CN103391195B - A kind of method of work of dynamic token - Google Patents

A kind of method of work of dynamic token Download PDF

Info

Publication number
CN103391195B
CN103391195B CN201310270520.XA CN201310270520A CN103391195B CN 103391195 B CN103391195 B CN 103391195B CN 201310270520 A CN201310270520 A CN 201310270520A CN 103391195 B CN103391195 B CN 103391195B
Authority
CN
China
Prior art keywords
state
system mode
input
password
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310270520.XA
Other languages
Chinese (zh)
Other versions
CN103391195A (en
Inventor
陆舟
于华章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Feitian Technologies Co Ltd
Original Assignee
Feitian Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Feitian Technologies Co Ltd filed Critical Feitian Technologies Co Ltd
Priority to CN201310270520.XA priority Critical patent/CN103391195B/en
Publication of CN103391195A publication Critical patent/CN103391195A/en
Application granted granted Critical
Publication of CN103391195B publication Critical patent/CN103391195B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention discloses a kind of method of work of dynamic token, relates to information security field, comprises and judges to wake type up when dynamic token is waken up, as then system mode being set to corresponding state according to the type of the key that is pressed for key wakeup; As waken up for other, judging the type of system mode, as then generated entry password and export according to key and current time for producing entry password state, system mode being set to display entry password state, input data length is set to initial value; As then generated the first password and export according to the first information of key, current time and input for process first information state, system mode is set to display first writ state, input data length is set to initial value, as then processed the second information of input for process second information state, generate the second password according to result, key and current time and export, system mode is set to display second password state, input data length is set to initial value.

