CN103929307B - Cipher-code input method, intelligent cipher key equipment and client terminal device - Google Patents

Cipher-code input method, intelligent cipher key equipment and client terminal device Download PDF

Info

Publication number
CN103929307B
CN103929307B CN201410132586.7A CN201410132586A CN103929307B CN 103929307 B CN103929307 B CN 103929307B CN 201410132586 A CN201410132586 A CN 201410132586A CN 103929307 B CN103929307 B CN 103929307B
Authority
CN
China
Prior art keywords
password
user
intelligent cipher
cipher key
key equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410132586.7A
Other languages
Chinese (zh)
Other versions
CN103929307A (en
Inventor
李东声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tendyron Technology Co Ltd
Original Assignee
Tendyron Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tendyron Technology Co Ltd filed Critical Tendyron Technology Co Ltd
Priority to CN201410132586.7A priority Critical patent/CN103929307B/en
Publication of CN103929307A publication Critical patent/CN103929307A/en
Priority to PCT/CN2015/071852 priority patent/WO2015149582A1/en
Application granted granted Critical
Publication of CN103929307B publication Critical patent/CN103929307B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

The present invention proposes a kind of method, intelligent cipher key equipment and client terminal device that client password input is carried out by intelligent cipher key equipment, user-friendly to realize that password automatically enters.This method includes:Intelligent cipher key equipment receives the password output request that client is sent;It is exported and asked according to the password, show item list corresponding with pre-stored user data in the intelligent cipher key equipment, the user data includes account information and corresponding password;It determines the account information that user selects in the item list, and first password is determined according to the account information that the user selects, the first password is the password for login authentication;The first password is sent to the client.This method can realize that password automatically enters, user-friendly.

