Cipher management method
Technical field
The present invention relates in particular to a kind of cipher management method based on mouse action about a kind of cipher management method.
Background technology
Computing machine is modern people indispensable electronic products in life, and mouse almost is one of essential input media of present computing machine.In computer operation, computing machine is often processed some important secret data, for example related data in individual's research report, storehouse user data and the e-bank etc.To this, computing machine just develops a variety of privacy mechanism and is not stolen with the data of protecting need to be keep secret.
Moreover along with prevailing of in recent years ecommerce, the trade deal on the network has become current popular a kind of method of commerce, also is with the risk of serving in the transaction thereupon.In order to improve the security of transaction, people have to guarantee the safety of concluding the business by some safety practices, the input of password is wherein a kind of, but this is not to be exactly a stifled airtight wall, catches keyboard by wooden horse software and some hack tool software and inputs namely easily stealing passwords.
Dependence to mouse when using computing machine along with people is more and more higher; how by the necessary input media of computing machine, i.e. mouse, and reach more perfect privacy mechanism; so that the operation of cryptoguard is more simple, it is convenient to use, be a problem that is worth thinking simultaneously.
Summary of the invention
The object of the invention is to, a kind of cipher management method is provided, it utilizes mouse to operate to realize the operation of Password Management, and not only operation steps is simple, and safe, can realize very easily the login of several functions window in the computing machine.
To achieve these goals, the invention provides a kind of cipher management method, may further comprise the steps:
Step 1: the user inputs personal identification number and enables Safety mouse, and system enters password and uses state;
Step 2: system authenticates Safety mouse, to confirm that it is whether as the Safety mouse of system's approval;
Step 3: Safety mouse authenticates system user, to confirm that whether this system user is as validated user;
Step 4: after the authentication in the step 2,3 was all passed through, Safety mouse outwards transmitted corresponding encrypted message for the user with the form of ciphertext; When if authentication error surpasses a certain preset times continuously, then Safety mouse self-locking, the user can't authenticate again.
Described Safety mouse carries out the data storage with the ciphertext form, be provided with safety chip in this Safety mouse, the corresponding code data of access all needs this safety chip and custom system are carried out both sides' authentication, and safety chip just outwards transmits corresponding encrypted message for the user with the form of ciphertext after authentication is passed through.
Described step 2 comprises: step 2.1, custom system send to Safety mouse and get the random number instruction, include a plurality of keys in this Safety mouse, and custom system is specified a key wherein; After step 2.2, Safety mouse receive and get the random number instruction, with the key of appointment data are encrypted, after to be encrypted the finishing these data are sent; Step 2.3 after custom system receives data, draws an authenticate key according to information-setting by user and personal user's password, and to the data deciphering that encrypt inside, compare with the random number data of sending into, if consistent, then authentication is passed through, and confirms that this Safety mouse is legal.
In the described step 2.1, custom system is sent out to Safety mouse and is got random number instruction 02 82 YY XX XXXX XX XX XX XX XX, and XX is the random number that custom system generates, and specifies the YY key; In the step 2.2, after with the key of appointment data being encrypted, send the data of 03 YY YY YY YY YY YY YYYY 90 00, show and finish encryption; In the step 2.3, after custom system is received data, draw an authenticate key according to information-setting by user, be decrypted receiving data with this authenticate key, random data after the deciphering with compare with the random number data sent into, consistent then confirm that Safety mouse is legal.
Described step 3 comprises: step 3.1, system user send instruction, require random number that Safety mouse provides 8 bytes out; Step 3.2, system user draws an authenticate key according to information-setting by user and personal user's password, with this authenticate key above-mentioned random number is encrypted, and the random number after will encrypting sends to Safety mouse; With the data deciphering of corresponding key to receiving, if the random number data that decrypts is the above-mentioned random number of sending into, then authentication is passed through to inside for step 3.3, Safety mouse, confirms that this user is validated user.
In the described step 3.1, the user sends 02 84 00 00 08 random number instruction, and the random number that this command request Safety mouse provides 8 bytes out; In the step 3.2, the random number after encrypting is sent to Safety mouse, the instruction of this operation is 02 88 08 XX XX XX XX XX XX XX XX, the data after the XX representative is encrypted.
Described Safety mouse is stored in user's various passwords in the safety chip of this Safety mouse with the ciphertext form, custom system and Safety mouse must be through the code datas of mutual authentication ability user storage.
Can generate an authenticate key in the described mutual authentication process, this authenticate key generates by unique sequence number XOR of personal identification number and Safety mouse, and the length of sequence number is 16 bytes, and personal identification number participates in XOR in the mode of binary-coded decimal, 16 bytes of less than are then mended FF and are become 16 bytes.
Beneficial effect of the present invention: cipher management method of the present invention, it utilizes mouse to operate to realize the operation of Password Management, not only operation steps is simple, and safe, can realize very easily the password login of several functions window in the computing machine, such as the login of QQ, webpage mailbox, forum, normal game forms etc., prevent from being peeped, grabbing screen, monitoring, wooden horse, read keyboard input vestige etc. with emulator by the people.
In order further to understand feature of the present invention and technology contents, see also following about detailed description of the present invention and accompanying drawing, yet appended graphic only provide with reference to and the explanation usefulness, the present invention is limited.
Description of drawings
Below in conjunction with accompanying drawing, by the specific embodiment of the present invention is described in detail, will make technical scheme of the present invention and other beneficial effects apparent.
In the accompanying drawing,
Fig. 1 is the schematic flow sheet of cipher management method of the present invention.
Embodiment
Technological means and the effect thereof taked for further setting forth the present invention are described in detail below in conjunction with the preferred embodiments of the present invention and accompanying drawing thereof.
As shown in Figure 1, the invention provides a kind of cipher management method, it comprises:
Step 1: the user inputs personal identification number and enables Safety mouse, and system enters password and uses state.Safety mouse at first is subjected to the personal identification number protection, and that is to say if the user wants to enable Safety mouse needs to input personal identification number, and then system just can enter the use state of password, uses otherwise can only work as common mouse.Simultaneously, personal identification number is the part of user's used key when data are encrypted, and that is to say that personal identification number is used for generating the authenticate key to the verification process of Safety mouse simultaneously.
Step 2: system authenticates Safety mouse, to confirm that it is whether as the Safety mouse of system's approval.Safety mouse carries out the data storage with the ciphertext form, be provided with safety chip in this Safety mouse, Safety mouse is stored in user's various passwords in the safety chip of this Safety mouse with the ciphertext form, custom system and Safety mouse must be through the code datas of mutual authentication ability user storage, and the legitimacy of authentication authorization and accounting Safety mouse and the legitimacy of authenticated just outwards transmit corresponding encrypted message for the user with the form of ciphertext by rear safety chip.At first, system software can authenticate Safety mouse, to have prevented that illegal user from wanting to forge Safety mouse and illegally stealing subscriber authentication key, this verification process specifically comprises again: step 2.1, system sends instruction to Safety mouse, include a plurality of keys in this Safety mouse, system specifies a key wherein; Step 2.2 after Safety mouse receives instruction, is encrypted data with the key of appointment, after to be encrypted the finishing these data is sent; Step 2.3, after system receives data, draw an authenticate key according to information-setting by user (be stored in after this information encryption on the hard disk of computing machine and and the personal identification number of Safety mouse mutually calculate), and the data deciphering that inside is encrypted, compare with the data of sending into, if unanimously then authentication is passed through, confirm that this Safety mouse is legal.As one embodiment of the invention, in step 2.1, custom system is sent out to Safety mouse and is got random number instruction 0282YY XX XX XX XX XX XX XX XX, and XX is the random number that system generates, and specifies the YY key; In the step 2.2, after with the key of appointment data being encrypted, send the data of 03 YY YY YY YY YYYY YY YY 90 00, show and finish encryption.
Step 3: Safety mouse authenticates system user, to confirm that whether this system user is as validated user.Safety mouse in step 2 is confirmed to be legal, can carry out secured session, but this moment, and Safety mouse also can be to system software, system user is carried out an authentication in namely carry out step 3, to guarantee its security.This step 3 specifically comprises: step 3.1, system user send instruction, to require random number that Safety mouse provides 8 bytes out; Step 3.2, system user draws an authenticate key according to information-setting by user, with this authenticate key above-mentioned random number is encrypted, and the random number after will encrypting sends to Safety mouse; Step 3.3, Safety mouse are to the corresponding secret key decryption in inside, if the data of deciphering are the above-mentioned random number of sending into, then authentication is passed through, and confirm that this user is validated user.As one embodiment of the invention, in step 3.1, the user sends 02 84 00 00 08 instruction, and the random number that this command request Safety mouse provides 8 bytes out; In the step 3.2, the random number after encrypting is sent to Safety mouse, the instruction of this operation is 02 88 08 XX XX XX XX XX XX XX XX, the data after the XX representative is encrypted.
Step 4: after the authentication in the step 2,3 was all passed through, Safety mouse outwards transmitted corresponding encrypted message for the user with the form of ciphertext; When if authentication error surpasses a certain preset times continuously, then Safety mouse self-locking, the user can't authenticate again.Above-mentioned verification process is not reproducible, if authentication error surpasses certain number of times continuously, and the then safety chip self-locking in the Safety mouse, the user can't authenticate again.In embodiments of the present invention, we can arrange when authentication error surpasses 8 times continuously, then safety chip self-locking.
In the present invention, in the mutual authentication process of custom system and Safety mouse, all can generate an authenticate key, the generation of this authenticate key is the most important and effective process in this system.This authenticate key generates by unique sequence number XOR of personal identification number and Safety mouse, the length of sequence number is 16 bytes, personal identification number participates in XOR in the mode of binary-coded decimal, 16 bytes of less than, then mend FF and become 16 bytes, so suggestion user PIN code length satisfies 8 numerals or alphabetical with safe enough, each Safety mouse has a unique sequence number, be used for identification and as the seed of safe key, be replicated preventing.
Cipher management method of the present invention can be used for the user login information storage, user's login, prevent from being peeped by the people, grab screen, wooden horse, read keyboard input vestige etc. with emulator, its running state of a process is identified in the computer task bar icon, choose this icon can carry out the password editor, need to verify first the electron key password, need to insert the Special electronic key checking by after can carry out following operation: after the password checking is passed through, configuration interface Password Management instrument will appear, if be configured for the first time, then need the manual setting of user oneself, during each correct verification electron key password login interface, whether there has been the entry that had before had in the detected electrons key of capital, if any then can automatically loading relevant information.Further, in configuration interface, can also increase, the operation such as deletion, amendment record, when revising existing record, at first select important change record, then clicking change button relevant information can be added in the following text box by automatic powder adding, this moment, the user just can carry out information change in the text box below, and changing needs to click confirming button after good information is joined in the top information recording/clauses and subclauses.The recorded information storage mode is divided into electronics spoon key and file dual mode: click save button and checking electron key password dialog frame will occur, input electron key password authentication will be stored in user's the electron key by rear recorded information.In addition, also have backup in the configuration interface and recover OptionButton, backup and recovery button are for file operation, backup functionality is that recorded information is deposited in the designated disk file, the file layout that generates is the DAT file, and restore funcitons is that the information in the file of specified format is returned in the current information storage forms.Click the backup button and preserve after file is preserved input is wanted in the filename hurdle of dialog box filename such as tenyi, input file protection password next is so that use when file recovers.
In sum, cipher management method of the present invention, it utilizes mouse to operate to realize the operation of Password Management, not only operation steps is simple, and safe, can realize very easily the password login of several functions window in the computing machine, such as the login of QQ, webpage mailbox, forum, normal game forms etc., prevent from being peeped, grabbing screen, monitoring, wooden horse, read keyboard input vestige etc. with emulator by the people.
The above; for the person of ordinary skill of the art; can make other various corresponding changes and distortion according to technical scheme of the present invention and technical conceive, and all these changes and distortion all should belong to the protection domain of the accompanying claim of the present invention.