CN101840478B - Password management method - Google Patents

Password management method Download PDF

Info

Publication number
CN101840478B
CN101840478B CN2010101351083A CN201010135108A CN101840478B CN 101840478 B CN101840478 B CN 101840478B CN 2010101351083 A CN2010101351083 A CN 2010101351083A CN 201010135108 A CN201010135108 A CN 201010135108A CN 101840478 B CN101840478 B CN 101840478B
Authority
CN
China
Prior art keywords
user
safety
mouse
data
safety mouse
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2010101351083A
Other languages
Chinese (zh)
Other versions
CN101840478A (en
Inventor
孙永战
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN DECARD SMARTCARD TECH CO., LTD.
Original Assignee
SHENZHEN DECARD TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN DECARD TECHNOLOGY Co Ltd filed Critical SHENZHEN DECARD TECHNOLOGY Co Ltd
Priority to CN2010101351083A priority Critical patent/CN101840478B/en
Publication of CN101840478A publication Critical patent/CN101840478A/en
Application granted granted Critical
Publication of CN101840478B publication Critical patent/CN101840478B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a password management method, comprising the following steps: 1, a user inputs a private password to enable a safety mouse, then a system enters a password using mode; 2, the system certificates the safety mouse to confirm whether the safety mouse is approved by the system; 3, the safety mouse certificates the system user to confirm whether system user is legal; and 4, when the certification in step 2 and step 3 both pass, the safety mouse sends corresponding password information outwards in the form of ciphertext to provide for the use of the user, if the number of certification failure excesses a preset number of times continuously, the safety mouse locks by the self, thus the user can not be certificated once again. The password management method of the invention utilizes a mouse to operate to realize password management operation, has simple operation step and high safety, and can conveniently realize password login of various functional windows in the computer.

Description

Cipher management method
Technical field
The present invention relates in particular to a kind of cipher management method based on mouse action about a kind of cipher management method.
Background technology
Computing machine is modern people indispensable electronic products in life, and mouse almost is one of essential input media of present computing machine.In computer operation, computing machine is often processed some important secret data, for example related data in individual's research report, storehouse user data and the e-bank etc.To this, computing machine just develops a variety of privacy mechanism and is not stolen with the data of protecting need to be keep secret.
Moreover along with prevailing of in recent years ecommerce, the trade deal on the network has become current popular a kind of method of commerce, also is with the risk of serving in the transaction thereupon.In order to improve the security of transaction, people have to guarantee the safety of concluding the business by some safety practices, the input of password is wherein a kind of, but this is not to be exactly a stifled airtight wall, catches keyboard by wooden horse software and some hack tool software and inputs namely easily stealing passwords.
Dependence to mouse when using computing machine along with people is more and more higher; how by the necessary input media of computing machine, i.e. mouse, and reach more perfect privacy mechanism; so that the operation of cryptoguard is more simple, it is convenient to use, be a problem that is worth thinking simultaneously.
Summary of the invention
The object of the invention is to, a kind of cipher management method is provided, it utilizes mouse to operate to realize the operation of Password Management, and not only operation steps is simple, and safe, can realize very easily the login of several functions window in the computing machine.
To achieve these goals, the invention provides a kind of cipher management method, may further comprise the steps:
Step 1: the user inputs personal identification number and enables Safety mouse, and system enters password and uses state;
Step 2: system authenticates Safety mouse, to confirm that it is whether as the Safety mouse of system's approval;
Step 3: Safety mouse authenticates system user, to confirm that whether this system user is as validated user;
Step 4: after the authentication in the step 2,3 was all passed through, Safety mouse outwards transmitted corresponding encrypted message for the user with the form of ciphertext; When if authentication error surpasses a certain preset times continuously, then Safety mouse self-locking, the user can't authenticate again.
Described Safety mouse carries out the data storage with the ciphertext form, be provided with safety chip in this Safety mouse, the corresponding code data of access all needs this safety chip and custom system are carried out both sides' authentication, and safety chip just outwards transmits corresponding encrypted message for the user with the form of ciphertext after authentication is passed through.
Described step 2 comprises: step 2.1, custom system send to Safety mouse and get the random number instruction, include a plurality of keys in this Safety mouse, and custom system is specified a key wherein; After step 2.2, Safety mouse receive and get the random number instruction, with the key of appointment data are encrypted, after to be encrypted the finishing these data are sent; Step 2.3 after custom system receives data, draws an authenticate key according to information-setting by user and personal user's password, and to the data deciphering that encrypt inside, compare with the random number data of sending into, if consistent, then authentication is passed through, and confirms that this Safety mouse is legal.
In the described step 2.1, custom system is sent out to Safety mouse and is got random number instruction 02 82 YY XX XXXX XX XX XX XX XX, and XX is the random number that custom system generates, and specifies the YY key; In the step 2.2, after with the key of appointment data being encrypted, send the data of 03 YY YY YY YY YY YY YYYY 90 00, show and finish encryption; In the step 2.3, after custom system is received data, draw an authenticate key according to information-setting by user, be decrypted receiving data with this authenticate key, random data after the deciphering with compare with the random number data sent into, consistent then confirm that Safety mouse is legal.
Described step 3 comprises: step 3.1, system user send instruction, require random number that Safety mouse provides 8 bytes out; Step 3.2, system user draws an authenticate key according to information-setting by user and personal user's password, with this authenticate key above-mentioned random number is encrypted, and the random number after will encrypting sends to Safety mouse; With the data deciphering of corresponding key to receiving, if the random number data that decrypts is the above-mentioned random number of sending into, then authentication is passed through to inside for step 3.3, Safety mouse, confirms that this user is validated user.
In the described step 3.1, the user sends 02 84 00 00 08 random number instruction, and the random number that this command request Safety mouse provides 8 bytes out; In the step 3.2, the random number after encrypting is sent to Safety mouse, the instruction of this operation is 02 88 08 XX XX XX XX XX XX XX XX, the data after the XX representative is encrypted.
Described Safety mouse is stored in user's various passwords in the safety chip of this Safety mouse with the ciphertext form, custom system and Safety mouse must be through the code datas of mutual authentication ability user storage.
Can generate an authenticate key in the described mutual authentication process, this authenticate key generates by unique sequence number XOR of personal identification number and Safety mouse, and the length of sequence number is 16 bytes, and personal identification number participates in XOR in the mode of binary-coded decimal, 16 bytes of less than are then mended FF and are become 16 bytes.
Beneficial effect of the present invention: cipher management method of the present invention, it utilizes mouse to operate to realize the operation of Password Management, not only operation steps is simple, and safe, can realize very easily the password login of several functions window in the computing machine, such as the login of QQ, webpage mailbox, forum, normal game forms etc., prevent from being peeped, grabbing screen, monitoring, wooden horse, read keyboard input vestige etc. with emulator by the people.
In order further to understand feature of the present invention and technology contents, see also following about detailed description of the present invention and accompanying drawing, yet appended graphic only provide with reference to and the explanation usefulness, the present invention is limited.
Description of drawings
Below in conjunction with accompanying drawing, by the specific embodiment of the present invention is described in detail, will make technical scheme of the present invention and other beneficial effects apparent.
In the accompanying drawing,
Fig. 1 is the schematic flow sheet of cipher management method of the present invention.
Embodiment
Technological means and the effect thereof taked for further setting forth the present invention are described in detail below in conjunction with the preferred embodiments of the present invention and accompanying drawing thereof.
As shown in Figure 1, the invention provides a kind of cipher management method, it comprises:
Step 1: the user inputs personal identification number and enables Safety mouse, and system enters password and uses state.Safety mouse at first is subjected to the personal identification number protection, and that is to say if the user wants to enable Safety mouse needs to input personal identification number, and then system just can enter the use state of password, uses otherwise can only work as common mouse.Simultaneously, personal identification number is the part of user's used key when data are encrypted, and that is to say that personal identification number is used for generating the authenticate key to the verification process of Safety mouse simultaneously.
Step 2: system authenticates Safety mouse, to confirm that it is whether as the Safety mouse of system's approval.Safety mouse carries out the data storage with the ciphertext form, be provided with safety chip in this Safety mouse, Safety mouse is stored in user's various passwords in the safety chip of this Safety mouse with the ciphertext form, custom system and Safety mouse must be through the code datas of mutual authentication ability user storage, and the legitimacy of authentication authorization and accounting Safety mouse and the legitimacy of authenticated just outwards transmit corresponding encrypted message for the user with the form of ciphertext by rear safety chip.At first, system software can authenticate Safety mouse, to have prevented that illegal user from wanting to forge Safety mouse and illegally stealing subscriber authentication key, this verification process specifically comprises again: step 2.1, system sends instruction to Safety mouse, include a plurality of keys in this Safety mouse, system specifies a key wherein; Step 2.2 after Safety mouse receives instruction, is encrypted data with the key of appointment, after to be encrypted the finishing these data is sent; Step 2.3, after system receives data, draw an authenticate key according to information-setting by user (be stored in after this information encryption on the hard disk of computing machine and and the personal identification number of Safety mouse mutually calculate), and the data deciphering that inside is encrypted, compare with the data of sending into, if unanimously then authentication is passed through, confirm that this Safety mouse is legal.As one embodiment of the invention, in step 2.1, custom system is sent out to Safety mouse and is got random number instruction 0282YY XX XX XX XX XX XX XX XX, and XX is the random number that system generates, and specifies the YY key; In the step 2.2, after with the key of appointment data being encrypted, send the data of 03 YY YY YY YY YYYY YY YY 90 00, show and finish encryption.
Step 3: Safety mouse authenticates system user, to confirm that whether this system user is as validated user.Safety mouse in step 2 is confirmed to be legal, can carry out secured session, but this moment, and Safety mouse also can be to system software, system user is carried out an authentication in namely carry out step 3, to guarantee its security.This step 3 specifically comprises: step 3.1, system user send instruction, to require random number that Safety mouse provides 8 bytes out; Step 3.2, system user draws an authenticate key according to information-setting by user, with this authenticate key above-mentioned random number is encrypted, and the random number after will encrypting sends to Safety mouse; Step 3.3, Safety mouse are to the corresponding secret key decryption in inside, if the data of deciphering are the above-mentioned random number of sending into, then authentication is passed through, and confirm that this user is validated user.As one embodiment of the invention, in step 3.1, the user sends 02 84 00 00 08 instruction, and the random number that this command request Safety mouse provides 8 bytes out; In the step 3.2, the random number after encrypting is sent to Safety mouse, the instruction of this operation is 02 88 08 XX XX XX XX XX XX XX XX, the data after the XX representative is encrypted.
Step 4: after the authentication in the step 2,3 was all passed through, Safety mouse outwards transmitted corresponding encrypted message for the user with the form of ciphertext; When if authentication error surpasses a certain preset times continuously, then Safety mouse self-locking, the user can't authenticate again.Above-mentioned verification process is not reproducible, if authentication error surpasses certain number of times continuously, and the then safety chip self-locking in the Safety mouse, the user can't authenticate again.In embodiments of the present invention, we can arrange when authentication error surpasses 8 times continuously, then safety chip self-locking.
In the present invention, in the mutual authentication process of custom system and Safety mouse, all can generate an authenticate key, the generation of this authenticate key is the most important and effective process in this system.This authenticate key generates by unique sequence number XOR of personal identification number and Safety mouse, the length of sequence number is 16 bytes, personal identification number participates in XOR in the mode of binary-coded decimal, 16 bytes of less than, then mend FF and become 16 bytes, so suggestion user PIN code length satisfies 8 numerals or alphabetical with safe enough, each Safety mouse has a unique sequence number, be used for identification and as the seed of safe key, be replicated preventing.
Cipher management method of the present invention can be used for the user login information storage, user's login, prevent from being peeped by the people, grab screen, wooden horse, read keyboard input vestige etc. with emulator, its running state of a process is identified in the computer task bar icon, choose this icon can carry out the password editor, need to verify first the electron key password, need to insert the Special electronic key checking by after can carry out following operation: after the password checking is passed through, configuration interface Password Management instrument will appear, if be configured for the first time, then need the manual setting of user oneself, during each correct verification electron key password login interface, whether there has been the entry that had before had in the detected electrons key of capital, if any then can automatically loading relevant information.Further, in configuration interface, can also increase, the operation such as deletion, amendment record, when revising existing record, at first select important change record, then clicking change button relevant information can be added in the following text box by automatic powder adding, this moment, the user just can carry out information change in the text box below, and changing needs to click confirming button after good information is joined in the top information recording/clauses and subclauses.The recorded information storage mode is divided into electronics spoon key and file dual mode: click save button and checking electron key password dialog frame will occur, input electron key password authentication will be stored in user's the electron key by rear recorded information.In addition, also have backup in the configuration interface and recover OptionButton, backup and recovery button are for file operation, backup functionality is that recorded information is deposited in the designated disk file, the file layout that generates is the DAT file, and restore funcitons is that the information in the file of specified format is returned in the current information storage forms.Click the backup button and preserve after file is preserved input is wanted in the filename hurdle of dialog box filename such as tenyi, input file protection password next is so that use when file recovers.
In sum, cipher management method of the present invention, it utilizes mouse to operate to realize the operation of Password Management, not only operation steps is simple, and safe, can realize very easily the password login of several functions window in the computing machine, such as the login of QQ, webpage mailbox, forum, normal game forms etc., prevent from being peeped, grabbing screen, monitoring, wooden horse, read keyboard input vestige etc. with emulator by the people.
The above; for the person of ordinary skill of the art; can make other various corresponding changes and distortion according to technical scheme of the present invention and technical conceive, and all these changes and distortion all should belong to the protection domain of the accompanying claim of the present invention.

Claims (6)

1. a cipher management method is characterized in that, may further comprise the steps:
Step 1: the user inputs personal identification number and enables Safety mouse, and system enters password and uses state;
Step 2: system authenticates Safety mouse, to confirm that it is whether as the Safety mouse of system's approval;
Step 3: Safety mouse authenticates system user, to confirm that whether this system user is as validated user;
Step 4: after the authentication in the step 2,3 was all passed through, Safety mouse outwards transmitted corresponding encrypted message for the user with the form of ciphertext; When if authentication error surpasses a certain preset times continuously, then Safety mouse self-locking, the user can't authenticate again;
Described Safety mouse carries out the data storage with the ciphertext form, be provided with safety chip in this Safety mouse, the corresponding code data of access all needs this safety chip and custom system are carried out both sides' authentication, and safety chip just outwards transmits corresponding encrypted message for the user with the form of ciphertext after authentication is passed through;
Described Safety mouse is stored in user's various passwords in the safety chip of this Safety mouse with the ciphertext form, custom system and Safety mouse must be through the code datas of mutual authentication ability user storage.
2. cipher management method as claimed in claim 1 is characterized in that, described step 2 comprises: step 2.1, custom system send to Safety mouse and get the random number instruction, include a plurality of keys in this Safety mouse, and custom system is specified a key wherein; After step 2.2, Safety mouse receive and get the random number instruction, with the key of appointment data are encrypted, after to be encrypted the finishing these data are sent; Step 2.3 after custom system receives data, draws an authenticate key according to information-setting by user and personal user's password, and to the data deciphering that encrypt inside, compare with the random number data of sending into, if consistent, then authentication is passed through, and confirms that this Safety mouse is legal.
3. cipher management method as claimed in claim 2 is characterized in that, in the described step 2.1, custom system is sent out to Safety mouse and got random number instruction 0282YY XX XX XX XX XX XX XX XX, and XX is the random number that custom system generates, and specifies the YY key; In the step 2.2, after with the key of appointment data being encrypted, send the data of 03YY YY YY YY YY YY YY YY90 00, show and finish encryption; In the step 2.3, after custom system is received data, draw an authenticate key according to information-setting by user, be decrypted receiving data with this authenticate key, random data after the deciphering with compare with the random number data sent into, consistent then confirm that Safety mouse is legal.
4. cipher management method as claimed in claim 1 is characterized in that, described step 3 comprises: step 3.1, system user send instruction, require random number that Safety mouse provides 8 bytes out; Step 3.2, system user draws an authenticate key according to information-setting by user and personal user's password, with this authenticate key above-mentioned random number is encrypted, and the random number after will encrypting sends to Safety mouse; With the data deciphering of corresponding key to receiving, if the random number data that decrypts is the above-mentioned random number of sending into, then authentication is passed through to inside for step 3.3, Safety mouse, confirms that this user is validated user.
5. cipher management method as claimed in claim 4 is characterized in that, in the described step 3.1, the user sends 02 84 00 00 08 random number instruction, and the random number that this command request Safety mouse provides 8 bytes out; In the step 3.2, the random number after encrypting is sent to Safety mouse, the instruction of this operation is 02 88 08XX XX XX XX XX XX XX XX, the data after the XX representative is encrypted.
6. cipher management method as claimed in claim 1, it is characterized in that, can generate an authenticate key in the described mutual authentication process, this authenticate key generates by unique sequence number XOR of personal identification number and Safety mouse, the length of sequence number is 16 bytes, personal identification number participates in XOR in the mode of binary-coded decimal, and 16 bytes of less than are then mended FF and become 16 bytes.
CN2010101351083A 2010-03-24 2010-03-24 Password management method Active CN101840478B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101351083A CN101840478B (en) 2010-03-24 2010-03-24 Password management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101351083A CN101840478B (en) 2010-03-24 2010-03-24 Password management method

Publications (2)

Publication Number Publication Date
CN101840478A CN101840478A (en) 2010-09-22
CN101840478B true CN101840478B (en) 2013-02-27

Family

ID=42743844

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101351083A Active CN101840478B (en) 2010-03-24 2010-03-24 Password management method

Country Status (1)

Country Link
CN (1) CN101840478B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102332066B (en) * 2011-05-31 2014-09-24 贾松仁 Authentication management system and method of code jumping chip identification codes
CN102255727B (en) * 2011-06-23 2015-03-25 中国电力科学研究院 Improved anti-attacking intelligent card authentication method based on user defined algorithm environment
US9311473B2 (en) * 2014-02-28 2016-04-12 Ncr Corporation Unattended secure device authorization
CN105357181B (en) * 2015-09-29 2018-06-12 广东顺德中山大学卡内基梅隆大学国际联合研究院 A kind of method of multiple terminals monitoring Wi-Fi labels
CN106992979A (en) * 2017-03-29 2017-07-28 昆明飞利泰电子系统工程有限公司 The key acquisition method and system of video monitoring equipment
CN107040534B (en) * 2017-04-05 2019-09-03 南京优尼科软件有限公司 A kind of communication encrypting method and system
CN109977640B (en) * 2019-02-21 2020-12-25 兴业数字金融服务(上海)股份有限公司 Method and device for recovering, keeping and using admin password
CN111695167B (en) * 2019-03-15 2023-07-07 致伸科技股份有限公司 Wireless mouse device and information transmission method thereof

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1450454A (en) * 2003-05-21 2003-10-22 上海信安信息技术发展股份有限公司 Personal cipher management method for computer user

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080201768A1 (en) * 2005-07-08 2008-08-21 Hong-Sik Koo Method For Managing A Large Number Of Passwords, Portable Apparatus And Certification Information Storing Device Using The Same, And Certification Information Management Method Using The Same

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1450454A (en) * 2003-05-21 2003-10-22 上海信安信息技术发展股份有限公司 Personal cipher management method for computer user

Also Published As

Publication number Publication date
CN101840478A (en) 2010-09-22

Similar Documents

Publication Publication Date Title
CN101840478B (en) Password management method
JP4764639B2 (en) File encryption / decryption program, program storage medium
JP6046829B2 (en) Screen unlocking method, apparatus, terminal, program, and recording medium
CN100495421C (en) Authentication protection method based on USB device
CN102508791B (en) Method and device for encrypting hard disk partition
JP6572461B1 (en) Data management system and data management method
CN109412812B (en) Data security processing system, method, device and storage medium
CN101494541B (en) System and method for implementing security protection of PIN code
CN105740725B (en) A kind of document protection method and system
CN104537300A (en) Safe password setting and verifying mode
JP2008269610A (en) Protecting sensitive data intended for remote application
CN102831346B (en) A kind of file protecting system carries out the method for file encryption-decryption
CN103560892A (en) Secret key generation method and secret key generation device
US20110055586A1 (en) Secure PIN Character Retrieval and Setting Using PIN Offset Masking
CN102075327A (en) Method, device and system for unlocking electronic key
CN107864124A (en) A kind of end message method for security protection, terminal and bluetooth lock
CN104333545A (en) Method for encrypting cloud storage file data
CN107332666A (en) Terminal document encryption method
JP6231504B2 (en) Method, apparatus and mobile terminal for information security management of mobile terminal
US7412603B2 (en) Methods and systems for enabling secure storage of sensitive data
CN104408363A (en) Safe password system
CN104333452A (en) Multi-account encryption method for file data
CN200993803Y (en) Internet banking system safety terminal
CN102902903B (en) A kind of ecommerce intelligent code key with button and its implementation
CN104363093A (en) Method for encrypting file data by dynamic authorization code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
DD01 Delivery of document by public notice

Addressee: Cheng Qin

Document name: Notification of Passing Preliminary Examination of the Application for Invention

DD01 Delivery of document by public notice

Addressee: Cheng Qin

Document name: Notification of Publication of the Application for Invention

C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee

Owner name: SHENZHEN DECARD SMARTCARD TECHNOLOGY CO., LTD.

Free format text: FORMER NAME: SHENZHEN DECARD TECHNOLOGY CO., LTD.

CP01 Change in the name or title of a patent holder

Address after: 518055 Guangdong Province, Nanshan District Shenzhen tea light Lu Wenguang Village Industrial Zone 17 building 4 floor

Patentee after: SHENZHEN DECARD SMARTCARD TECH CO., LTD.

Address before: 518055 Guangdong Province, Nanshan District Shenzhen tea light Lu Wenguang Village Industrial Zone 17 building 4 floor

Patentee before: Shenzhen Decard Technology Co., Ltd.