Description

Cipher-code input method, intelligent cipher key equipment and client terminal device
Technical field
The present invention relates to technical field of network information safety more particularly to one kind to carry out client by intelligent cipher key equipment Method, intelligent cipher key equipment and the client terminal device of Password Input.
Background technology
Password technology is one of safety and secrecy provision the most in current network information system, Internetbank, Third-party payment, each The social class website log of kind shopping is required for setting corresponding account and login password.With the development of networked information era, people Online activities it is increased, just have more and more accounts and password etc. need user go set and accurately remember.
If numerous accounts and password are required for user artificially to remember, then undoubtedly the memory capability of user can be caused Greatly test, also, when user is manually entered password, also compares and take time and effort.
The content of the invention
It is contemplated that it solves at least some of the technical problems in related technologies.
For this purpose, client password input is carried out by intelligent cipher key equipment an object of the present invention is to provide a kind of Method, this method may not need user's memory and be manually entered password, realize that password automatically enters, user-friendly.
It is another object of the present invention to propose a kind of intelligent cipher key equipment.
It is another object of the present invention to propose a kind of client terminal device.
In order to achieve the above objectives, it is close that first aspect present invention embodiment proposed carries out client by intelligent cipher key equipment The method of code input, including:Intelligent cipher key equipment receives the password output request that client is sent;The intelligent cipher key equipment root It exports and asks according to the password, show item list corresponding with pre-stored user data in the intelligent cipher key equipment, Wherein, the user data includes account information and corresponding password;The intelligent cipher key equipment determines user in the entry The account information selected in list, and first password is determined according to the account information that the user selects, wherein, described first is close Code is the password for login authentication;The first password is sent to the client by the intelligent cipher key equipment, with toilet It states client and inputs the first password.
In addition, the account information selected according to the user determines first password, including:It is selected according to the user Account information, the corresponding password of account information selected with the user is obtained from the user data;By the acquisition Password be determined as the first password or the password of the acquisition be encrypted, obtain the first password;Or Person, according to the account information that the user selects, obtained from the user data user selection account information and One or more in information corresponding with the account information of user selection;Using dynamic password computational algorithm, to described The information of acquisition carries out that dynamic password is calculated, and the dynamic password is determined as the first password.
In addition, corresponding with pre-stored user data in the intelligent cipher key equipment item list of the display it Before, the method further includes:The intelligent cipher key equipment stores the user data.
In addition, the intelligent cipher key equipment stores the user data, including:The intelligent cipher key equipment receives the use The operational order and the user data of family input;The intelligent cipher key equipment carries out authentication to the user, and in institute After user is stated by authentication, by the write permission opening of the intelligent cipher key equipment to the user;By the number of users According to write-in to the intelligent cipher key equipment.
In addition, before the intelligent cipher key equipment receives operational order input by user and the user data, it is described Method further includes:The active coding that the user inputs on the intelligent cipher key equipment is received, and the active coding is swashed Verification living and the information storage function that the intelligent cipher key equipment is activated after activation is verified;Alternatively, receive the use The active coding that the activation request and the user that family is sent by the client are inputted by the client, and swash to described The information storage function of the intelligent cipher key equipment into line activating is verified and activated after activation is verified to code living, wherein, Described information store function, which is used to implement, writes the user data to the intelligent cipher key equipment;And receive the use The open command of family input, and enable according to the open command information storage function of the intelligent cipher key equipment.
In addition, the intelligent cipher key equipment receives operational order input by user and the user data specifically includes:It is logical The operation interface and control button for crossing the intelligent cipher key equipment offer receive the operational order and the user data;Or The operational order and the user data that external equipment is sent are received by communication interface.
In addition, being write by the user data to before the intelligent cipher key equipment, the method further includes:The intelligence Can key devices receive checking request to the intelligent cipher key equipment that the user sent by the client and random Number, and according to the private key of the intelligent cipher key equipment random number is encrypted and according to the checking request by institute The digital certificate and encrypted random number for stating intelligent cipher key equipment are sent to the client;The client is according to root certificate The digital certificate of the intelligent cipher key equipment is verified, and according to the public key of the intelligent cipher key equipment to the encryption after Random number be decrypted and the random number after decryption verified;Verifying the digital certificate and the random number By rear, the user data is shown;Described write the user data to the intelligent cipher key equipment be specially:It is receiving After the confirmation of the user data to the user to showing instructs, the intelligent cipher key equipment stores the number of users According to.
In addition, the intelligent cipher key equipment receives operational order input by user and the user data specifically includes:Institute It states intelligent cipher key equipment and receives the user data ciphertext that the client is sent, and according to the private key pair of the intelligent cipher key equipment The user data ciphertext decrypts to obtain the user data, wherein, the client is according to the intelligent cipher key equipment Public key is to the ciphering user data to generate the user data ciphertext;Alternatively, the intelligent cipher key equipment receives the visitor The session key ciphertext and user data ciphertext that family end is sent, and it is close to the session according to the private key of the intelligent cipher key equipment The decryption of key ciphertext is to obtain session key and the user data ciphertext is decrypted with described in obtaining according to the session key User data, wherein, the client generates session key at random, and according to the public key of the intelligent cipher key equipment to the meeting The encryption of words key with generate the session key ciphertext and according to the session key to the ciphering user data to generate The user data ciphertext.
The method that client password input is carried out by intelligent cipher key equipment that first aspect present invention embodiment proposes, leads to It crosses and first password is obtained according to pre-stored user data and is sent to client so that client input is set from intelligent key The standby password received, is not required user to be manually entered, can be user-friendly, also, according to pre-stored user data Generate the password of client input, it is not required that user's memory cipher avoids the problem that user is difficult to remember when account is numerous.
In order to achieve the above objectives, it is close that second aspect of the present invention embodiment proposed carries out client by intelligent cipher key equipment The method of code input, including:Client sends password output request to intelligent cipher key equipment, so as to the intelligent cipher key equipment root It exports and asks according to the password, show item list corresponding with pre-stored user data in the intelligent cipher key equipment, And the intelligent cipher key equipment is caused to determine the account information that user selects in the item list, and according to the user The account information of selection determines first password, wherein, the user data include account information and corresponding password, described first Password is the password for login authentication;The client receives the first password that the intelligent cipher key equipment is sent;Institute It states client and terminates the input first password.
The method that client password input is carried out by intelligent cipher key equipment that second aspect of the present invention embodiment proposes, leads to Indicating intelligent key devices output password is crossed, and the first password that intelligent cipher key equipment is sent inputs, and can realize password Automatically enter, without user input, can be user-friendly.
In order to achieve the above objectives, the intelligent cipher key equipment that third aspect present invention embodiment proposes, including:Receiving module, Password for receiving client transmission exports request;Display module, for according to the password export ask, display with it is described The corresponding item list of pre-stored user data in intelligent cipher key equipment, wherein, the user data includes account information With corresponding password;Determining module, for determining account information that user selects in the item list, and according to the use The account information of family selection determines first password, wherein, the first password is the password for login authentication;Sending module, For the first password to be sent to the client, so that the client inputs the first password.
In addition, the determining module includes:First module, for the account information selected according to the user, from described Password corresponding with the account information of user selection is obtained in user data;Second unit, for by the close of the acquisition Code is determined as the first password, alternatively, the password of the acquisition is encrypted, obtains the first password.
In addition, the determining module includes:Third unit, for the account information selected according to the user, from described It is obtained in user data in the account information of user's selection and information corresponding with the account information of user selection One or more;Unit the 4th for using dynamic password computational algorithm, to the information of the acquisition be calculated dynamic The dynamic password is determined as the first password by state password.
In addition, the intelligent cipher key equipment further includes:First memory module, for storing the private of the intelligent cipher key equipment Key and digital certificate;Second memory module, for storing the user data;Transceiver module, for receiving behaviour input by user Make instruction and the user data;Access control module for carrying out authentication to the user, and passes through in the user After authentication, the write permission opening of second memory module is write to the user and by the user data To second memory module;And safety chip, for the generation and certification and encryption and decryption being digitally signed.
In addition, the intelligent cipher key equipment further includes:Control module is activated, it is close in the intelligence for receiving the user The active coding inputted in key equipment, and the active coding is verified into line activating and after activation is verified described in activation The information storage function of intelligent cipher key equipment;Alternatively, receive activation request and the institute that the user is sent by the client The active coding that user is inputted by the client is stated, and the active coding into line activating is verified and is led in activation verification Later the information storage function of the intelligent cipher key equipment is activated, wherein, described information store function is used to implement the use User data is write to the intelligent cipher key equipment;And opening module, for receiving the open command input by user, and root The information storage function of the intelligent cipher key equipment is enabled according to the open command.
In addition, described in operation interface and control button that the transceiver module is provided by the intelligent cipher key equipment receive Operational order and the user data;Alternatively, the operational order and described that external equipment sends is received by communication interface User data.
In addition, the transceiver module receive the user by the client send to the intelligent cipher key equipment Checking request and random number, the safety chip are encrypted the random number according to the private key of the intelligent cipher key equipment, And the transceiver module according to the checking request by the digital certificate of the intelligent cipher key equipment and encrypted random number It is sent to the client;Wherein, the client tests the digital certificate of the intelligent cipher key equipment according to root certificate Card, and according to the public key of the intelligent cipher key equipment the encrypted random number is decrypted and to after decryption with Machine number is verified;The display module is additionally operable to receive the operational order input by user and institute in the transceiver module After stating user data, it is described to show that the user data and the access control module are received in the transceiver module After user is to the confirmation instruction of the user data shown, the user data is write into second memory module.
In addition, the transceiver module receives the user data ciphertext that client is sent, the safety chip is according to the intelligence Can the private keys of key devices the user data ciphertext is decrypted to obtain the user data, wherein, the client according to The public key of the intelligent cipher key equipment is to the ciphering user data to generate the user data ciphertext;Alternatively, the transmitting-receiving Module receives the session key ciphertext of client transmission and user data ciphertext, the safety chip are set according to the intelligent key Standby private key decrypts the session key ciphertext to obtain session key, and according to the session key to the user data Ciphertext decrypts to obtain the user data, wherein, the client generates session key at random, and according to the intelligent key The public key of equipment encrypts the session key to generate the session key ciphertext and according to the session key to described Ciphering user data is to generate the user data ciphertext.
The intelligent cipher key equipment that third aspect present invention embodiment proposes, by being obtained according to pre-stored user data First password is simultaneously sent to client so that the password that client input is received from intelligent cipher key equipment is not required user manual Input, can be user-friendly, also, the password of client input is generated according to pre-stored user data, is also not required to User's memory cipher is wanted, avoids the problem that user is difficult to remember when account is numerous.
In order to achieve the above objectives, the client terminal device that fourth aspect present invention embodiment proposes, including:Sending module is used In sending password output request to intelligent cipher key equipment, ask, show so that the intelligent cipher key equipment is exported according to the password Show item list corresponding with pre-stored user data in the intelligent cipher key equipment and so that the intelligent key is set The account information that standby definite user selects in the item list, and determine first according to the account information that the user selects Password, wherein, the user data includes account information and corresponding password, and the first password is for the close of login authentication Code;Receiving module, for receiving the first password that the intelligent cipher key equipment is sent;Input module, it is described for inputting First password.
The client terminal device that fourth aspect present invention embodiment proposes, by indicating intelligent key devices output password, and And the first password for sending intelligent cipher key equipment inputs, and can realize automatically entering for password, is inputted without user, Ke Yifang Just user's operation.
In order to achieve the above objectives, fifth aspect present invention embodiment propose client device, including housing, processor, Memory, circuit board and power circuit, wherein, circuit board is placed in the interior volume that housing surrounds, and processor and memory are set It puts on circuit boards;Power circuit, for powering for each circuit or device of client device;Memory is used to store and can hold Line program code;Processor is run and executable program code pair by reading the executable program code stored in memory The program answered, for performing following steps:Password output request is sent to intelligent cipher key equipment, so that the intelligent key is set Standby exported according to the password is asked, and shows entry column corresponding with pre-stored user data in the intelligent cipher key equipment Table and the intelligent cipher key equipment is caused to determine the account information that user selects in the item list, and according to described The account information of user's selection determines first password, wherein, the user data includes account information and corresponding password, described First password is the password for login authentication;Receive the first password that the intelligent cipher key equipment is sent;Described in input First password.
The client device that fifth aspect present invention embodiment proposes, by indicating intelligent key devices output password, and And the first password for sending intelligent cipher key equipment inputs, and can realize automatically entering for password, is inputted without user, Ke Yifang Just user's operation.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partly become from the following description It obtains substantially or is recognized by the practice of the present invention.
Description of the drawings
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Substantially and it is readily appreciated that, wherein:
Fig. 1 is the stream for the method that client password input is carried out by intelligent cipher key equipment that one embodiment of the invention proposes Journey schematic diagram;
Fig. 2 is the method that client password input is carried out by intelligent cipher key equipment that another embodiment of the present invention proposes Flow diagram;
Fig. 3 is the method that client password input is carried out by intelligent cipher key equipment that another embodiment of the present invention proposes Flow diagram;
Fig. 4 is the method that client password input is carried out by intelligent cipher key equipment that another embodiment of the present invention proposes Flow diagram;
Fig. 5 is the structure diagram for the intelligent cipher key equipment that another embodiment of the present invention proposes;
Fig. 6 is the structure diagram for the intelligent cipher key equipment that another embodiment of the present invention proposes;
Fig. 7 is the structure diagram for the client terminal device that another embodiment of the present invention proposes.
Specific embodiment
The embodiment of the present invention is described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end Same or similar label represents same or similar element or has the function of same or like element.Below with reference to attached The embodiment of figure description is exemplary, and is only used for explaining the present invention, and is not considered as limiting the invention.On the contrary, this The embodiment of invention includes falling into all changes in the range of the spirit and intension of attached claims, modification and equivalent Object.
Fig. 1 is the stream for the method that client password input is carried out by intelligent cipher key equipment that one embodiment of the invention proposes Journey schematic diagram, this method include:
S11:Intelligent cipher key equipment receives the password output request that client is sent;
Wherein, intelligent cipher key equipment can be the equipment for having storage capacity, for example, universal serial bus(Universal Serial Bus, USB)Key, tone code key, the key that can be carried out wireless communication, correspondingly, intelligent cipher key equipment can pass through USB Mode, tone code mode or wireless mode and client communication, wherein, wireless mode can include bluetooth approach, wifi modes Or infrared mode etc..Specifically, USB modes can refer to that intelligent cipher key equipment passes through USB interface and client communication, tone code Mode can refer to intelligent cipher key equipment by audio interface or loud speaker and client communication, and wireless mode can refer to intelligence Energy key devices communicate after establishing wireless connection with client.
Client can refer to the equipment that user carries out network entry, for example, PC(Personal Computer, PC), mobile phone, tablet computer etc..
When user will log in a certain account on the client, for example, it is necessary to which user's input is close when user uses Internetbank Code, at this point, client can send password output request to intelligent cipher key equipment, it is corresponding close to be obtained from intelligent cipher key equipment Code.In addition, the password in the embodiment of the present invention is referred to as password.
S12:Intelligent cipher key equipment is exported according to the password and asked, display and pre-stored use in intelligent cipher key equipment The corresponding item list of user data, the user data include account information and corresponding password;
Wherein, each account information that user can use and corresponding close can be prestored in intelligent cipher key equipment Code, for example, user may use Internetbank, Third-party payment and E-mail address, then can be preserved in intelligent cipher key equipment Bank's card number and corresponding password, the user name of Third-party payment and corresponding password and, the user name of E-mail address and right The password answered.In intelligent cipher key equipment password brocade is properly termed as storing the module of each account information and corresponding password Capsule.
After intelligent cipher key equipment receives password output request, item corresponding with stored user data can be shown Mesh list(It is of course also possible to it shows otherwise)It selects to log in for user and needs account to be used, carried out with above-mentioned example Illustrate, then can show the user name of bank's card number, the user name of Third-party payment and E-mail address.
It is understood that including at least account in the item list of display, account and corresponding password can also be included, For example, display bank's card number and corresponding password, the user name of Third-party payment and the use of corresponding password and E-mail address Name in an account book and corresponding password.
It is above-mentioned by taking user data includes account information and corresponding password as an example, it is to be understood that user data may be used also To include other information, such as the corresponding site information of account information, for example, user stores Taobao in intelligent cipher key equipment Website name, user name(That is account information)With corresponding password.
It should be noted that user can the project self-defined to be stored, i.e., to be stored according to the increase and decrease of oneself demand Project for example, the user data of user's storage can be web site name, log in the account of the website and corresponding password, also may be used To be account and corresponding password, the corresponding password of account, the account and remarks are can also be.
In other words, the user data of storage can be divided into two classes:One kind is default project, is directly selected for user It selects, for example, bank's card number, Web bank's login name, password, network address, name etc..It is also predeterminable multiple under each project The project of subordinate, for example, row, industrial and commercial bank, agricultural bank etc. in being set under bank's card number.In addition, it is another kind of be blank for The self-defined input in family, when user needs to store user data, an entry can be created, wherein, which may include multiple items Mesh, for example, the species of bank card, account, password, remarks etc..
Correspondingly, account information can be included in display, that is, in the item list shown or including account information and Corresponding password or including account information and corresponding site information, alternatively, including account information and corresponding password and Corresponding site information needs project stored etc. including account information and user-defined other.
Wherein, site information can be specially at least one of:Uniform resource locator (the Uniform of website Resource Locator, URL) address, the Internet protocol of website(Internet Protocol, IP)Address, domain name and net Station name.
S13:Intelligent cipher key equipment determines the account information that user selects in the item list, and according to the user The account information of selection determines first password, wherein, the first password is the password for login authentication;First password can be with It is the corresponding original password of account information of user's selection(It is stored in corresponding with account information in intelligent cipher key equipment Password)Or the ciphertext obtained after the original password is encrypted, can also be to user selection account information and The dynamic password that its corresponding information is calculated.
Wherein, after intelligent cipher key equipment shows above-mentioned item list to user, user can be according to currently used Situation selects corresponding account information.For example, user will currently use Internetbank, then user can select bank's card number.
After user completes the selection to account information, it is true to be sent to intelligent cipher key equipment that user can click on acknowledgement key Recognize information, correspondingly, the confirmation message that account information and user that intelligent cipher key equipment is selected according to user are sent, it can be true Determine the account information of user's selection.
As described above, each account information and corresponding password can be prestored in intelligent cipher key equipment, when user selects After selecting one of account information, intelligent cipher key equipment can obtain corresponding password according to the account information of the selection.Example Such as, after user selects bank's card number, intelligent cipher key equipment can obtain and bank's card number pair from pre-stored user data The password answered.Afterwards, in the specific implementation, the password of acquisition can be determined as first password, is using the close of plaintext at this time Code;Alternatively, can handle the password of acquisition, first password is obtained, processing can specifically include encryption, at this point, First password is encrypted password, alternatively, processing can also be specifically to generate dynamic password according to the password of acquisition, will be obtained As seed key dynamic password is calculated with reference to dynamic factor, at this point, first password is dynamic password in the password taken.When It so, can also be using the account information that user selects as seed key, alternatively, account information and password is close together as seed Dynamic password is calculated with reference to dynamic factor in key.It should be noted that seed key be generally number, account information and/or Letter in encrypted message etc. can be converted to number by the ASCII character table of comparisons.
It is above-mentioned that the corresponding password of account information is included with user data, obtain the corresponding password of account information, and according to obtaining The password taken is determined exemplified by first password.It is understood that as described above, user data can also include account information correspondence Site information and/or user-defined sundry item information, at this point, also can according to site information generate dynamic password, will The dynamic password of generation is determined as first password.Wherein it is possible to site information is converted into number first, afterwards again using dynamic Cryptographic algorithm carries out number computing, the corresponding dynamic password of generation site information.
It can be seen from the above, the account information selected according to the user determines first password, may be employed such as lower section Formula is realized:
According to the account information that the user selects, the account information pair with user selection is obtained from user data The password answered, wherein, the user data includes at least account information and password corresponding with the account information, certainly, It can also include site information, user-defined sundry item information etc.;The password of the acquisition is determined as described first Password alternatively, the password of the acquisition is encrypted, obtains the first password.
Alternatively,
According to the account information that the user selects, the account that the user selects is obtained from pre-stored user data One or more in family information and information corresponding with the account information of user selection, wherein, the user data Including at least account information and password corresponding with the account information, it is, of course, also possible to be made by oneself including site information, user Sundry item information of justice etc.;Using dynamic password computational algorithm, the information of the acquisition is carried out that dynamic password is calculated, The dynamic password is determined as the first password.
As described above, user can the entry self-defined to be stored, the user data that user stores in intelligent cipher key equipment The middle current account information to be used of selection, account information and its corresponding information(Such as site information, password etc.)In One or more, in the case where that can be converted to number, can be used as seed key, and it is close to calculate dynamic with reference to dynamic factor Code, for example, as seed key after account information is converted to number with corresponding site information.
S14:The first password is sent to the client by intelligent cipher key equipment, so as to described in client input First password.
Wherein, after intelligent cipher key equipment obtains the corresponding password with the account information of user's selection, will can directly be somebody's turn to do Password is sent to client, alternatively, after the password of acquisition is encrypted, the password after encryption is sent to client End.Alternatively, according to the relevant one or more information generation dynamic passwords of the account information selected with user of acquisition, this is moved State password is sent to client.
After client receives first password, it is possible to the first password is inputted in the position of input password, for example, For user when using Internetbank, first password can be input to Password Input position by client.
Afterwards, the first password progress login authentication of the input may be employed in client, for example, client will in certification The first password of Password Input position is sent to bank backstage, login authentication is carried out by bank backstage, to allow or refuse user It logs in.Specifically, if first password is in plain text, backstage is directly authenticated;If first password is ciphertext, backstage is right It is decrypted to obtain clear-text passwords, then is authenticated;If first password is dynamic password, backstage uses and intelligent key The identical dynamic password algorithm of equipment calculates the information for being stored in backstage, and result of calculation and first password are compared, with It is authenticated.
The present embodiment is by obtaining first password according to pre-stored user data and being sent to client so that client The password that end input is received from intelligent cipher key equipment, is not required user to be manually entered, can be user-friendly, also, according to The password of pre-stored user data generation client input, it is not required that user's memory cipher avoids using when account is numerous The problem of family is difficult to remember.In addition, the intelligent cipher key equipment of the present embodiment can be in several ways with client communication, it can be with Improve the scope of application.
In addition, item list corresponding with pre-stored user data in the intelligent cipher key equipment is shown in S12 Before, the above method can also include:The intelligent cipher key equipment stores the user data.
The intelligent cipher key equipment stores the user data and specifically includes:The intelligent cipher key equipment receives the user The operational order of input and the user data;The intelligent cipher key equipment carries out authentication to the user, and described After user is by authentication, by the write permission opening of the intelligent cipher key equipment to the user;By the user data It writes to the intelligent cipher key equipment.Specifically, operational order input by user can be user in intelligent cipher key equipment Add the instruction of new user data or to stored user data in intelligent cipher key equipment into edlin, modification, deletion Deng instruction.The identity of user can be verified according to PIN code input by user.
In addition, before the intelligent cipher key equipment receives operational order input by user and the user data, may be used also To activate the information storage function of intelligent cipher key equipment, specifically include:It is defeated on the intelligent cipher key equipment to receive the user The active coding entered, and the active coding is verified into line activating and activates the intelligent key after activation is verified and is set Standby information storage function;Pass through alternatively, receiving the activation request that the user is sent by the client with the user The active coding of the client input, and the active coding into line activating is verified and institute is activated after activation is verified The information storage function of intelligent cipher key equipment is stated, wherein, described information store function, which is used to implement, writes the user data To the intelligent cipher key equipment.
In one embodiment, provide a kind of information storage function for enabling intelligent cipher key equipment and carry out data storage Mode specifically includes:The open command input by user is received, and the intelligent key is enabled according to the open command and is set Standby information storage function.
In addition, the intelligent cipher key equipment receives operational order input by user and the user data specifically includes:It is logical The operation interface and control button for crossing the intelligent cipher key equipment offer receive the operational order and the user data;Or The operational order and the user data that external equipment is sent are received by communication interface.Specifically, user can pass through The keyboard that intelligent cipher key equipment provides(For example, physical keyboard or dummy keyboard)It inputs operation instruction and user data.User Intelligent cipher key equipment can be also connected to client, on the client the corresponding management application program of installation, in management using journey It is input operation instruction in the operation interface of sequence by equipment such as mouse, keyboard, touch-screens and user data, then passes through client Communication interface operational order and user data are sent to intelligent cipher key equipment.
In addition, being write by the user data to before the intelligent cipher key equipment, the method further includes:The intelligence Can key devices receive checking request to the intelligent cipher key equipment that the user sent by the client and random Number, and according to the private key of the intelligent cipher key equipment random number is encrypted and according to the checking request by institute The digital certificate and encrypted random number for stating intelligent cipher key equipment are sent to the client;The client is according to root certificate The digital certificate of the intelligent cipher key equipment is verified, and according to the public key of the intelligent cipher key equipment to the encryption after Random number be decrypted and the random number after decryption verified.Before user data is stored, intelligent key is verified The identity of equipment ensures its reliability.
It is write by user data to before intelligent cipher key equipment, shows the user data;It is described by the number of users It is specially according to write-in to the intelligent cipher key equipment:Refer in the confirmation for receiving the user data of the user to showing After order, the intelligent cipher key equipment stores the user data.It can also be to intelligent cipher key equipment digital certificate and at random It is several be verified after, show user data or just display the user's data after user data is received.It is true by user It is stored again after recognizing, it is ensured that the correctness of the data of user's storage.
In addition, the intelligent cipher key equipment receives operational order input by user and the user data specifically includes:(1) The intelligent cipher key equipment receives the user data ciphertext that the client is sent, and according to the private key of the intelligent cipher key equipment The user data ciphertext is decrypted to obtain the user data, wherein, the client is according to the intelligent cipher key equipment Public key to the ciphering user data to generate the user data ciphertext;Alternatively,(2)The intelligent cipher key equipment receives institute The session key ciphertext and user data ciphertext of client transmission are stated, and according to the private key of the intelligent cipher key equipment to the meeting Words key ciphertext decrypts to obtain session key and the user data ciphertext is decrypted to obtain according to the session key The user data, wherein, the client generates session key at random, and according to the public key of the intelligent cipher key equipment to institute State session key encryption with generate the session key ciphertext and according to the session key to the ciphering user data with Generate the user data ciphertext.Ensure security of the user data in transmission.
Fig. 2 is the method that client password input is carried out by intelligent cipher key equipment that another embodiment of the present invention proposes Flow diagram, this method include:
S21:Client terminal device to intelligent cipher key equipment send password output request, so as to the intelligent cipher key equipment according to The password output request, shows item list corresponding with pre-stored user data in the intelligent cipher key equipment, with And the intelligent cipher key equipment is caused to determine the account information that user selects in the item list, and selected according to the user The account information selected determines first password, wherein, the user data includes account information and corresponding password, and described first is close Code is the password for login authentication;
Wherein, client terminal device is, for example, PC, mobile phone or tablet computer etc..
Client terminal device can be after the login password input request of cipher authentication side's transmission is received, and this of transmission is close Code output request, cipher authentication side is such as bank backstage, Third-party payment platform or mailbox authentication platform.
Receiving the flow performed after password output request for intelligent cipher key equipment can be referring specifically to other embodiment In the description as described in intelligent cipher key equipment side, details are not described herein.
S22:Client terminal device receives the first password that the intelligent cipher key equipment is sent.Optionally, the reception The first password that the intelligent cipher key equipment is sent, including:Receive the intelligent cipher key equipment is sent using USB modes first Password;Alternatively, receive the first password that the intelligent cipher key equipment uses tone code mode to send;Alternatively, it is close to receive the intelligence Key equipment uses the first password that wireless mode is sent.
S23:Client terminal device inputs the first password.For example, client terminal device by the Password Input to log in when institute The position of password need to be inputted.Afterwards, which can also be sent to the authenticating parties such as bank backstage and carried out by client terminal device Cipher authentication, to allow or refuse user's login.
The present embodiment is by indicating intelligent key devices output password, and the first password that intelligent cipher key equipment is sent Input, can realize automatically entering for password, be inputted without user, can be user-friendly.
Fig. 3 is the method that client password input is carried out by intelligent cipher key equipment that another embodiment of the present invention proposes Flow diagram, the present embodiment using intelligent cipher key equipment as USB key, client be PC exemplified by, and, using user using Internetbank as Example and, to obtain the corresponding password of account information, and be transmitted as again after password is encrypted after obtaining password Example.Referring to Fig. 3, the present embodiment includes:
S301:When user will log in Internetbank, bank backstage sends login password input request to PC.Since Internetbank logs in When need input password, therefore, at this time bank backstage can send login password input request, so as to user input log in it is close Code.
S302:PC sends password output request to USB key.The present embodiment in order to facilitate user operation, by account pair The password answered is stored in USB key, is directly obtained Password Input from USB key afterwards rather than is manually entered by user, Therefore, in order to obtain password, PC can send password output request to USB key.
In correlation technique, microcontroller or intelligent card chip built in USB key have certain memory space, can store use The private key and digital certificate at family.The certification to user identity is realized using the public key algorithm built in USB key.Two generation USB Key adds a physical button from hardware state, and adds display module or voice module, can be being sent to USB Transaction data in key shows or enters for out.Prevent transaction data and be submitted to USB key processes in subscription client In the danger that is tampered.And USB key have certain access control safety, USB key have in itself there are one PIN it is close Code, user needs to correctly enter password ability normal use before USB key functions are used, and continuous mistake input is more than Certain number will be automatically locked, and effectively prevent malice from cracking.
People have well solved the problem of network security authentication using USB Key technologies at present, and extensively It is general to be applied to e-Bank payment field.The high safety characteristic of USB key ensures the private key of user and the safety of certificate.
But in correlation technique, using USB key carry out network bank business when still need user manually input account with And login password, it is relatively time consuming laborious for more complicated Password Input.
And in the present embodiment, the account information of user and corresponding password are stored in advance in USB key, it is defeated when needing When entering password, export password is inputted directly from USB key is manually entered with substituting.
S303:USB key show item list corresponding with stored user data in key.
Since the account that user may use is numerous, for example, user may use Internetbank, Third-party payment, electronics Mailbox, social network sites etc. in order to avoid user remembers numerous passwords, can deposit these account informations and corresponding password Storage, can be by the presentation of information of each entry of storage to user, by user when user needs a certain password in USB key Select currently used account information.
S304:User selects currently used account information from the item list.For example, user can be existed by button An entry to be selected is selected in multiple entries.In addition, user can confirm and use by clicking on acknowledgement key after completing to select The selection at family.
S305:USB key obtain the corresponding password of account information of selection from pre-stored user data.
Since the user data in USB key is the corresponding account letter for preserving account information and password, being selected according to user Breath finds corresponding password.
In correlation technique, if multiple accounts and password are arranged to incoherent by user, user is difficult to remember simultaneously easily Forget.And if user for the ease of remembering and when being not easy to forget, can select the combination of same or like feature as password, But the larger numerous passwords of relevance will directly threaten the safety of other accounts, it believed once wherein some is cracked Breath safeguard protection has brought great hidden danger.
And in the present embodiment, since password is stored in USB key, artificial memory is not required, therefore, in order to ensure safety Property, it avoids the password of attacker's one account of decoding that from can obtaining the password of other accounts, different account informations can be set Corresponding password is uncorrelated.
S306:The password of acquisition is encrypted in USB key, obtains ciphertext.Optionally, can receive user Confirmation message after the password of acquisition is encrypted.For example, after USB key obtain password, can be shown to user is It is no to confirm encryption, if user clicks acknowledgement key, then the password that will be obtained is encrypted, otherwise without encryption Processing.
In order to enable bank backstage can correctly decrypt, the Encryption Algorithm that USB key are used when being encrypted be with Bank's algorithm for making an appointment of backstage, afterwards bank be decrypted using the engagement arithmetic.
S307:The ciphertext is sent to PC by USB key.Optionally, USB key are displayed whether obtaining ciphertext rear line Confirm and send, after user clicks on acknowledgement key, ciphertext is sent to PC by USB key.
S308:The ciphertext is input to Password Input position by PC.It wherein, can be close by this after USB key receive ciphertext The position of required input password when text is input to login.For example, when Internetbank logs in, Password Input column can be shown, PC is by the ciphertext It is input to the input field.
Since input password generally is intended to carry out login authentication, this method can also include:
S309:The ciphertext is sent to bank backstage by PC.It wherein, can be defeated by the ciphertext after USB key receive ciphertext Enter to the position of required input password when logging in.In bank authentication, the information of Password Input position can be sent to bank by PC From the background, also it is achieved that and ciphertext is sent to bank backstage.
S310:The ciphertext of reception is decrypted in bank backstage, obtains the password of plaintext.As described above, after bank Platform, which may be employed, is decrypted the ciphertext of reception with the algorithm that USB key make an appointment.
S311:Bank backstage is authenticated the password of plaintext, judges whether the password of the plaintext is correct, if correctly, holding Row S312, otherwise performs S313.Wherein, bank backstage can pre-save the password of user, by compare the password of plaintext with The password pre-saved, it can be determined that whether correct go out the clear-text passwords obtained after decryption.
S312:It logins successfully.For example, bank backstage sends login success message to PC, PC receives login success message After can confirm that user is allowed to log in, page etc. after logging in can be shown to user afterwards.
S313:Login failure.For example, bank backstage sends login failure message to PC, PC receives login failure message After can to user show login failure.
It should be noted that above-mentioned intelligent cipher key equipment is USB key, it is to be understood that other intelligent keys Equipment, such as audio key, bluetooth key etc. can also be implemented.Above-mentioned client is PC, it is to be understood that other Client, for example, mobile phone, tablet computer etc. can also implement.Above-mentioned is that user uses Internetbank, it is to be understood that is used Family can also be in other usage scenarios, for example, user is carrying out Third-party payment, client can be put down to Third-party payment at this time Platform is authenticated, other usage scenarios can also be with reference to the respective handling flow on bank backstage.
The present embodiment from pre-stored user data by obtaining password so that client input is set from intelligent key The standby password received, is not required user to be manually entered, can be user-friendly, also, password is prestored, also not User's memory cipher is needed, avoids the problem that user is difficult to remember when account is numerous.In addition, the present embodiment is close by prestoring Code, the corresponding password of different accounts can be arranged to uncorrelated, therefore can be to avoid numerous password correlations when generate crack The password of one account just threatens the problem of other account passwords, improves the security of each account password.It is right that the present embodiment passes through The password of acquisition is encrypted, it is ensured that security when password transmits.
Fig. 4 is the method that client password input is carried out by intelligent cipher key equipment that another embodiment of the present invention proposes Flow diagram, the present embodiment using intelligent cipher key equipment as USB key, client be PC exemplified by, and, using user using Internetbank as Example and, to obtain the corresponding password of account information, and passed again according to the password of acquisition generation dynamic password after password is obtained Exemplified by defeated.Referring to Fig. 4, the present embodiment includes:
S401:When user will log in Internetbank, bank backstage sends login password input request to PC.S402:PC is to USB Key sends password output request.
S403:USB key show item list corresponding with stored user data in key.
S404:User selects currently used account information from the item list.
S405:USB key obtain the corresponding password of account information of selection from pre-stored user data.
S406:USB key generate dynamic password according to the password of acquisition.Wherein, dynamic password is with time of setting etc. Variable and change automatically, dynamic random generation.
In the present embodiment, bank backstage and USB key can make an appointment operational factor and operation method.Bank backstage and USBkey, using identical operation method, can generate identical dynamic password with identical operational factor.It is included in operational factor Seed key, time factor, event factor etc..Therefore the dynamic password that user uses every time is different from, even if hacker intercepts and captures Password, also can not be using this password come the identity of counterfeit validated user, because in addition logging in must use next time One dynamic password.Dynamic password can effectively protect the certification of transaction and login safe, prevent invader's malicious sabotage resource, It can effectively solve the problems, such as to invade as caused by cryptocompromise.In the present embodiment, USB key may be employed to be appointed in advance from the background with bank Fixed operational factor and the operation method made an appointment, calculate the password of acquisition, obtain dynamic password.
S407:The dynamic password is sent to PC by USB key.Optionally, USB key are obtaining dynamic password rear line It displays whether to confirm and send, after user clicks on acknowledgement key, dynamic password is sent to PC by USB key.
S408:The dynamic password is input to Password Input position by PC.It wherein, can after USB key receive dynamic password The position of required input password during the dynamic password being input to login.For example, when Internetbank logs in, Password Input can be shown The dynamic password is input to the input field by column, PC.
Since input password generally is intended to carry out login authentication, this method can also include:
S409:The dynamic password is sent to bank backstage by PC.Wherein, after USB key receive dynamic password, can incite somebody to action The position of required input password when the dynamic password is input to login.In bank authentication, PC can be by the letter of Password Input position Breath is sent to bank backstage, is also achieved that dynamic password being sent to bank backstage.
S410:Bank's hind computation dynamic password.Wherein, bank backstage can pre-save the password of user, afterwards, adopt With the operational factor and operation method made an appointment with USB key, the password pre-saved is calculated, it is close to obtain dynamic Code.
S411:The dynamic password that bank's backstage contrast conting obtains and the dynamic password received, judge that the dynamic received is close Whether code is correct, if correctly, performing S312, otherwise performing S313.Wherein, by comparing, dynamic password and calculating when reception During obtained dynamic password difference, it can be deduced that the dynamic password of reception is incorrect, when the dynamic password of reception is with being calculated Dynamic password it is identical when, it can be deduced that the dynamic password of reception is correct.
S412:It logins successfully.For example, bank backstage sends login success message to PC, PC receives login success message After can confirm that user is allowed to log in, page etc. after logging in can be shown to user afterwards.
S413:Login failure.For example, bank backstage sends login failure message to PC, PC receives login failure message After can to user show login failure.
It should be noted that above-mentioned intelligent cipher key equipment is USB key, it is to be understood that other intelligent keys Equipment, such as audio key, bluetooth key etc. can also be implemented.Above-mentioned client is PC, it is to be understood that other Client, for example, mobile phone, tablet computer etc. can also implement.Above-mentioned is that user uses Internetbank, it is to be understood that is used Family can also be in other usage scenarios, for example, user is carrying out Third-party payment, client can be put down to Third-party payment at this time Platform is authenticated, other usage scenarios can also be with reference to the respective handling flow on bank backstage.Part in embodiment illustrated in fig. 4 Particular content is similar with embodiment illustrated in fig. 3, can refer to embodiment illustrated in fig. 3 and is understood.
The present embodiment with calculate dynamic password using when seed key be obtain static state corresponding with account information it is close Exemplified by code, it is to be understood that seed key when calculating dynamic password can also be other information, as described in above-described embodiment Site information, that is, account information, password and corresponding site information can be included in the user data stored, selected according to user The account information selected can determine corresponding site information, generate dynamic password according to the site information afterwards.It is wherein it is possible to first Site information is first converted into number, then computing is carried out to number and obtains dynamic password.Site information can be specially website URL addresses or IP address.
The present embodiment from pre-stored user data by obtaining password so that client input is set from intelligent key The standby password received, is not required user to be manually entered, can be user-friendly, also, password is prestored, also not User's memory cipher is needed, avoids the problem that user is difficult to remember when account is numerous.In addition, the present embodiment is close by prestoring Code, the corresponding password of different accounts can be arranged to uncorrelated, therefore can be to avoid numerous password correlations when generate crack The password of one account just threatens the problem of other account passwords, improves the security of each account password.The present embodiment passes through root Dynamic password is generated according to the password of acquisition, dynamic password is authenticated, password can be reduced and be stolen risk, ensure user account Safety.
The structure diagram for the intelligent cipher key equipment that Fig. 5 proposes for another embodiment of the present invention, the intelligent cipher key equipment 50 Including receiving module 51, display module 52, determining module 53 and sending module 54.
Receiving module 51 is used to receive the password output request of client transmission;
Display module 52 be used for according to the password export ask, display with it is pre-stored in the intelligent cipher key equipment The corresponding item list of user data, wherein, the user data includes account information and corresponding password.User data is shown It has been described in detail before the item list shown, details are not described herein again.
Determining module 53 is selected for determining the account information that user selects in the item list according to the user The account information selected determines first password, wherein, the first password is the password for login authentication.First password can be The corresponding original password of account information of user's selection(It is stored in corresponding with account information close in intelligent cipher key equipment Code)Or the ciphertext obtained after the original password is encrypted, can also be to user selection account information and its The dynamic password that corresponding information is calculated.
As described above, each account information and corresponding password can be prestored in intelligent cipher key equipment, when user selects After selecting one of account information, intelligent cipher key equipment can obtain corresponding password according to the account information of the selection.Example Such as, after user selects bank's card number, intelligent cipher key equipment can obtain and bank's card number pair from pre-stored user data The password answered.Afterwards, in the specific implementation, the password of acquisition can be determined as first password, is using the close of plaintext at this time Code;Alternatively, can handle the password of acquisition, first password is obtained, processing can specifically include encryption, at this point, First password is encrypted password, alternatively, processing can also be specifically to generate dynamic password according to the password of acquisition, at this point, First password is dynamic password.It is of course also possible to the account information that user is selected is as seed key, alternatively, account is believed Dynamic password is calculated with reference to dynamic factor together as seed key in breath and password.It should be noted that seed key one As be that number, letter in account information and/or encrypted message etc. can be converted to number by the ASCII character table of comparisons.
It is above-mentioned that the corresponding password of account information is included with user data, obtain the corresponding password of account information, and according to obtaining The password taken is determined exemplified by first password.It is understood that user data is gone back except including account information and corresponding password It can include the corresponding site information of account information, user-defined sundry item information etc., at this point it is possible to which user is chosen Account information and its at least one of corresponding information be converted to number, as the seed key for calculating dynamic password and using, Particular content may refer to following embodiment.
Sending module 54 is used to the first password being sent to the client, so as to client input described the One password.
Wherein, after intelligent cipher key equipment obtains the corresponding password with the account information of user's selection, will can directly be somebody's turn to do Password is sent to client, alternatively, after the password of acquisition is encrypted, the password after encryption is sent to client End.Alternatively, according to one or more information generation dynamic passwords corresponding with the account information of user's selection of acquisition, this is moved State password is sent to client.
After client receives first password, it is possible to the first password is inputted in the position of input password, for example, For user when using Internetbank, first password can be input to Password Input position by client.Afterwards, this may be employed in client The first password of input carries out login authentication, for example, the first password of Password Input position is sent to by client in certification Bank backstage carries out login authentication, to allow or refuse user's login by bank backstage.
In one embodiment, the sending module 54 is specifically used for:The first password is sent to by visitor using USB modes Family end;Alternatively, the first password is sent to by client using tone code mode;Alternatively, using wireless mode by described first Password is sent to client.
The present embodiment is by obtaining first password according to pre-stored user data and being sent to client so that client The password that end input is received from intelligent cipher key equipment, is not required user to be manually entered, can be user-friendly, also, according to The password of pre-stored information generation client input, it is not required that user's memory cipher, user is difficult when avoiding account numerous The problem of to remember.In addition, the intelligent cipher key equipment of the present embodiment can improve in several ways with client communication The scope of application.
Fig. 6 is the structure diagram for the intelligent cipher key equipment that another embodiment of the present invention proposes, in the present embodiment, described the When one password is the password obtained after handling the password of the acquisition, the intelligent cipher key equipment 50 is in the reality shown in Fig. 5 On the basis of applying example, determining module 53 includes first module 531 and second unit 532.
First module 531 is used for the account information selected according to the user, is obtained from pre-stored user data With the corresponding password of account information of user selection, wherein, the user data include at least account information and with institute The corresponding password of account information is stated, it is, of course, also possible to the project letter stored including site information, other user-defined needs Breath etc.;
Second unit 532 is used to the password of the acquisition being determined as the first password, alternatively, to the close of the acquisition Code is encrypted, and obtains the first password.
Wherein, optionally, can be receive user confirmation message after the password of acquisition is encrypted.With intelligence It for example, after USB key obtain password, can display whether to confirm encryption to user, such as exemplified by key devices are USB key Fruit user clicks acknowledgement key, then the password that will be obtained is encrypted, otherwise without encryption.
In order to enable bank backstage can correctly decrypt, the Encryption Algorithm that USB key are used when being encrypted be with Bank's algorithm for making an appointment of backstage, afterwards bank be decrypted using the engagement arithmetic.
In another embodiment, the determining module 53 includes:Third unit, for the account selected according to the user Information obtains the account information of user's selection and the account with user selection from pre-stored user data One or more in the corresponding information of information, wherein, the user data include at least account information and with the account The corresponding password of information, it is, of course, also possible to need project information stored etc. including site information, user-defined other; Unit the 4th for using dynamic password computational algorithm, carries out the information of the acquisition dynamic password is calculated, by described in Dynamic password is determined as the first password.
In another embodiment, which can also include:First memory module, for storing the intelligence The private key and digital certificate of key devices;Second memory module 55, for storing the user data;Transceiver module, for connecing Receive operational order input by user and the user data;Access control module, for carrying out authentication to the user, and After the user is by authentication, by the write permission opening of second memory module to the user and by institute User data is stated to write to second memory module;And safety chip, for the generation and certification being digitally signed, with And it encrypts and decrypts.
In one embodiment, in the user data that second memory module 55 stores, different account informations are corresponding close Code is uncorrelated.
In addition, the intelligent cipher key equipment further includes:Control module is activated, it is close in the intelligence for receiving the user The active coding inputted in key equipment, and the active coding is verified into line activating and after activation is verified described in activation The information storage function of intelligent cipher key equipment;Alternatively, receive activation request and the institute that the user is sent by the client The active coding that user is inputted by the client is stated, and the active coding into line activating is verified and is led in activation verification Later the information storage function of the intelligent cipher key equipment is activated, wherein, described information store function is used to implement the use User data is write to the intelligent cipher key equipment.
Intelligent cipher key equipment can also include:Opening module, for receiving the open command input by user, and according to The open command enables the information storage function of the intelligent cipher key equipment.
Transceiver module can receive the operation by the operation interface and control button that the intelligent cipher key equipment provides Instruction and the user data;Alternatively, the operational order and the user that external equipment is sent are received by communication interface Data.
In addition, the transceiver module receive the user by the client send to the intelligent cipher key equipment Checking request and random number, the safety chip are encrypted the random number according to the private key of the intelligent cipher key equipment, And the transceiver module according to the checking request by the digital certificate of the intelligent cipher key equipment and encrypted random number It is sent to the client;Wherein, the client tests the digital certificate of the intelligent cipher key equipment according to root certificate Card, and according to the public key of the intelligent cipher key equipment the encrypted random number is decrypted and to after decryption with Machine number is verified.It can verify the identity of intelligent cipher key equipment, ensure its reliability.
The display module is additionally operable to receive the operational order input by user and the user in the transceiver module After data, show that the user data and the access control module receive the user couple in the transceiver module After the confirmation instruction of the user data shown, the user data is write into second memory module.Ensure to use The correctness of the data of family storage.
In addition, the transceiver module receives the user data ciphertext that client is sent, the safety chip is according to the intelligence Can the private keys of key devices the user data ciphertext is decrypted to obtain the user data, wherein, the client according to The public key of the intelligent cipher key equipment is to the ciphering user data to generate the user data ciphertext;Alternatively, the transmitting-receiving Module receives the session key ciphertext of client transmission and user data ciphertext, the safety chip are set according to the intelligent key Standby private key decrypts the session key ciphertext to obtain session key, and according to the session key to the user data Ciphertext decrypts to obtain the user data, wherein, the client generates session key at random, and according to the intelligent key The public key of equipment encrypts the session key to generate the session key ciphertext and according to the session key to described Ciphering user data is to generate the user data ciphertext.Ensure security of the user data in transmission.
It should be noted that the module division of intelligent cipher key equipment is not limited to shown in the present embodiment, for example, can set Transceiver module is realized and receives password output request, first password is sent to client and receive operational order and bank data Function.
The present embodiment from pre-stored user data by obtaining password so that client input is set from intelligent key The standby password received, is not required user to be manually entered, can be user-friendly, also, password is prestored, also not User's memory cipher is needed, avoids the problem that user is difficult to remember when account is numerous.In addition, the intelligent cipher key equipment of the present embodiment The scope of application can be improved in several ways with client communication.In addition, the present embodiment is by prestoring password, The corresponding password of different accounts can be arranged to uncorrelated, thus can be to avoid numerous password correlations when generate crack one The password of account just threatens the problem of other account passwords, improves the security of each account password.The present embodiment passes through to obtaining Password be encrypted, it is ensured that password transmit when security.Alternatively, the present embodiment passes through the password according to acquisition Dynamic password is generated, dynamic password is authenticated, password can be reduced and be stolen risk, ensures user account safety.Alternatively, this Embodiment carries out the site information of acquisition computing generation dynamic password, it is ensured that the diversity of dynamic password generating mode, Improve the scope of application.
Fig. 7 is the structure diagram for the client terminal device that another embodiment of the present invention proposes, which includes sending mould Block 71, receiving module 72 and input module 73.Wherein, client terminal device can be PC, mobile phone or tablet computer etc..
Sending module 71 be used for intelligent cipher key equipment send password output request, so as to the intelligent cipher key equipment according to The password output request, shows item list corresponding with pre-stored user data in intelligent cipher key equipment and makes It obtains the intelligent cipher key equipment and determines the account information that user selects in the item list, and selected according to the user Account information determines first password, wherein, the user data includes account information and corresponding password, and the first password is For the password of login authentication.
Client terminal device can be after the login password input request of cipher authentication side's transmission is received, and this of transmission is close Code output request, cipher authentication side is such as bank backstage, Third-party payment platform or mailbox authentication platform.It is close for intelligence Key equipment receive after password output request the flow that performs can referring specifically in other embodiment on intelligent cipher key equipment The description of side, details are not described herein.
Receiving module 72 is used to receive the first password that the intelligent cipher key equipment is sent.Optionally, the reception Module 72 is specifically used for:Receive the first password that the intelligent cipher key equipment uses USB modes to send;Alternatively, receive the intelligence Energy key devices use the first password that tone code mode is sent;It is sent out alternatively, receiving the intelligent cipher key equipment using wireless mode The first password sent.
Input module 73 is used to input the first password.For example, client terminal device by the Password Input to log in when institute The position of password need to be inputted.Afterwards, which can also be sent to the authenticating parties such as bank backstage and carried out by client terminal device Cipher authentication, to allow or refuse user's login.
The present embodiment is by indicating intelligent key devices output password, and the first password that intelligent cipher key equipment is sent Input, can realize automatically entering for password, be inputted without user, can be user-friendly.
The embodiment of the present invention additionally provides a kind of client device, which includes housing, processor, storage Device, circuit board and power circuit, wherein, circuit board is placed in the interior volume that housing surrounds, and processor and memory are arranged on On circuit board;Power circuit, for powering for each circuit or device of client device;Memory is used to store executable journey Sequence code;Processor is corresponding with executable program code to run by reading the executable program code stored in memory Program, for performing following steps:
S21’:Password output request is sent to intelligent cipher key equipment, so that the intelligent cipher key equipment is according to the password Output request shows item list corresponding with pre-stored user data in the intelligent cipher key equipment and causes institute It states intelligent cipher key equipment and determines the account information that user selects in the item list, and the account selected according to the user Information determines first password, wherein, the user data include account information and corresponding password, the first password be for The password of login authentication.Wherein, client device is, for example, PC, mobile phone or tablet computer etc..
Client device can be after the login password input request of cipher authentication side's transmission is received, and this of transmission is close Code output request, cipher authentication side is such as bank backstage, Third-party payment platform or mailbox authentication platform.It is close for intelligence Key equipment receive after password output request the flow that performs can referring specifically in other embodiment on intelligent cipher key equipment The description of side, details are not described herein.
S22’:Receive the first password that the intelligent cipher key equipment is sent.Optionally, the reception intelligence is close The first password that key equipment is sent, including:Receive the first password that the intelligent cipher key equipment uses USB modes to send;Alternatively, Receive the first password that the intelligent cipher key equipment uses tone code mode to send;It is used alternatively, receiving the intelligent cipher key equipment The first password that wireless mode is sent.
S23’:Input the first password.For example, client device by the Password Input to log in when required input password Position.
Afterwards, which can also be sent to the authenticating parties such as bank backstage and carry out cipher authentication by client device, To allow or refuse user's login.
The present embodiment is by indicating intelligent key devices output password, and the first password that intelligent cipher key equipment is sent Input, can realize automatically entering for password, be inputted without user, can be user-friendly.
It should be noted that in the description of the present invention, term " first ", " second " etc. are only used for description purpose, without It is understood that indicate or imply relative importance.In addition, in the description of the present invention, unless otherwise indicated, the meaning of " multiple " It is two or more.
Any process described otherwise above or method description are construed as in flow chart or herein, represent to include Module, segment or the portion of the code of the executable instruction of one or more the step of being used to implement specific logical function or process Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention Embodiment person of ordinary skill in the field understood.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combination thereof.Above-mentioned In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage Or firmware is realized.If for example, with hardware come realize in another embodiment, can be under well known in the art Any one of row technology or their combination are realized:With for the logic gates to data-signal realization logic function Discrete logic, have suitable combinational logic gate circuit application-specific integrated circuit, programmable gate array(PGA), scene Programmable gate array(FPGA)Deng.
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium In matter, the program upon execution, one or a combination set of the step of including embodiment of the method.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, it can also That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould The form that hardware had both may be employed in block is realized, can also be realized in the form of software function module.The integrated module is such as Fruit is realized in the form of software function module and is independent production marketing or in use, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment of the present invention or example.In the present specification, schematic expression of the above terms is not Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any One or more embodiments or example in combine in an appropriate manner.
Although the embodiment of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is impossible to limitation of the present invention is interpreted as, those of ordinary skill in the art within the scope of the invention can be to above-mentioned Embodiment is changed, changes, replacing and modification.

Claims (18)

  1. A kind of 1. method that client password input is carried out by intelligent cipher key equipment, which is characterized in that including:
    Intelligent cipher key equipment receives the password output request that client is sent;
    The intelligent cipher key equipment is exported according to the password and asked, display and pre-stored use in the intelligent cipher key equipment The corresponding item list of user data, wherein, the user data includes account information and corresponding password;Wherein, the user Data further include the entry of self-defined input;
    The intelligent cipher key equipment determines the account information that user selects in the item list, and is selected according to the user Account information determine first password, wherein, the first password be for login authentication password;
    The first password is sent to the client by the intelligent cipher key equipment, so as to client input described first Password.
  2. 2. according to the method described in claim 1, it is characterized in that, the account information selected according to the user determines the One password, including:
    According to the account information that the user selects, the account information pair with user selection is obtained from the user data The password answered;The password of the acquisition is determined as the first password or the password of the acquisition is encrypted, Obtain the first password;
    Alternatively,
    According to the account information that the user selects, obtained from the user data user selection account information and One or more in information corresponding with the account information of user selection;Using dynamic password computational algorithm, to described The information of acquisition carries out that dynamic password is calculated, and the dynamic password is determined as the first password.
  3. 3. method according to claim 1 or 2, which is characterized in that pre- in the display and the intelligent cipher key equipment Before the corresponding item list of user data first stored, the method further includes:
    The intelligent cipher key equipment stores the user data.
  4. 4. according to the method described in claim 3, it is characterized in that, the intelligent cipher key equipment stores the user data, bag It includes:
    The intelligent cipher key equipment receives the operational order input by user and the user data;
    The intelligent cipher key equipment carries out authentication to the user, and after the user is by authentication, by institute The write permission opening of intelligent cipher key equipment is stated to the user;
    The user data is write to the intelligent cipher key equipment.
  5. 5. according to the method described in claim 4, it is characterized in that, receive operation input by user in the intelligent cipher key equipment Before instruction and the user data, the method further includes:
    The active coding that the user inputs on the intelligent cipher key equipment is received, and the active coding is verified into line activating, And the information storage function of the intelligent cipher key equipment is activated after activation is verified;Pass through alternatively, receiving the user The active coding that the activation request and the user that the client is sent are inputted by the client, and to the active coding into The information storage function of the intelligent cipher key equipment is verified and activated after activation is verified to line activating, wherein, the letter Breath store function, which is used to implement, writes the user data to the intelligent cipher key equipment;And
    The open command input by user is received, and the information for enabling according to the open command intelligent cipher key equipment is deposited Store up function.
  6. 6. according to the method described in claim 4, it is characterized in that, intelligent cipher key equipment reception operation input by user refers to Order and the user data specifically include:
    The operation interface and control button provided by the intelligent cipher key equipment receives the operational order and the number of users According to;Or
    The operational order and the user data that external equipment is sent are received by communication interface.
  7. 7. it according to the method described in claim 4, it is characterized in that, is set writing the user data to the intelligent key Before standby, the method further includes:
    The intelligent cipher key equipment receives the verification to the intelligent cipher key equipment that the user is sent by the client Request and random number, and the random number is encrypted according to the private key of the intelligent cipher key equipment and is tested according to described The digital certificate of the intelligent cipher key equipment and encrypted random number are sent to the client by card request;
    The client verifies the digital certificate of the intelligent cipher key equipment according to root certificate, and close according to the intelligence The public key of key equipment is decrypted the encrypted random number and the random number after decryption is verified;
    Verifying that the digital certificate and the random number by rear, show the user data;
    Described write the user data to the intelligent cipher key equipment be specially:The user is being received to showing After the confirmation instruction of the user data, the intelligent cipher key equipment stores the user data.
  8. 8. according to the method described in claim 4, it is characterized in that, intelligent cipher key equipment reception operation input by user refers to Order and the user data specifically include:
    The intelligent cipher key equipment receives the user data ciphertext that the client is sent, and according to the intelligent cipher key equipment Private key decrypts the user data ciphertext to obtain the user data, wherein, the client is according to the intelligent key The public key of equipment is to the ciphering user data to generate the user data ciphertext;Alternatively,
    The intelligent cipher key equipment receives session key ciphertext and the user data ciphertext that the client is sent, and according to described The private key of intelligent cipher key equipment decrypts the session key ciphertext to obtain session key and according to the session key pair User data ciphertext decryption to obtain the user data, wherein, the client generates session key at random, and according to The public key of the intelligent cipher key equipment encrypts the session key to generate the session key ciphertext and according to the meeting Key is talked about to the ciphering user data to generate the user data ciphertext.
  9. A kind of 9. method that client password input is carried out by intelligent cipher key equipment, which is characterized in that including:
    Client sends password output request to intelligent cipher key equipment, so that the intelligent cipher key equipment is exported according to the password Request shows item list corresponding with pre-stored user data in the intelligent cipher key equipment, wherein, the number of users According to the entry for further including self-defined input;And the intelligent cipher key equipment is caused to determine that user selects in the item list Account information, and according to the user select account information determine first password, wherein, the user data include account Information and corresponding password, the first password are the password for login authentication;
    The client receives the first password that the intelligent cipher key equipment is sent;
    The client inputs the first password.
  10. 10. a kind of intelligent cipher key equipment, which is characterized in that including:
    Receiving module, the password for receiving client transmission export request;
    Display module is asked for being exported according to the password, display and pre-stored user in the intelligent cipher key equipment The corresponding item list of data, wherein, the user data includes account information and corresponding password;Wherein, the number of users According to the entry for further including self-defined input;
    Determining module, for determining account information that user selects in the item list, and selected according to the user Account information determines first password, wherein, the first password is the password for login authentication;
    Sending module, for the first password to be sent to the client, so that client input described first is close Code.
  11. 11. intelligent cipher key equipment according to claim 10, which is characterized in that the determining module includes:
    First module for the account information selected according to the user, is obtained from the user data and selected with the user The corresponding password of account information selected;
    Second unit, for the password of the acquisition to be determined as the first password, alternatively, being carried out to the password of the acquisition Encryption obtains the first password.
  12. 12. intelligent cipher key equipment according to claim 10, which is characterized in that the determining module includes:
    Third unit for the account information selected according to the user, obtains user's selection from the user data Account information and with the one or more in the corresponding information of account information of user selection;
    Unit the 4th for using dynamic password computational algorithm, to the information of the acquisition carries out that dynamic password is calculated, will The dynamic password is determined as the first password.
  13. 13. according to claim 10 to 12 any one of them intelligent cipher key equipment, which is characterized in that the intelligent cipher key equipment It further includes:
    First memory module, for storing the private key of the intelligent cipher key equipment and digital certificate;
    Second memory module, for storing the user data;
    Transceiver module, for receiving operational order input by user and the user data;
    Access control module, for carrying out authentication to the user, and after the user is by authentication, by institute The write permission opening of the second memory module is stated to write to the described second storage mould to the user and by the user data Block;And
    Safety chip, for the generation and certification and encryption and decryption being digitally signed.
  14. 14. intelligent cipher key equipment according to claim 13, which is characterized in that the intelligent cipher key equipment further includes:
    Control module is activated, for receiving the active coding that the user inputs on the intelligent cipher key equipment, and is swashed to described The information storage function of the intelligent cipher key equipment into line activating is verified and activated after activation is verified to code living;Alternatively, The active coding that the activation request that the user is sent by the client is inputted with the user by the client is received, And the information for verifying and being activated after activation is verified the intelligent cipher key equipment into line activating to the active coding stores Function, wherein, described information store function, which is used to implement, writes the user data to the intelligent cipher key equipment;
    Opening module, for receiving the open command input by user, and it is close according to the open command to enable the intelligence The information storage function of key equipment.
  15. 15. intelligent cipher key equipment according to claim 13, which is characterized in that the transceiver module is close by the intelligence The operation interface and control button that key equipment provides receive the operational order and the user data;Alternatively, it is connect by communication Mouth receives the operational order and the user data that external equipment is sent.
  16. 16. intelligent cipher key equipment according to claim 13, which is characterized in that the transceiver module receives the user and leads to The checking request and random number to the intelligent cipher key equipment that the client is sent are crossed, the safety chip is according to the intelligence Can key devices private key the random number is encrypted and the transceiver module according to the checking request by the intelligence The digital certificate of energy key devices and encrypted random number are sent to the client;Wherein, the client is demonstrate,proved according to root Book verifies the digital certificate of the intelligent cipher key equipment, and according to the public key of the intelligent cipher key equipment to the encryption Random number afterwards is decrypted and the random number after decryption is verified;
    The display module is additionally operable to receive the operational order input by user and the user data in the transceiver module Afterwards, show that the user data and the access control module receive the user to display in the transceiver module After the confirmation instruction of the user data gone out, the user data is write into second memory module.
  17. 17. intelligent cipher key equipment according to claim 13, which is characterized in that the transceiver module receives client and sends User data ciphertext, the safety chip user data ciphertext is decrypted according to the private key of the intelligent cipher key equipment with The user data is obtained, wherein, the client is according to the public key of the intelligent cipher key equipment to the ciphering user data To generate the user data ciphertext;Alternatively,
    The transceiver module receives session key ciphertext and the user data ciphertext that client is sent, and the safety chip is according to institute The private key for stating intelligent cipher key equipment decrypts the session key ciphertext to obtain session key, and according to the session key pair User data ciphertext decryption to obtain the user data, wherein, the client generates session key at random, and according to The public key of the intelligent cipher key equipment encrypts the session key to generate the session key ciphertext and according to the meeting Key is talked about to the ciphering user data to generate the user data ciphertext.
  18. 18. a kind of client terminal device, which is characterized in that including:
    Sending module, for sending password output request to intelligent cipher key equipment, so that the intelligent cipher key equipment is according to Password output request, shows item list corresponding with pre-stored user data in the intelligent cipher key equipment, wherein, In, the user data further includes the entry of self-defined input;And the intelligent cipher key equipment is caused to determine user described The account information selected in item list, and first password is determined according to the account information that the user selects, wherein, the use User data includes account information and corresponding password, and the first password is the password for login authentication;
    Receiving module, for receiving the first password that the intelligent cipher key equipment is sent;
    Input module, for inputting the first password.
CN201410132586.7A 2014-04-02 2014-04-02 Cipher-code input method, intelligent cipher key equipment and client terminal device Active CN103929307B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410132586.7A CN103929307B (en) 2014-04-02 2014-04-02 Cipher-code input method, intelligent cipher key equipment and client terminal device
PCT/CN2015/071852 WO2015149582A1 (en) 2014-04-02 2015-01-29 Password input method, intelligent secret key device and client apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410132586.7A CN103929307B (en) 2014-04-02 2014-04-02 Cipher-code input method, intelligent cipher key equipment and client terminal device

Publications (2)

Publication Number Publication Date
CN103929307A CN103929307A (en) 2014-07-16
CN103929307B true CN103929307B (en) 2018-06-01

Family

ID=51147392

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410132586.7A Active CN103929307B (en) 2014-04-02 2014-04-02 Cipher-code input method, intelligent cipher key equipment and client terminal device

Country Status (2)

Country Link
CN (1) CN103929307B (en)
WO (1) WO2015149582A1 (en)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103929307B (en) * 2014-04-02 2018-06-01 天地融科技股份有限公司 Cipher-code input method, intelligent cipher key equipment and client terminal device
CN106789848A (en) * 2015-11-23 2017-05-31 阿里巴巴集团控股有限公司 A kind of user key storage method and server
CN107026737B (en) * 2016-01-29 2021-02-09 李明 System for managing passwords through wearable equipment
CN106126149A (en) * 2016-06-30 2016-11-16 联想(北京)有限公司 A kind of method of information processing, electronic equipment and input equipment
CN106878245B (en) * 2016-07-18 2020-04-24 阿里巴巴集团控股有限公司 Graphic code information providing and obtaining method, device and terminal
CN106533683A (en) * 2016-11-11 2017-03-22 西安远眺网络科技有限公司 Equipment authentication method using national commercial cryptographic algorithm
ES2929464T3 (en) * 2016-11-26 2022-11-29 Huawei Tech Co Ltd Method for securely controlling a smart home appliance and terminal device
CN108092764B (en) * 2017-11-02 2021-06-15 捷开通讯(深圳)有限公司 Password management method and equipment and device with storage function
CN107896221B (en) * 2017-12-01 2019-11-12 北京深思数盾科技股份有限公司 A kind of account binding method and device
CN108549808B (en) * 2018-04-19 2022-03-04 北京华大智宝电子系统有限公司 Password management method and device
CN110581829A (en) * 2018-06-08 2019-12-17 中国移动通信集团有限公司 Communication method and device
CN109214147A (en) * 2018-09-28 2019-01-15 内蒙古师范大学 A kind of encryption system of accounting software
CN110399717B (en) * 2018-11-21 2023-03-14 腾讯科技(深圳)有限公司 Key acquisition method and device, storage medium and electronic device
CN109889342B (en) * 2018-12-15 2023-07-18 中国平安人寿保险股份有限公司 Interface test authentication method and device, electronic equipment and storage medium
CN110247758B (en) * 2019-05-30 2023-03-24 天翼数字生活科技有限公司 Password management method and device and password manager
CN110430043B (en) * 2019-07-05 2022-11-08 视联动力信息技术股份有限公司 Authentication method, system and device and storage medium
CN110704254A (en) * 2019-09-03 2020-01-17 福建升腾资讯有限公司 Key controller, method and system for automatically testing POS transaction at low cost
CN112039901B (en) * 2020-09-02 2023-06-13 联仁健康医疗大数据科技股份有限公司 Data transmission method, device and system
CN112685698A (en) * 2020-12-07 2021-04-20 湖南麒麟信安科技股份有限公司 Software authorization method and system based on USB Key
CN113132369A (en) * 2021-04-12 2021-07-16 西安赤鸾信息科技有限公司 Android mobile phone password automatic filling method and device
CN113472793B (en) * 2021-07-01 2023-04-28 中易通科技股份有限公司 Personal data protection system based on hardware password equipment
CN114553409B (en) * 2022-02-24 2023-08-08 广东电网有限责任公司 Password authentication method, system, device, storage medium, and program product
CN115296854A (en) * 2022-07-08 2022-11-04 中金金融认证中心有限公司 Method for binding intelligent cipher key and terminal and related product

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008099756A1 (en) * 2007-02-07 2008-08-21 Nippon Telegraph And Telephone Corporation Client device, key device, service providing device, user authentication system, user authentication method, program, and recording medium
CN101697537A (en) * 2009-10-20 2010-04-21 宇龙计算机通信科技(深圳)有限公司 Access method for internet, system and mobile terminal
CN101895513A (en) * 2009-05-20 2010-11-24 广州盛华信息技术有限公司 Log-in authentication system for service website and implementation method
CN201717885U (en) * 2010-03-12 2011-01-19 薛明 Code providing equipment and code identification system
CN103336746A (en) * 2013-06-19 2013-10-02 江苏意源科技有限公司 Safety encrypted USB (Universal Serial Bus) flash disk and data encryption method thereof

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008282096A (en) * 2007-05-08 2008-11-20 Winbond Electron Corp Account password output device
CN102932341B (en) * 2012-10-25 2016-01-13 小米科技有限责任公司 A kind of cipher processing method, device and equipment
CN103023875B (en) * 2012-11-21 2015-09-02 北京荣之联科技股份有限公司 A kind of account management system and method
CN102970299B (en) * 2012-11-27 2015-06-03 西安电子科技大学 File safe protection system and method thereof
CN103929307B (en) * 2014-04-02 2018-06-01 天地融科技股份有限公司 Cipher-code input method, intelligent cipher key equipment and client terminal device
CN103929306B (en) * 2014-04-02 2016-04-06 天地融科技股份有限公司 The approaches to IM of intelligent cipher key equipment and intelligent cipher key equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008099756A1 (en) * 2007-02-07 2008-08-21 Nippon Telegraph And Telephone Corporation Client device, key device, service providing device, user authentication system, user authentication method, program, and recording medium
CN101895513A (en) * 2009-05-20 2010-11-24 广州盛华信息技术有限公司 Log-in authentication system for service website and implementation method
CN101697537A (en) * 2009-10-20 2010-04-21 宇龙计算机通信科技(深圳)有限公司 Access method for internet, system and mobile terminal
CN201717885U (en) * 2010-03-12 2011-01-19 薛明 Code providing equipment and code identification system
CN103336746A (en) * 2013-06-19 2013-10-02 江苏意源科技有限公司 Safety encrypted USB (Universal Serial Bus) flash disk and data encryption method thereof

Also Published As

Publication number Publication date
CN103929307A (en) 2014-07-16
WO2015149582A1 (en) 2015-10-08

Similar Documents

Publication Publication Date Title
CN103929307B (en) Cipher-code input method, intelligent cipher key equipment and client terminal device
JP6264674B2 (en) Authentication system and method using QR code
CN103929306B (en) The approaches to IM of intelligent cipher key equipment and intelligent cipher key equipment
Garfinkel et al. Usable security: History, themes, and challenges
US8656180B2 (en) Token activation
US8555079B2 (en) Token management
CN104270517B (en) Information ciphering method and mobile terminal
CN103905188B (en) Utilize the method and intelligent cipher key equipment of intelligent cipher key equipment generation dynamic password
CN103905204B (en) The transmission method and Transmission system of data
CN107579817A (en) User ID authentication method, apparatus and system based on block chain
CN106575334A (en) Accessing a secured software application
CN108234115A (en) The verification method of information security, device and system
JP2019530265A (en) Method and apparatus for providing and acquiring graphic code information and terminal
CN106326763A (en) Method and device for obtaining electronic file
JP2015130633A (en) authentication system
CN108447154A (en) Safe unlocking method and device, encryption and decryption method and device, lock and server
KR20210046357A (en) Method and apparatus for key storing and recovery for blockchain based system
CN109981665A (en) Resource provider method and device, resource access method and device and system
CN105187382A (en) Multi-factor identity authentication method for preventing library collision attacks
CN108199847A (en) Security processing method, computer equipment and storage medium
WO2017050152A1 (en) Password security system adopted by mobile apparatus and secure password entering method thereof
Mahinderjit Singh et al. A novel out-of-band biometrics authentication scheme for wearable devices
CN107124407A (en) Data transmission method, device, readable storage medium storing program for executing, electronic equipment and system
CN201717885U (en) Code providing equipment and code identification system
US10445510B2 (en) Data checking apparatus and method using same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant