards, operation left, operation to the right, operation or the like down to the right, or confirm operation, cancellation operation, end operation, check operation, retouching operation, storage operation, cryptographic operation, decryption oprerations, authentication operation, upload operation or the like.
Embodiment 2
Referring to Fig. 2, the embodiment of the invention provides a kind of intelligent cipher key equipment, comprises authentication module, encrypting and decrypting module, communication module, and comprises:
Acquisition module is used for obtaining the content that the user imports by fingerprint sensor, and this content is the combination or the content of the act of fingerprint content, fingerprint content; Wherein, fingerprint sensor can be one-touch type transducer, scratching type transducer or optical pickocff etc.The embodiment of the invention is not limited to this three kinds of fingerprint sensors, when selecting the fingerprint sensor of other types for use, also is applicable to the present invention.Content of the act is meant that by type of action, direction of action, operating frequency and at least one motion characteristic formed in operate time the type of action is drawn wave such as drawing a circle, draw horizontal line, draw vertical line, drawing oblique line, or the like; And the action direction ratio such as clockwise direction, counterclockwise, left, to the right, upwards, downwards, to the lower right, from left to right, or the like; The frequency ratio of action is as with number of times of the continuous striking fingerprint sensor of certain frequency or the like; The time ratio of action such as time of striking fingerprint sensor is less than 5 seconds, and perhaps the striking fingerprint sensor was greater than 10 seconds or the like.
Processing module is used for the content that acquisition module obtains is handled, and obtains content characteristic, and this content characteristic is fingerprint characteristic or behavioural characteristic; This processing comprise combination or the content of the act to this fingerprint content, fingerprint content strengthen, cut apart, smoothly, processing such as refinement, incomplete same to the processing procedure that the fingerprint content is carried out with the processing procedure that content of the act is carried out, when the fingerprint content is handled, what obtain specifically is the fingerprint feature, when content of the act was handled, what obtain specifically was behavioural characteristic.
The map operation module, be used for according to the default content characteristic and the corresponding relation of information, the content characteristic that processing module is obtained is mapped as corresponding information, and this information is at least a in character information and the operation information, and operates accordingly according to this information and executing; This corresponding relation can design as required, but also can be regularly or revise the corresponding relation of having established aperiodically.
Wherein, character information comprises at least a in numeral, letter, Chinese character and the symbol, corresponding operation such as, carry out upwards operation, operation downwards, operation left, operation to the right, operation or the like down to the right, or confirm operation, cancellation operation, end operation, check operation, retouching operation, storage operation, cryptographic operation, decryption oprerations, authentication operation, upload operation or the like.
Map operation module in the embodiment of the invention preferably can be realized by control chip, in addition, preferably, at least one in authentication module, encrypting and decrypting module, communication module, acquisition module and the processing module and map operation module are integrated in the control chip and realize.Above-mentioned control chip is the Safety Design chip, and the Safety Design chip includes but not limited to intelligent card chip.
Above-mentioned authentication module specifically is used to authenticate relevant treatment, mainly comprises storage/authentication password information, storage/certifying signature, storage/checking digital certificate and rights management.It is mainly used in field of authentication, utilizes digital certificate, key or user's private data of storage to carry out safe authentication or the like.Further, the authentication module character information that also is used to utilize the map operation module to obtain is carried out the authentication operation.
Above-mentioned encrypting and decrypting module specifically is used for the data that write are encrypted in intelligent cipher key equipment, or the data that read are decrypted in intelligent cipher key equipment.Data encryption and data decryption algorithm can be in RSA, DES, 3DES, SCB2, SSF33, AES, the ECC algorithm any one or several arbitrarily.Can also be to utilize the method that presets code to realize the encryption and decryption processing, the code that presets can be stored in the intelligent cipher key equipment, realizes the protection to software.Preset code and comprise and preset user software part segment, user software part segment can not be read out intelligent cipher key equipment, and makes it in the device interior operation, and is mutual with external software, comes Control Software to guarantee its legal operation successively; Preset code and also comprise and preset software protection application interface function, software protection application interface function is the interface function between intelligent cipher key equipment and software system development merchant use, and this application interface function is mainly used by the software system development merchant.Further, the encrypting and decrypting module also is used for the character information that the mapping operational module obtains is carried out encryption.
Above-mentioned communication module is used to realize mutual between intelligent cipher key equipment and the main frame send to main frame as the character information that the map operation module is obtained.
Above-mentioned authentication module, encrypting and decrypting module can realize with the Safety Design chip; Also can be that at least one and map operation module in authentication module, encrypting and decrypting module and the communication module is integrated in the Safety Design chip and realizes, utilize the safety function of Safety Design built-in chip type, the function that realization that can be more simple and safe is security-related.
For further improving convenience, intelligent cipher key equipment also comprises:
Display module, be used to the information that shows that described map operation module obtains, certainly, display module can also show other information in the intelligent cipher key equipment use, and display module can be segment encode display, matrix display, character indicator or image display etc.
The embodiment of the invention obtain the content of user input by intelligent cipher key equipment and handle after obtain content characteristic, and find the corresponding value of information according to default mapping relations, improved the fail safe that intelligent cipher key equipment obtains information, compare by the mode that coupled main frame obtains the value of information of user's input with intelligent cipher key equipment in the prior art, greatly improved fail safe, avoided causing information to be distorted effectively and problem such as falsely used with user identity because of main frame is dangerous.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (17)

1. the method for intelligent cipher key equipment safe handling is characterized in that described method comprises:
Obtain the content of user input by fingerprint sensor, and described content handled obtain content characteristic, described content is the combination or the content of the act of fingerprint content, fingerprint content;
According to the default content characteristic and the corresponding relation of information, described content characteristic is mapped as corresponding information, and operates accordingly according to described information and executing, described information is at least a in character information and the operation information.
2. the method for intelligent cipher key equipment safe handling according to claim 1 is characterized in that described content of the act is by type of action, direction of action, operating frequency and at least one motion characteristic formed in operate time.
3. the method for intelligent cipher key equipment according to claim 1 safe handling is characterized in that, described character information comprises at least a in numeral, letter, Chinese character and the symbol.
4. the method for intelligent cipher key equipment according to claim 1 safe handling is characterized in that, describedly operates accordingly according to described information and executing, is specially:
According to the character information that mapping obtains, show that described character information is for user's affirmation.
5. the method for intelligent cipher key equipment according to claim 1 safe handling is characterized in that, describedly operates accordingly according to described information and executing, is specially:
According to the character information that mapping obtains, the described character information of encryption.
6. the method for intelligent cipher key equipment according to claim 1 safe handling is characterized in that, describedly operates accordingly according to described information and executing, is specially:
According to the character information that mapping obtains, carry out the authentication operation.
7. the method for intelligent cipher key equipment according to claim 1 safe handling is characterized in that, describedly operates accordingly according to described information and executing, is specially:
The character information that obtains according to mapping, the communication interface by described intelligent cipher key equipment sends described character information to main frame.
8. an intelligent cipher key equipment comprises authentication module, encrypting and decrypting module and communication module, it is characterized in that, described intelligent cipher key equipment also comprises:
Acquisition module is used for obtaining the content that the user imports by fingerprint sensor, and described content is the combination or the content of the act of fingerprint content, fingerprint content;
Processing module is used for the content that described acquisition module obtains is handled, and obtains content characteristic;
The map operation module, be used for according to the default content characteristic and the corresponding relation of information, the content characteristic that described processing module is obtained is mapped as corresponding information, and carries out corresponding operation according to described breath, and described information is at least a in character information and the operation information.
9. intelligent cipher key equipment according to claim 8 is characterized in that, described content of the act is by type of action, direction of action, operating frequency and at least one motion characteristic formed in operate time.
10. intelligent cipher key equipment according to claim 8 is characterized in that, described character information comprises at least a in numeral, letter, Chinese character and the symbol.
11. intelligent cipher key equipment according to claim 8 is characterized in that, described map operation module is specially control chip.
12. intelligent cipher key equipment according to claim 8 is characterized in that, the character information that described authentication module also is used to utilize described map operation module to obtain is carried out the authentication operation.
13. intelligent cipher key equipment according to claim 8 is characterized in that, described encrypting and decrypting module also is used for the character information that described map operation module obtains is carried out encryption.
14. intelligent cipher key equipment according to claim 8 is characterized in that, described communication module also is used for the character information that described map operation module obtains is sent to main frame.
15. intelligent cipher key equipment according to claim 8 is characterized in that, at least one in described authentication module, encrypting and decrypting module, communication module, acquisition module and the processing module and described map operation module are integrated in the control chip.
16., it is characterized in that described control chip is the Safety Design chip according to claim 11 or 15 described intelligent cipher key equipments, described Safety Design chip comprises intelligent card chip.
17. intelligent cipher key equipment according to claim 8 is characterized in that, described intelligent cipher key equipment also comprises:
Display module is used to the information that shows that described map operation module obtains.
CNA2008101011012A 2008-02-28 2008-02-28 Method of intelligent cryptographic key equipment safety use and intelligent cryptographic key equipment Pending CN101232380A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008101011012A CN101232380A (en) 2008-02-28 2008-02-28 Method of intelligent cryptographic key equipment safety use and intelligent cryptographic key equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008101011012A CN101232380A (en) 2008-02-28 2008-02-28 Method of intelligent cryptographic key equipment safety use and intelligent cryptographic key equipment

Publications (1)

Publication Number Publication Date
CN101232380A true CN101232380A (en) 2008-07-30

Family

ID=39898578

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008101011012A Pending CN101232380A (en) 2008-02-28 2008-02-28 Method of intelligent cryptographic key equipment safety use and intelligent cryptographic key equipment

Country Status (1)

Country Link
CN (1) CN101232380A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101631023B (en) * 2009-07-31 2011-08-17 北京飞天诚信科技有限公司 Method for authenticating identity and system thereof
CN102279923A (en) * 2010-06-12 2011-12-14 安凯(广州)微电子技术有限公司 Multi-fingerprint encryption method for raising encryption level
CN103207984A (en) * 2012-11-27 2013-07-17 鹤山世达光电科技有限公司 Fingerprint sensing device and fingerprint sensing method
WO2014005520A1 (en) * 2012-07-05 2014-01-09 腾讯科技(深圳)有限公司 Character input method and system, terminal electronic device and storage medium
CN103595719A (en) * 2013-11-15 2014-02-19 清华大学 Authentication method and system based on fingerprints
CN103646202A (en) * 2013-12-09 2014-03-19 东南大学 Fingerprint information coding encryption and application method
CN104658095A (en) * 2013-08-17 2015-05-27 慈溪市科创电子科技有限公司 Access control system
CN104680638A (en) * 2013-08-17 2015-06-03 慈溪市科创电子科技有限公司 Access control system and control method thereof
CN104794784A (en) * 2015-04-03 2015-07-22 广东艾科技术股份有限公司 Parking lot system and method for remote unlocking
CN104980279A (en) * 2014-10-16 2015-10-14 腾讯科技(深圳)有限公司 Identity authentication method, and related equipment and system
CN105005733A (en) * 2015-06-11 2015-10-28 天地融科技股份有限公司 Character display method, character display system and intelligent secret key equipment
CN105978889A (en) * 2016-06-20 2016-09-28 北京集创北方科技股份有限公司 Biological characteristic encryption method and device
WO2017202058A1 (en) * 2016-05-27 2017-11-30 飞天诚信科技股份有限公司 Intelligent key device and operation method thereof

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101631023B (en) * 2009-07-31 2011-08-17 北京飞天诚信科技有限公司 Method for authenticating identity and system thereof
CN102279923A (en) * 2010-06-12 2011-12-14 安凯(广州)微电子技术有限公司 Multi-fingerprint encryption method for raising encryption level
WO2014005520A1 (en) * 2012-07-05 2014-01-09 腾讯科技(深圳)有限公司 Character input method and system, terminal electronic device and storage medium
US9798463B2 (en) 2012-07-05 2017-10-24 Tencent Technology (Shenzhen) Company Limited Character input method and apparatus
CN103207984A (en) * 2012-11-27 2013-07-17 鹤山世达光电科技有限公司 Fingerprint sensing device and fingerprint sensing method
CN104680638A (en) * 2013-08-17 2015-06-03 慈溪市科创电子科技有限公司 Access control system and control method thereof
CN104658095A (en) * 2013-08-17 2015-05-27 慈溪市科创电子科技有限公司 Access control system
CN103595719A (en) * 2013-11-15 2014-02-19 清华大学 Authentication method and system based on fingerprints
CN103646202A (en) * 2013-12-09 2014-03-19 东南大学 Fingerprint information coding encryption and application method
CN104980279A (en) * 2014-10-16 2015-10-14 腾讯科技(深圳)有限公司 Identity authentication method, and related equipment and system
CN104794784A (en) * 2015-04-03 2015-07-22 广东艾科技术股份有限公司 Parking lot system and method for remote unlocking
CN105005733A (en) * 2015-06-11 2015-10-28 天地融科技股份有限公司 Character display method, character display system and intelligent secret key equipment
WO2017202058A1 (en) * 2016-05-27 2017-11-30 飞天诚信科技股份有限公司 Intelligent key device and operation method thereof
US10637654B2 (en) 2016-05-27 2020-04-28 Feitian Technologies Co., Ltd. Smart key device and working method thereof
CN105978889A (en) * 2016-06-20 2016-09-28 北京集创北方科技股份有限公司 Biological characteristic encryption method and device
CN105978889B (en) * 2016-06-20 2019-06-11 北京集创北方科技股份有限公司 Biological feature encryption method and device

Similar Documents

Publication Publication Date Title
CN101232380A (en) Method of intelligent cryptographic key equipment safety use and intelligent cryptographic key equipment
US10491379B2 (en) System, device, and method of secure entry and handling of passwords
US9876646B2 (en) User identification management system and method
US9208354B2 (en) Techniques for securing use of one-time passwords
US9652769B1 (en) Methods, apparatus and systems for securely storing and/or accessing payment information or other sensitive information based on tokens
US10534931B2 (en) Systems, devices and methods for automatic detection and masking of private data
CN107431694A (en) Encryption key is fetched
Ali et al. A secure and efficient multi-factor authentication algorithm for mobile money applications
JP2014238642A (en) Personal information protection apparatus, personal information protection system, personal information protection method, and program
CN102710611A (en) Network security authentication method and system
CN113420049B (en) Data circulation method, device, electronic equipment and storage medium
CN108171029A (en) Intelligent and safe chip
CN103532960A (en) Text encryption interaction method, encryption method and device, decryption method and device
CN110069907A (en) Big data source tracing method and system based on digital watermarking
WO2013052674A1 (en) Systems and methods for securely transferring personal identifiers
Avdić Use of biometrics in mobile banking security: case study of Croatian banks
US11250156B2 (en) System for encrypting and mailing sensitive information
CN114625756A (en) Data query method and device and server
Jo et al. Vulnerability analysis on smartphone fingerprint templates
CN103294943A (en) Encrypted signature handwriting device and method
KR102564395B1 (en) Method of electronic documents authentication and storage
CN109191220A (en) The method, apparatus and equipment of E-seal are operated on electronic invoice
US11531739B1 (en) Authenticating user identity based on data stored in different locations
TWI772648B (en) Method of verifying partial data based on collective certificate
CN116668188A (en) Financial data hierarchical encryption method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20080730