Description

A kind of method of work of dynamic token
Technical field
The present invention relates to information security field, particularly relate to a kind of method of work of dynamic token.
Background technology
Dynamic token is used to the terminal generating dynamic password, and dynamic password can confirm the legal identity of user, thus ensures the fail safe that customer service is accessed on the basis that user logs in legal identity.Dynamic password authentication technology is considered at present can the most effective one of mode solving authenticating user identification, thus is widely used in the various information system scenarios such as bank, security, Third-party payment, large enterprises are inner.In prior art, as long as logged in various information system scenarios by dynamic password, just can operate all items in this information system scene, have malicious person to take advantage of user and just can not carry out illegal operation to this information system scene, application security is lower.
Summary of the invention
The object of the invention is, in order to overcome the deficiencies in the prior art, to provide a kind of method of work of dynamic token, log-on message system scenarios can be improved and proceed operate fail safe.
The invention provides a kind of method of work of dynamic token, comprising:
Step S1: dynamic token powers on, carries out initialization;
Step S2: dynamic token opens keys interrupt, and token state is set to resting state;
When dynamic token is waken up, perform step S3;
Step S3: determine whether key wakeup, is, performs step S4, otherwise performs step S14;
Step S4: close keys interrupt;
Step S5: scanning button obtains key assignments and the type of the key that is pressed according to key assignments judgement, as then performed step S6 for acknowledgement key, as then performed step S9 for numerical key, as then performed step S12 for login button; As then performed step S13 for payment key;
Step S6: the type judging system mode, as then performed step S7, as then performed step S8 for input second information state for input first information state;
Step S7: system mode is set to process first information state, performs step S14;
Step S8: system mode is set to process second information state, performs step S14;
Step S9: the type judging system mode, as then performed step S10 for first kind state, as then system mode being set to holding state for Equations of The Second Kind state, performs step S14; Described first kind state is that holding state or start shooting input cryptographic state or amendment input cryptographic state or first time input new password state or second time input new password state or input active coding state or input first information state or input the second information state or input PUK state; Described Equations of The Second Kind state is for display entry password state or display first writ state or show the second password state;
Step S10: be deposited in data buffer area by numerical order corresponding for numerical key, upgrades input data length according to the first presetting method, performs step S11;
Step S11: judge whether system mode is holding state, is, is set to input first information state, performs step S14 by system mode; Otherwise execution corresponding operating;
Step S12: judge whether system mode is the 3rd class state, is, is set to system mode and produces entry password state, performs step S14; Otherwise execution corresponding operating; Described 3rd class state is display first writ state or display the second password state;
Step S13: judge whether system mode is holding state, is, system mode is set to input second information state, performs step S14, otherwise performs corresponding operating;
Step S14: the type judging system mode, as system mode then performs step S15 for producing entry password state, as system mode for process first information state then performs step S16, if system mode is that process second information state then performs step S17; If system mode is that the 4th class state then returns step S2; Described 4th class state is holding state or input first information state or inputs the second information state;
Step S15: the current time according to key and dynamic token generates entry password and exports, is set to display entry password state, input data length is set to initial value, returns step S2 by system mode;
Step S16: generate the first password according to the current time of key, dynamic token and the first information of input and export, is set to display first writ state, input data length is set to initial value, returns step S2 by system mode;
Step S17: the second information of input is processed, generates the second password according to the current time of result, key and dynamic token and export, system mode being set to display second password state, input data length being set to initial value, returning step S2.
Further, in described step S3, determine whether that key wakeup is specially: judge the whether set of key wakeup mark, be then key wakeup, otherwise be not key wakeup.
Further, scan in described step S5 button obtain key assignments and according to key assignments judge to be pressed key type between comprise:
Steps A 0: judge that whether the key that is pressed is numerical key or decimal key or function key, be that the initial value of automatic shutdown timer is set to automatic shutdown time, perform steps A 1, otherwise perform step S14; Described function key comprises ON/OFF switch, acknowledgement key, delete key, login button and payment key;
Steps A 1: judge current processing status, as then performed steps A 2 for the first treatment state, as then performed steps A 3 for the second treatment state, as then performed steps A 4 for the 3rd treatment state, as then continued for other;
Steps A 2: system mode is set to first time input new password state, performs step S14;
Steps A 3: system mode is set to start input cryptographic state, performs step S14;
Steps A 4: system mode is set to amendment input cryptographic state, performs step S14.
Further, when system mode is new password error condition and the push-button type be pressed is not ON/OFF switch, current processing status is described first treatment state; When system mode is startup password error condition and the type of the button be pressed is not ON/OFF switch, current processing status is described second treatment state; When system mode is Modify password error condition and the type of the button be pressed is not ON/OFF switch, current processing status is described 3rd treatment state.
Further, described step S14 also comprises:
As inputted new password state or start input cryptographic state for first time or revising input cryptographic state, then return step S2.
Further, described step S5 also comprises: the type as the key that is pressed is that ON/OFF switch then performs step B1;
Step B1: judge whether dynamic token inside stores seed, is, performs step B2, otherwise carry out display screen self-inspection and system mode is set to off-mode, performs step S14;
Step B2: judge whether system mode is off-mode, is perform step B3, otherwise system mode is set to is switched to off-mode, perform step S14;
Step B3: judge whether the time that button is pressed exceedes preset duration, is empty data buffer area, initialization display screen, performs step B4, otherwise performs step S14;
Step B4: judge whether token status is self-destruction, is, system mode is set to token and scraps state, performs step S14, otherwise performs step B5;
Step B5: judge whether token status is activate, and is perform step B6, otherwise system mode is set to input active coding state, perform step S14;
Step B6: judge whether token status is locked, is, is set to input PUK state, performs step S14, otherwise perform step B7 by system mode;
Step B7: judge whether dynamic token arranged password, was, is set to start input cryptographic state, performs step S14 by system mode; Otherwise system mode is set to first time input new password state, performs step S14.
Further, in described step B4, judge whether token status is that self-destruction is specially: judging the whether set of self-destruction mark, be that token status is self-destruction, otherwise token status is normal;
Judge in described step B5 whether token status is activated to be specially: judging activation marker whether set, is that token status is for activate, otherwise token status is un-activation.
Further, described step S14 also comprises:
As for off-mode or input active coding state input PUK state or token scrap state, then return step S2;
As then system mode being set to off-mode for being switched to off-mode, closing display screen, returning step S2.
Further, described step S5 also comprises: the type as the key that is pressed is that decimal key then performs step P1,
Step P1: judge whether system mode is the 5th class state, is perform step P2, otherwise perform step S14; Described 5th class state is test mode or holding state or input first information state or inputs the second information state;
Step P2: be deposited in data buffer area by decimal point order, upgrades input data length according to described first presetting method, performs step P3;
Step P3: judge whether system mode is holding state, is, is set to input first information state, performs step S14, otherwise perform step S14 by system mode.
Further, the initial value of described input data length is 0; Describedly upgrade input data length according to described first presetting method and be specially: input data length is from adding 1.
Further, described step S14 also comprises: as being input first information state, then return step S2.
Further, described step S5 also comprises: the type as the key that is pressed is that delete key then performs step Q1,
Step Q1: judge whether input data length is initial value, is perform step Q2, otherwise perform step Q5;
Step Q2: judge whether system mode is input second information state or Equations of The Second Kind state, is that system mode is set to holding state, performs step S14, otherwise performs step Q3; Described Equations of The Second Kind state is for display entry password state or show first writ state or the second password state;
Step Q3: judge whether system mode is holding state, is perform step Q4, otherwise perform step S14;
Step Q4: judge whether the time that button is pressed exceedes preset duration, is, is set to amendment input cryptographic state, performs step S14, otherwise perform step S14 by system mode;
Step Q5: judge whether system mode is the 6th class state, is, to delete in data buffer area finally stored in data, upgrade input data length according to the second presetting method, perform step Q6, otherwise perform step Q8; Described 6th class state inputs new password state or second time input new password state or input active coding state or input first information state for start shooting input cryptographic state or amendment input cryptographic state or first time or inputs the second information state or input PUK state;
Step Q6: judge whether system mode is input first information state, is perform step Q7, otherwise performs step S14;
Step Q7: judge whether input data length is initial value, is that system mode is set to holding state, performs step S14, otherwise perform step S14;
Step Q8: judge whether system mode is key testing state, is point out failure information, performs step S14; Otherwise perform step S14.
Further, the initial value of described input data length is 0; Describedly upgrade input data length according to described first presetting method and be specially: input data length is from adding 1; Describedly upgrade input data length according to described second presetting method and be specially: input data length is from subtracting 1.
Further, described step S6 also comprises: as system mode for first time input new password state then performs step C1, as system mode for second time input new password state then performs step C2, as system mode for start input cryptographic state then performs step C3, if system mode is that key testing state then performs step C4; As then performed step S14 for other;
Step C1: judge whether input data length equals preset password length, is, is set to process first time input new password state, performs step S14, otherwise perform step S14 by system mode;
Step C2: judge whether input data length equals preset password length, is, is set to process second time input new password state, performs step S14, otherwise perform step S14 by system mode;
Step C3: judge whether input data length equals preset password length, is, is set to process startup password state, performs step S14, otherwise perform step S14 by system mode;
Step C4: prompting successful information, performs step S14.
Further, described step S14 also comprises:
If system mode is the 7th class state, then judge that whether the data in data buffer area are identical with the new password that the second time of preserving inputs, be perform step H1, otherwise perform step H3; Described 7th class state is process startup password state or process Modify password state;
Step H1: input code error number of times is set to initial value, automatic unlocking counter is set to automatic unlocking number of times, automatic unlocking timer is set to the automatic unlocking cycle, performs step H2;
Step H2: judge whether system mode is process startup password state, that system mode is set to holding state, input data length is set to initial value, perform step S14, otherwise system mode is set to first time input new password state, input data length is set to initial value, performs step S14;
Step H3: upgrade input code error number of times, the input error of prompting startup password, by display screen display input code error number of times, performs step H4;
Step H4: judge whether input code error number of times equals default number of retries, is perform step H5, otherwise performs step H6;
Step H5: it is locked for arranging token status, is set to input PUK state, input data length is set to initial value, returns step S2 by system mode;
Step H6: judge whether system mode is process startup password state, system mode is set to startup password error condition, input data length is set to initial value, return step S2, otherwise system mode is set to Modify password error condition, input data length is set to initial value, returns step S2.
Further, described step S9 also comprises: if system mode is for being off-mode, then judges whether dynamic token inside stores seed, be, system mode is set to test mode, perform step S14, otherwise directly perform step S14.
Further, the execution corresponding operating in described step S11 comprises: as system mode for input active coding state then performs step D1; As system mode for input PUK state then performs step D2; As system mode for amendment input cryptographic state then performs step D3; As system mode for first time input new password state then performs step D5; As system mode for second time input new password state then performs step D7; As then performed step S14 for other;
Step D1: judge whether input data length equals the first numerical value, is, is set to checking active coding state, performs step S14, otherwise perform step S14 by system mode;
Step D2: judge whether input data length equals second value, is, is set to process PUK state, performs step S14, otherwise perform step S14 by system mode;
Step D3: judge whether input data length equals preset password length, is perform step D4, otherwise perform step S14;
Step D4: judge whether dynamic token arranged password, was, is set to process Modify password state, performs step S14, otherwise perform step S14 by system mode;
Step D5: judge whether input data length equals preset password length, is perform step D6, otherwise perform step S14;
Step D6: judge whether dynamic token arranged password, was, is set to process first time input new password state, performs step S14, otherwise perform step S14 by system mode;
Step D7: judge whether input data length equals preset password length, is perform step D8, otherwise perform step S14;
Step D8: judge whether dynamic token arranged password, was, is set to process second time input new password state, performs step S14, otherwise perform step S14 by system mode.
Further, describedly judge whether dynamic token arranged password and be specially: judging cipher mark whether set, be that dynamic token arranged password, otherwise dynamic token did not arrange password.
Further, described step S14 also comprises:
Described 4th class state is for input first writ state or test mode or process Modify password state;
If system mode is checking active coding state, then judge whether the data in data buffer area are correct active coding, it is then more new key, token status is set for activate, prompting activates successfully, system mode is set to first time input new password state, input data length is set to initial value, returns step S2; Otherwise prompting activates unsuccessfully, system mode is set to input active coding state, input data length is set to initial value, returns step S2;
If system mode is process PUK state, then judge whether the data in data buffer area are correct PUK, point out and unlock successfully, arranging token status is non-locking, empty all passwords of preservation, system mode is set to first time input new password state, input code error number of times and input data length is all set to initial value, returns step S2; Otherwise prompting unlocks unsuccessfully, close display screen, system mode is set to off-mode, input data length is set to initial value, returns step S2;
If system mode is process first time input new password state, then the data of preserving in data buffer area are the new password of first time input, system mode are set to second time input new password state, input data length are set to initial value, return step S2;
If system mode is process second time input new password state, then judges that whether the data in data buffer zone are identical with the new password that the first time of preserving inputs, be perform step e 1, otherwise perform step e 2;
Step e 1: the data of preserving in data buffer area are the new password of second time input, points out new startup password to input correct, system mode is set to holding state, input data length is set to initial value, returns step S2;
Step e 2: point out new startup password input error, system mode is set to new password error condition, input data length is set to initial value, returns step S2.
Further, the described token status that arranges is specially for activating: by the set of activation mark; Arranging token status is that non-locking is specially: locking mark resetted.
Further, the initial value of described input code error number of times is 0; Described renewal input code error number of times is specially: input code error number of times is from adding 1.
Further, the execution corresponding operating in described step S12 comprises: if system mode is that test mode then exports the first character by display screen, performs step S14; As then performed step S14 for other.
Further, the execution corresponding operating in described step S13 comprises: if system mode is that test mode then exports the second character by display screen, performs step S14, as then performed step S14 for other.
Further, generate entry password in described step S15 to be specially: calculate entry password according to the current time of default login algorithm to key and dynamic token.
Further, generate the first password in described step S16 to be specially: calculate the first password according to default account algorithm to the current time of key, dynamic token, the first information of input and event factor.
Further, generate the second password in described step S17 to be specially: calculate the second password according to default payment algorithm to the current time of key, dynamic token, result and event factor.
The present invention compared with prior art, has the following advantages:
Dynamic token of the present invention can produce entry password, the first password and the second password three kinds of passwords, when log-on message system scenarios operates, first need by entry password identifying user identity, as operation will be proceeded to the first project in information system scene or the second project, input first password or the second password is then needed to verify, prevent malicious person's illegal operation, strengthen the application security of information system scene.
Accompanying drawing explanation
The method of work flow chart of the dynamic token that Fig. 1-Fig. 2 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those skilled in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Embodiments provide a kind of method of work of dynamic token, as Figure 1-Figure 2, comprising:
Step 101: dynamic token powers on, carries out initialization;
Initialization in the present embodiment comprises system clock setting, IO Initialize installation, RTC arrange and carry out initialization to input variable, system state variables, automatic shutdown variable etc.;
Step 102: open interruption, and token state is set to resting state;
Interruption in the present embodiment comprises keys interrupt and global interrupt;
When dynamic token is waken up, start to perform step 103;
Step 103: determine whether key wakeup, is, performs step 104, otherwise performs step 114;
Determine whether that key wakeup is specially: judge the whether set of key wakeup mark, be then key wakeup, otherwise be not key wakeup;
In the present embodiment, trigger as received button, then enter keys interrupt process, keys interrupt process comprises: by key wakeup flag set, exit keys interrupt;
Step 104: close keys interrupt;
In the present embodiment, also comprise in step 104 and the initial value of automatic shutdown timer is set to predetermined unused time value, opening timing device; The dynamic token automatic shutdown when the value of timer is 0;
Step 105: scanning button obtains key assignments and the type of the key that is pressed according to key assignments judgement, as then performed step 106 for acknowledgement key, as then performed step 109 for numerical key, as then performed step 112 for login button; As then performed step 113 for payment key;
Step 106: the type judging system mode, as then performed step 107, as then performed step 108 for input second information state for input first information state;
In the present embodiment, step 106 also comprises: as system mode for first time input new password state then performs step C1, as system mode for second time input new password state then performs step C2, as system mode for start input cryptographic state then performs step C3, if system mode is that key testing state then performs step C4; As then performed step 114 for other;
Step C1: judge whether input data length equals preset password length, is, is set to process first time input new password state, performs step 114, otherwise perform step 114 by system mode;
Step C2: judge whether input data length equals preset password length, is, is set to process second time input new password state, performs step 114, otherwise perform step 114 by system mode;
Step C3: judge whether input data length equals preset password length, is, is set to process startup password state, performs step 114, otherwise perform step 114 by system mode;
Step C4: prompting successful information, performs step 114;
Step 107: system mode is set to process first information state, performs step 114;
Step 108: system mode is set to process second information state, performs step 114;
Step 109: the type judging system mode, as then performed step 110 for first kind state, as then system mode being set to holding state for Equations of The Second Kind state, performs step 114;
Concrete, the first kind state in the present embodiment is that holding state or start shooting input cryptographic state or amendment input cryptographic state or first time input new password state or second time input new password state or input active coding state or input first information state or input the second information state or input PUK state;
Equations of The Second Kind state in the present embodiment is for display entry password state or display first writ state or show the second password state;
Described step 109 also comprises: as being off-mode for system mode, then judging whether dynamic token inside stores seed, is, directly performs step 114, otherwise system mode is set to test mode, performs step 114;
Step 110: be deposited in data buffer area by numerical order corresponding for numerical key, upgrades input data length according to the first presetting method, performs step 111;
Concrete, upgrade input data length according to the first presetting method in the present embodiment and be specially: input data length is from adding 1;
Step 111: judge whether system mode is holding state, is, is set to input first information state, performs step 114 by system mode; Otherwise execution corresponding operating;
In the present embodiment, the execution corresponding operating in this step 111 comprises: as system mode for input active coding state then performs step D1; As system mode for input PUK state then performs step D2; As system mode for amendment input cryptographic state then performs step D3; As system mode for first time input new password state then performs step D5; As system mode for second time input new password state then performs step D7; As then performed step 114 for other;
Step D1: judge whether input data length equals the first numerical value, is, is set to checking active coding state, performs step 114, otherwise perform step 114 by system mode;
Concrete, the first numerical value in the present embodiment is 12;
Step D2: judge whether input data length equals second value, is, is set to process PUK state, performs step 114, otherwise perform step 114 by system mode;
Concrete, the second value in the present embodiment is 8;
Step D3: judge whether input data length equals preset password length, is perform step D4, otherwise perform step 114;
Step D4: judge whether dynamic token arranged password, was, is set to process Modify password state, performs step 114, otherwise perform step 114 by system mode;
In the present embodiment, in step D4, judge whether dynamic token arranged password and be specially: judging cipher mark whether set, be that dynamic token arranged password, otherwise dynamic token did not arrange password;
Step D5: judge whether input data length equals preset password length, is perform step D6, otherwise perform step 114;
Step D6: judge whether dynamic token arranged password, was, is set to process first time input new password state, performs step 114, otherwise perform step 114 by system mode;
Step D7: judge whether input data length equals preset password length, is perform step D8, otherwise perform step 114;
Step D8: judge whether dynamic token arranged password, was, is set to process second time input new password state, performs step 114, otherwise perform step 114 by system mode;
In the present embodiment, in step D8, judge whether dynamic token arranged password and be specially: judging cipher mark whether set, be that dynamic token arranged password, otherwise dynamic token did not arrange password;
Step 112: judge whether system mode is the 3rd class state, is, is set to system mode and produces entry password state, performs step 114; Otherwise execution corresponding operating;
Concrete, the 3rd class state in the present embodiment is display account password state or display the second password state;
In the present embodiment, the execution corresponding operating in this step 112 comprises: if system mode is that test mode then exports the first character by display screen, performs step 114; As then performed step 114 for other; Concrete, the first character is >;
Step 113: judge whether system mode is holding state, is, system mode is set to input second information state, performs step 114, otherwise performs corresponding operating;
In the present embodiment, the execution corresponding operating in this step 113 comprises: if system mode is that test mode then exports the second character by display screen, performs step 114, as then performed step 114 for other; Concrete, the second character in the present embodiment is <;
Step 114: the type of detection system state, as then performed step 115 for producing entry password state, as then performed step 116, as then performed step 117 for process second information state for process first information state; As then returned step 102 for the 4th class state;
Concrete, in the present embodiment, the 4th class state is holding state or input first information state or inputs the second information state;
In the present embodiment, this step 114 also comprises:
As system mode is then set to off-mode for being switched to off-mode by system mode, closing display screen, returning step 102;
If system mode is input the new password that the new password state data of then preserving in data buffer area are first time input process first time, system mode is set to second time input new password state, input data length is set to initial value, returns step 102;
If system mode is that process second time input new password state then judges that whether the data in data buffer area are identical with the new password that the first time of preserving inputs, is perform step e 1, otherwise performs step e 2;
Step e 1: the data of preserving in data buffer area are the new password of second time input, points out new startup password to input correct, system mode is set to holding state, input data length is set to initial value, returns step 102;
In the present embodiment, also comprise in step e 1: by cipher mark set;
Step e 2: point out new startup password input error, system mode is set to new password error condition, input data length is set to initial value, returns step 102;
If system mode is that checking active coding state then judges to be the active coding whether data in data buffer area are correct perform step e 3, otherwise to perform step e 4;
Step e 3: more new key, arranges token status for activate, and prompting activates successfully, system mode is set to first time input new password state, input data length is set to initial value, returns step 102;
In the present embodiment, described more new key is specially: call preset algorithm and produce new key and replace with it key stored;
Arrange token status to be specially for activating: by the set of activation mark;
Step e 4: prompting activates unsuccessfully, is set to input active coding state, input data length is set to initial value, returns step 102 by system mode;
If system mode is that the 7th class state then judges that whether the data in data buffer area are identical with the new password that the second time of preserving inputs, is perform step H1, otherwise performs step H3;
Concrete, the 7th class state in this step is process startup password state or process Modify password state;
Step H1: input code error number of times is set to initial value, automatic unlocking counter is set to automatic unlocking number of times, automatic unlocking timer is set to the automatic unlocking cycle, performs step H2;
Step H2: judge whether system mode is process startup password state, that system mode is set to holding state, input data length is set to initial value, perform step 114, otherwise system mode is set to first time input new password state, input data length is set to initial value, performs step 114;
Step H3: upgrade input code error number of times, the input error of prompting startup password, by display screen display input code error number of times, performs step H4;
Concrete, in the present embodiment, the initial value of input code error number of times is 0, upgrades input code error number of times and is specially: input code error number of times is from adding 1 in step H3;
Step H4: judge whether input code error number of times equals default number of retries, is perform step H5, otherwise performs step H6;
Step H5: it is locked for arranging token status, is set to input PUK state, input data length is set to initial value, returns step 102 by system mode;
Step H6: judge whether system mode is process startup password state, system mode is set to startup password error condition, input data length is set to initial value, return step 102, otherwise system mode is set to Modify password error condition, input data length is set to initial value, returns step 102;
If system mode is that process PUK state then judges whether the data in data buffer area are correct PUK, point out and unlock successfully, arranging token status is non-locking, empty all passwords of preservation, system mode is set to first time input new password state, input code error number of times and input data length is all set to initial value, returns step 102; Otherwise prompting unlocks unsuccessfully, close display screen, system mode is set to off-mode, input data length is set to initial value, returns step 102;
Concrete, token status is set and is non-locking and in dynamic token without password is: locking mark is resetted, cipher mark is resetted;
As system mode then returns step 102 for other states;
In the present embodiment, other states in this step comprise: first time input new password state, start input cryptographic state, amendment input cryptographic state, off-mode, input active coding state, input PUK state, token scrap state and input first information state;
Step 115: the current time according to key and dynamic token generates entry password and exports, is set to display entry password state, input data length is set to initial value, returns step 102 by system mode;
In the present embodiment, generate entry password to be specially: calculate entry password according to the current time of default login algorithm to key and dynamic token;
Step 116: generate the first password according to the current time of key, dynamic token and the first information of input and export, is set to display first writ state, input data length is set to initial value, returns step 102 by system mode;
In the present embodiment, generate the first password to be specially: calculate the first password according to default account algorithm to the current time of key, dynamic token, the first information of input and event factor;
Step 117: the second information of input is processed, generate the second password according to the current time of result, key and dynamic token and export, system mode is set to display second password state, input data length is set to initial value, returns step 102;
Concrete, in the present embodiment, the second information of input is treated to: second information that formats is for retaining 2 significant digits form;
In the present embodiment, generate the second password to be specially: calculate the second password according to default payment algorithm to the current time of key, dynamic token, result and event factor.
Scan in step 105 in the present embodiment button obtain key assignments and according to key assignments judge to be pressed key type between comprise:
Steps A 0: judge that whether the key that is pressed is numerical key or decimal key or function key, be that the initial value of automatic shutdown timer is set to automatic shutdown time, perform steps A 1, otherwise perform step S14; Function key comprises ON/OFF switch, acknowledgement key, delete key, login button and payment key;
Steps A 1: judge current processing status, as then performed steps A 2 for the first treatment state, as then performed steps A 3 for the second treatment state, as then performed steps A 4 for the 3rd treatment state, as then continued for other;
In the present embodiment, as judged, current processing status then judges to be pressed the type of key according to key assignments, according to the different key execution respective operations that is pressed; Comprise: as then performed step S6 for acknowledgement key, as then performed step S9 for numerical key, as then performed step S12 for login button; As then performed step S13 for payment key;
Concrete, in the present embodiment, when system mode is new password error condition and the push-button type be pressed is not ON/OFF switch, current processing status is the first treatment state; When system mode is startup password error condition and the type of the button be pressed is not ON/OFF switch, current processing status is the second treatment state; When system mode is Modify password error condition and the type of the button be pressed is not ON/OFF switch, current processing status is the 3rd treatment state;
Steps A 2: system mode is set to first time input new password state, performs step 114;
Steps A 3: system mode is set to start input cryptographic state, performs step 114;
Steps A 4: system mode is set to amendment input cryptographic state, performs step 114;
In the present embodiment, step 105 also comprises: the type as the key that is pressed is that ON/OFF switch then performs step B1;
Step B1: judge whether dynamic token inside stores seed, is, performs step B2, otherwise carry out display screen self-inspection and system mode is set to off-mode, performs step 114;
Step B2: judge whether system mode is off-mode, is perform step B3, otherwise system mode is set to is switched to off-mode, perform step 114;
Step B3: judge whether the time that button is pressed exceedes preset duration, is empty data buffer area, initialization display screen, performs step B4, otherwise performs step 114;
Step B4: judge whether token status is self-destruction, is, system mode is set to token and scraps state, performs step 114, otherwise performs step B5;
Concrete, in the present embodiment, judge whether token status is self-destruction and is: judging the whether set of self-destruction mark, be that token status is self-destruction, otherwise token status is normal;
Dynamic token in the present embodiment token state when carrying out tearing shell process open is set to self-destruction;
Step B5: judge whether token status is activate, and is perform step B6, otherwise system mode is set to input active coding state, perform step 114;
Concrete, judge in the present embodiment whether token status is activated to be: judging activation marker whether set, is that token status is for activate, otherwise token status is un-activation;
Step B6: judge whether token status is locked, is, is set to input PUK state, performs step 114, otherwise perform step B7 by system mode;
Step B7: judge whether dynamic token arranged password, was, is set to start input cryptographic state, performs step 114 by system mode; Otherwise system mode is set to first time input new password state, performs step 114;
Concrete, in the present embodiment, judge whether dynamic token arranged password and be: judging cipher mark whether set, be that dynamic token arranged password, otherwise dynamic token did not arrange password;
The step 105 of the present embodiment also comprises: the type as the key that is pressed is that decimal key then performs step P1;
Step P1: judge whether system mode is the 5th class state, is perform step P2, otherwise perform step 114;
Concrete, the 5th class state in the present embodiment is test mode or holding state or input first information state or inputs the second information state;
Step P2: be deposited in data buffer area by decimal point order, upgrades input data length according to the first presetting method, performs step P3;
Concrete, in the present embodiment, the initial value of input data length is 0, is: input data length is from adding 1 according to the first presetting method input data length;
Step P3: judge whether system mode is holding state, is, is set to input first information state, performs step 114, otherwise perform step 114 by system mode;
The step 105 of the present embodiment also comprises: the type as the key that is pressed is that delete key then performs step Q1;
Step Q1: judge whether input data length is initial value, is perform step Q2, otherwise perform step Q5;
Concrete, the initial value inputting data length in the present embodiment is 0;
Step Q2: judge whether system mode is input second information state or Equations of The Second Kind state, is that system mode is set to holding state, performs step 114, otherwise performs step Q3;
Concrete, the Equations of The Second Kind state in the present embodiment is for display entry password state or display first writ state or show the second password state;
Step Q3: judge whether system mode is holding state, is perform step Q4, otherwise performs step S14;
Step Q4: judge whether the time that button is pressed exceedes preset duration, is, is set to amendment input cryptographic state, performs step 114, otherwise perform step 114 by system mode;
Step Q5: judge whether system mode is the 6th class state, is, to delete in data buffer area finally stored in data, upgrade input data length according to the second presetting method, perform step Q6, otherwise perform step Q8;
Concrete, in the present embodiment, the initial value of data length is 0, upgrades input data length to be according to the second presetting method: input data length is from subtracting 1;
In the present embodiment, the 6th class state in this step Q5 inputs new password state or second time input new password state or input active coding state or input first information state for start shooting input cryptographic state or amendment input cryptographic state or first time or inputs the second information state or input PUK state;
Step Q6: judge whether system mode is input first information state, is perform step Q7, otherwise performs step 114;
Step Q7: judge whether input data length is initial value, is that system mode is set to holding state, performs step 114, otherwise perform step 114;
Step Q8: judge whether system mode is key testing state, is point out failure information, performs step 114; As then performed step 114 for other.
In the present embodiment, off-mode closes display screen state, and resting state enters low power consumpting state.
In the present embodiment, the initial value of input data length also can be other positive integers, upgrading input data length according to the first presetting method also can be: input data length is from adding N, upgrading input data length according to the second presetting method also can be: input data length is from subtracting N, and wherein N is positive integer.The first presetting method in the present embodiment and the second presetting method are reciprocal.
The above; be only the present invention's preferably embodiment, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in technical scope disclosed by the invention; the change that can expect easily or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.

Claims (26)

1. a method of work for dynamic token, is characterized in that, comprising:
Step S1: dynamic token powers on, carries out initialization;
Step S2: dynamic token opens keys interrupt, and token state is set to resting state;
When dynamic token is waken up, perform step S3;
Step S3: determine whether key wakeup, is, performs step S4, otherwise performs step S14;
Step S4: close keys interrupt;
Step S5: scanning button obtains key assignments and the type of the key that is pressed according to key assignments judgement, as then performed step S6 for acknowledgement key, as then performed step S9 for numerical key, as then performed step S12 for login button; As then performed step S13 for payment key;
Step S6: the type judging system mode, as then performed step S7, as then performed step S8 for input second information state for input first information state;
Step S7: system mode is set to process first information state, performs step S14;
Step S8: system mode is set to process second information state, performs step S14;
Step S9: the type judging system mode, as then performed step S10 for first kind state, as then system mode being set to holding state for Equations of The Second Kind state, performs step S14; Described first kind state is that holding state or start shooting input cryptographic state or amendment input cryptographic state or first time input new password state or second time input new password state or input active coding state or input first information state or input the second information state or input PUK state; Described Equations of The Second Kind state is for display entry password state or display first writ state or show the second password state;
Step S10: be deposited in data buffer area by numerical order corresponding for numerical key, upgrades input data length according to the first presetting method, performs step S11;
Step S11: judge whether system mode is holding state, is, is set to input first information state, performs step S14 by system mode; Otherwise execution corresponding operating;
Step S12: judge whether system mode is the 3rd class state, is, is set to system mode and produces entry password state, performs step S14; Otherwise execution corresponding operating; Described 3rd class state is display first writ state or display the second password state;
Step S13: judge whether system mode is holding state, is, system mode is set to input second information state, performs step S14, otherwise performs corresponding operating;
Step S14: the type judging system mode, as system mode then performs step S15 for producing entry password state, as system mode for process first information state then performs step S16, if system mode is that process second information state then performs step S17; If system mode is that the 4th class state then returns step S2; Described 4th class state is holding state or input first information state or inputs the second information state;
Step S15: the current time according to key and dynamic token generates entry password and exports, is set to display entry password state, input data length is set to initial value, returns step S2 by system mode;
Step S16: generate the first password according to the current time of key, dynamic token and the first information of input and export, is set to display first writ state, input data length is set to initial value, returns step S2 by system mode;
Step S17: the second information of input is processed, generates the second password according to the current time of result, key and dynamic token and export, system mode being set to display second password state, input data length being set to initial value, returning step S2.
2. the method for claim 1, is characterized in that, determines whether that key wakeup is specially in described step S3: judge the whether set of key wakeup mark, is be then key wakeup, otherwise is not key wakeup.
3. the method for claim 1, is characterized in that, scan in described step S5 button obtain key assignments and according to key assignments judge to be pressed key type between comprise:
Steps A 0: judge that whether the key that is pressed is numerical key or decimal key or function key, be that the initial value of automatic shutdown timer is set to automatic shutdown time, perform steps A 1, otherwise perform step S14; Described function key comprises ON/OFF switch, acknowledgement key, delete key, login button and payment key;
Steps A 1: judge current processing status, as then performed steps A 2 for the first treatment state, as then performed steps A 3 for the second treatment state, as then performed steps A 4 for the 3rd treatment state, as then continued for other;
Steps A 2: system mode is set to first time input new password state, performs step S14;
Steps A 3: system mode is set to start input cryptographic state, performs step S14;
Steps A 4: system mode is set to amendment input cryptographic state, performs step S14.
4. method as claimed in claim 3, it is characterized in that, when system mode is new password error condition and the push-button type be pressed is not ON/OFF switch, current processing status is described first treatment state; When system mode is startup password error condition and the type of the button be pressed is not ON/OFF switch, current processing status is described second treatment state; When system mode is Modify password error condition and the type of the button be pressed is not ON/OFF switch, current processing status is described 3rd treatment state.
5. method as claimed in claim 4, it is characterized in that, described step S14 also comprises:
As inputted new password state or start input cryptographic state for first time or revising input cryptographic state, then return step S2.
6. method as claimed in claim 5, it is characterized in that, described step S5 also comprises: the type as the key that is pressed is that ON/OFF switch then performs step B1;
Step B1: judge whether dynamic token inside stores seed, is, performs step B2, otherwise carry out display screen self-inspection and system mode is set to off-mode, performs step S14;
Step B2: judge whether system mode is off-mode, is perform step B3, otherwise system mode is set to is switched to off-mode, perform step S14;
Step B3: judge whether the time that button is pressed exceedes preset duration, is empty data buffer area, initialization display screen, performs step B4, otherwise performs step S14;
Step B4: judge whether token status is self-destruction, is, system mode is set to token and scraps state, performs step S14, otherwise performs step B5;
Step B5: judge whether token status is activate, and is perform step B6, otherwise system mode is set to input active coding state, perform step S14;
Step B6: judge whether token status is locked, is, is set to input PUK state, performs step S14, otherwise perform step B7 by system mode;
Step B7: judge whether dynamic token arranged password, was, is set to start input cryptographic state, performs step S14 by system mode; Otherwise system mode is set to first time input new password state, performs step S14.
7. method as claimed in claim 6, is characterized in that,
Judge in described step B4 whether token status is that self-destruction is specially: judging the whether set of self-destruction mark, be that token status is self-destruction, otherwise token status is normal;
Judge in described step B5 whether token status is activated to be specially: judging activation marker whether set, is that token status is for activate, otherwise token status is un-activation.
8. method as claimed in claim 6, it is characterized in that, described step S14 also comprises:
As for off-mode or input active coding state input PUK state or token scrap state, then return step S2;
As then system mode being set to off-mode for being switched to off-mode, closing display screen, returning step S2.
9. method as claimed in claim 8, it is characterized in that, described step S5 also comprises: the type as the key that is pressed is that decimal key then performs step P1,
Step P1: judge whether system mode is the 5th class state, is perform step P2, otherwise perform step S14; Described 5th class state is test mode or holding state or input first information state or inputs the second information state;
Step P2: be deposited in data buffer area by decimal point order, upgrades input data length according to described first presetting method, performs step P3;
Step P3: judge whether system mode is holding state, is, is set to input first information state, performs step S14, otherwise perform step S14 by system mode.
10. method as claimed in claim 9, it is characterized in that, the initial value of described input data length is 0;
Describedly upgrade input data length according to described first presetting method and be specially: input data length is from adding 1.
11. methods as claimed in claim 9, it is characterized in that, described step S14 also comprises:
As being input first information state, then return step S2.
12. methods as claimed in claim 10, it is characterized in that, described step S5 also comprises: the type as the key that is pressed is that delete key then performs step Q1,
Step Q1: judge whether input data length is initial value, is perform step Q2, otherwise perform step Q5;
Step Q2: judge whether system mode is input second information state or Equations of The Second Kind state, is that system mode is set to holding state, performs step S14, otherwise performs step Q3; Described Equations of The Second Kind state is for display entry password state or show first writ state or the second password state;
Step Q3: judge whether system mode is holding state, is perform step Q4, otherwise perform step S14;
Step Q4: judge whether the time that button is pressed exceedes preset duration, is, is set to amendment input cryptographic state, performs step S14, otherwise perform step S14 by system mode;
Step Q5: judge whether system mode is the 6th class state, is, to delete in data buffer area finally stored in data, upgrade input data length according to the second presetting method, perform step Q6, otherwise perform step Q8; Described 6th class state inputs new password state or second time input new password state or input active coding state or input first information state for start shooting input cryptographic state or amendment input cryptographic state or first time or inputs the second information state or input PUK state;
Step Q6: judge whether system mode is input first information state, is perform step Q7, otherwise performs step S14;
Step Q7: judge whether input data length is initial value, is that system mode is set to holding state, performs step S14, otherwise perform step S14;
Step Q8: judge whether system mode is key testing state, is point out failure information, performs step S14; Otherwise perform step S14.
13. methods as claimed in claim 12, is characterized in that, the initial value of described input data length is 0;
Describedly upgrade input data length according to described first presetting method and be specially: input data length is from adding 1;
Describedly upgrade input data length according to described second presetting method and be specially: input data length is from subtracting 1.
14. methods as claimed in claim 13, it is characterized in that, described step S6 also comprises: as system mode for first time input new password state then performs step C1, as system mode for second time input new password state then performs step C2, as system mode for start input cryptographic state then performs step C3, if system mode is that key testing state then performs step C4; As then performed step S14 for other;
Step C1: judge whether input data length equals preset password length, is, is set to process first time input new password state, performs step S14, otherwise perform step S14 by system mode;
Step C2: judge whether input data length equals preset password length, is, is set to process second time input new password state, performs step S14, otherwise perform step S14 by system mode;
Step C3: judge whether input data length equals preset password length, is, is set to process startup password state, performs step S14, otherwise perform step S14 by system mode;
Step C4: prompting successful information, performs step S14.
15. methods as claimed in claim 14, it is characterized in that, described step S14 also comprises:
If system mode is the 7th class state, then judge that whether the data in data buffer area are identical with the new password that the second time of preserving inputs, be perform step H1, otherwise perform step H3; Described 7th class state is process startup password state or process Modify password state;
Step H1: input code error number of times is set to initial value, automatic unlocking counter is set to automatic unlocking number of times, automatic unlocking timer is set to the automatic unlocking cycle, performs step H2;
Step H2: judge whether system mode is process startup password state, that system mode is set to holding state, input data length is set to initial value, perform step S14, otherwise system mode is set to first time input new password state, input data length is set to initial value, performs step S14;
Step H3: upgrade input code error number of times, the input error of prompting startup password, by display screen display input code error number of times, performs step H4;
Step H4: judge whether input code error number of times equals default number of retries, is perform step H5, otherwise performs step H6;
Step H5: it is locked for arranging token status, is set to input PUK state, input data length is set to initial value, returns step S2 by system mode;
Step H6: judge whether system mode is process startup password state, system mode is set to startup password error condition, input data length is set to initial value, return step S2, otherwise system mode is set to Modify password error condition, input data length is set to initial value, returns step S2.
16. methods as claimed in claim 15, it is characterized in that, described step S9 also comprises: if system mode is off-mode, then judge whether dynamic token inside stores seed, be that system mode is set to test mode, perform step S14, otherwise directly perform step S14.
17. methods as claimed in claim 16, it is characterized in that, the execution corresponding operating in described step S11 comprises: as system mode for input active coding state then performs step D1; As system mode for input PUK state then performs step D2; As system mode for amendment input cryptographic state then performs step D3; As system mode for first time input new password state then performs step D5; As system mode for second time input new password state then performs step D7; As then performed step S14 for other;
Step D1: judge whether input data length equals the first numerical value, is, is set to checking active coding state, performs step S14, otherwise perform step S14 by system mode;
Step D2: judge whether input data length equals second value, is, is set to process PUK state, performs step S14, otherwise perform step S14 by system mode;
Step D3: judge whether input data length equals preset password length, is perform step D4, otherwise perform step S14;
Step D4: judge whether dynamic token arranged password, was, is set to process Modify password state, performs step S14, otherwise perform step S14 by system mode;
Step D5: judge whether input data length equals preset password length, is perform step D6, otherwise perform step S14;
Step D6: judge whether dynamic token arranged password, was, is set to process first time input new password state, performs step S14, otherwise perform step S14 by system mode;
Step D7: judge whether input data length equals preset password length, is perform step D8, otherwise perform step S14;
Step D8: judge whether dynamic token arranged password, was, is set to process second time input new password state, performs step S14, otherwise perform step S14 by system mode.
18. methods as claimed in claim 17, is characterized in that, describedly judge whether dynamic token arranged password and be specially: judging cipher mark whether set, be that dynamic token arranged password, otherwise dynamic token did not arrange password.
19. methods as claimed in claim 17, it is characterized in that, described step S14 also comprises:
Described 4th class state is for input first writ state or test mode or process Modify password state;
If system mode is checking active coding state, then judge whether the data in data buffer area are correct active coding, it is then more new key, token status is set for activate, prompting activates successfully, system mode is set to first time input new password state, input data length is set to initial value, returns step S2; Otherwise prompting activates unsuccessfully, system mode is set to input active coding state, input data length is set to initial value, returns step S2;
If system mode is process PUK state, then judge whether the data in data buffer area are correct PUK, point out and unlock successfully, arranging token status is non-locking, empty all passwords of preservation, system mode is set to first time input new password state, input code error number of times and input data length is all set to initial value, returns step S2; Otherwise prompting unlocks unsuccessfully, close display screen, system mode is set to off-mode, input data length is set to initial value, returns step S2;
If system mode is process first time input new password state, then the data of preserving in data buffer area are the new password of first time input, system mode are set to second time input new password state, input data length are set to initial value, return step S2;
If system mode is process second time input new password state, then judges that whether the data in data buffer zone are identical with the new password that the first time of preserving inputs, be perform step e 1, otherwise perform step e 2;
Step e 1: the data of preserving in data buffer area are the new password of second time input, points out new startup password to input correct, system mode is set to holding state, input data length is set to initial value, returns step S2;
Step e 2: point out new startup password input error, system mode is set to new password error condition, input data length is set to initial value, returns step S2.
20. methods as claimed in claim 19, is characterized in that, the described token status that arranges is specially for activating: by the set of activation mark;
Arranging token status is that non-locking is specially: locking mark resetted.
21. methods as claimed in claim 19, is characterized in that, the initial value of described input code error number of times is 0; Described renewal input code error number of times is specially: input code error number of times is from adding 1.
22. methods as claimed in claim 19, it is characterized in that, the execution corresponding operating in described step S12 comprises: if system mode is that test mode then exports the first character by display screen, performs step S14; As then performed step S14 for other.
23. methods as claimed in claim 22, it is characterized in that, the execution corresponding operating in described step S13 comprises: if system mode is that test mode then exports the second character by display screen, performs step S14, as then performed step S14 for other.
24. the method for claim 1, is characterized in that, generate entry password and be specially in described step S15: calculate entry password according to the current time of default login algorithm to key and dynamic token.
25. the method for claim 1, is characterized in that, generate the first password and be specially in described step S16: calculate the first password according to default account algorithm to the current time of key, dynamic token, the first information of input and event factor.
26. the method for claim 1, is characterized in that, generate the second password and be specially in described step S17: calculate the second password according to default payment algorithm to the current time of key, dynamic token, result and event factor.
CN201310270520.XA 2013-07-01 2013-07-01 A kind of method of work of dynamic token Active CN103391195B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310270520.XA CN103391195B (en) 2013-07-01 2013-07-01 A kind of method of work of dynamic token

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310270520.XA CN103391195B (en) 2013-07-01 2013-07-01 A kind of method of work of dynamic token

Publications (2)

Publication Number Publication Date
CN103391195A CN103391195A (en) 2013-11-13
CN103391195B true CN103391195B (en) 2016-04-06

Family

ID=49535360

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310270520.XA Active CN103391195B (en) 2013-07-01 2013-07-01 A kind of method of work of dynamic token

Country Status (1)

Country Link
CN (1) CN103391195B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103731272B (en) * 2014-01-06 2017-06-06 飞天诚信科技股份有限公司 A kind of identity identifying method, system and equipment
WO2016049870A1 (en) * 2014-09-30 2016-04-07 宇龙计算机通信科技(深圳)有限公司 Method and system for generating dynamic login credential
CN104333454B (en) * 2014-10-28 2017-07-14 飞天诚信科技股份有限公司 A kind of method of work of the dynamic token of renewable seed
CN104394145B (en) * 2014-11-25 2015-09-23 飞天诚信科技股份有限公司 A kind of dynamic token and method of work thereof with journal function
CN105391553A (en) * 2015-10-15 2016-03-09 上海动联信息技术股份有限公司 Method for generating challenge-response dynamic password based on sum-contained challenge factor
CN107332819A (en) * 2017-05-25 2017-11-07 苏州科达科技股份有限公司 A kind of method for authenticating and device for conference system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102611556A (en) * 2012-03-31 2012-07-25 飞天诚信科技股份有限公司 Working method of dynamic token

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8060750B2 (en) * 2007-06-29 2011-11-15 Emc Corporation Secure seed provisioning

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102611556A (en) * 2012-03-31 2012-07-25 飞天诚信科技股份有限公司 Working method of dynamic token

Also Published As

Publication number Publication date
CN103391195A (en) 2013-11-13

Similar Documents

Publication Publication Date Title
CN103391195B (en) A kind of method of work of dynamic token
CN101719826B (en) Dynamic token having function of updating seed key and updating method for seed key thereof
CN101106455B (en) Identity authentication method and intelligent secret key device
CN103092484B (en) The method of unlock screen, device and terminal
CN203192055U (en) Electronic lock
KR101029758B1 (en) A method for firmware updating in remote
EP2983325A1 (en) Dynamic password token, and data transmission method and system for dynamic password token
US20150304313A1 (en) One-time password operating method
CN106600797A (en) Dynamic graphic password lock, server, sharing system and unlocking and locking methods thereof
WO2002044872A2 (en) Anti-spoofing password protection
CN101500232A (en) Method and system for implementing dynamic identity authentication
CN104916010A (en) Control system of mobile device and wearable control equipment
CN103312517B (en) A kind of Dualpurpose installation shares the implementation method of display screen and button
CN103198247B (en) A kind of computer safety protective method and system
CN104392157A (en) Method and device for locking screen by using passwords
CN108447154A (en) Safe unlocking method and device, encryption and decryption method and device, lock and server
CN103034417A (en) Unlocking method for touch screen and terminal equipment
CN110310406A (en) A kind of method for unlocking and intelligent door lock of intelligent door lock
CN101577907A (en) Method and device for managing mobile terminal
CN104820805A (en) Method and device for burglary prevention of user identity identification card information
CN101777101B (en) Method for improving usability of intelligent secret key device and intelligent secret key device
CN108768941B (en) Method and device for remotely unlocking safety equipment
CN102761419A (en) Electronic signature tool and authentication system and authentication method using tool
CN111340987A (en) Internet of things door lock communication method, device and system and computer storage medium
CN109389710A (en) Intelligent door lock system based on RSA Algorithm Yu BLE low-power consumption bluetooth

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant