CN103929307B - Cipher-code input method, intelligent cipher key equipment and client terminal device - Google Patents
Cipher-code input method, intelligent cipher key equipment and client terminal device Download PDFInfo
- Publication number
- CN103929307B CN103929307B CN201410132586.7A CN201410132586A CN103929307B CN 103929307 B CN103929307 B CN 103929307B CN 201410132586 A CN201410132586 A CN 201410132586A CN 103929307 B CN103929307 B CN 103929307B
- Authority
- CN
- China
- Prior art keywords
- password
- user
- intelligent cipher
- cipher key
- key equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
- Telephone Function (AREA)
Abstract
The present invention proposes a kind of method, intelligent cipher key equipment and client terminal device that client password input is carried out by intelligent cipher key equipment, user-friendly to realize that password automatically enters.This method includes:Intelligent cipher key equipment receives the password output request that client is sent;It is exported and asked according to the password, show item list corresponding with pre-stored user data in the intelligent cipher key equipment, the user data includes account information and corresponding password;It determines the account information that user selects in the item list, and first password is determined according to the account information that the user selects, the first password is the password for login authentication;The first password is sent to the client.This method can realize that password automatically enters, user-friendly.
Description
Technical field
The present invention relates to technical field of network information safety more particularly to one kind to carry out client by intelligent cipher key equipment
Method, intelligent cipher key equipment and the client terminal device of Password Input.
Background technology
Password technology is one of safety and secrecy provision the most in current network information system, Internetbank, Third-party payment, each
The social class website log of kind shopping is required for setting corresponding account and login password.With the development of networked information era, people
Online activities it is increased, just have more and more accounts and password etc. need user go set and accurately remember.
If numerous accounts and password are required for user artificially to remember, then undoubtedly the memory capability of user can be caused
Greatly test, also, when user is manually entered password, also compares and take time and effort.
The content of the invention
It is contemplated that it solves at least some of the technical problems in related technologies.
For this purpose, client password input is carried out by intelligent cipher key equipment an object of the present invention is to provide a kind of
Method, this method may not need user's memory and be manually entered password, realize that password automatically enters, user-friendly.
It is another object of the present invention to propose a kind of intelligent cipher key equipment.
It is another object of the present invention to propose a kind of client terminal device.
In order to achieve the above objectives, it is close that first aspect present invention embodiment proposed carries out client by intelligent cipher key equipment
The method of code input, including:Intelligent cipher key equipment receives the password output request that client is sent;The intelligent cipher key equipment root
It exports and asks according to the password, show item list corresponding with pre-stored user data in the intelligent cipher key equipment,
Wherein, the user data includes account information and corresponding password;The intelligent cipher key equipment determines user in the entry
The account information selected in list, and first password is determined according to the account information that the user selects, wherein, described first is close
Code is the password for login authentication;The first password is sent to the client by the intelligent cipher key equipment, with toilet
It states client and inputs the first password.
In addition, the account information selected according to the user determines first password, including:It is selected according to the user
Account information, the corresponding password of account information selected with the user is obtained from the user data;By the acquisition
Password be determined as the first password or the password of the acquisition be encrypted, obtain the first password;Or
Person, according to the account information that the user selects, obtained from the user data user selection account information and
One or more in information corresponding with the account information of user selection;Using dynamic password computational algorithm, to described
The information of acquisition carries out that dynamic password is calculated, and the dynamic password is determined as the first password.
In addition, corresponding with pre-stored user data in the intelligent cipher key equipment item list of the display it
Before, the method further includes:The intelligent cipher key equipment stores the user data.
In addition, the intelligent cipher key equipment stores the user data, including:The intelligent cipher key equipment receives the use
The operational order and the user data of family input;The intelligent cipher key equipment carries out authentication to the user, and in institute
After user is stated by authentication, by the write permission opening of the intelligent cipher key equipment to the user;By the number of users
According to write-in to the intelligent cipher key equipment.
In addition, before the intelligent cipher key equipment receives operational order input by user and the user data, it is described
Method further includes:The active coding that the user inputs on the intelligent cipher key equipment is received, and the active coding is swashed
Verification living and the information storage function that the intelligent cipher key equipment is activated after activation is verified;Alternatively, receive the use
The active coding that the activation request and the user that family is sent by the client are inputted by the client, and swash to described
The information storage function of the intelligent cipher key equipment into line activating is verified and activated after activation is verified to code living, wherein,
Described information store function, which is used to implement, writes the user data to the intelligent cipher key equipment;And receive the use
The open command of family input, and enable according to the open command information storage function of the intelligent cipher key equipment.
In addition, the intelligent cipher key equipment receives operational order input by user and the user data specifically includes:It is logical
The operation interface and control button for crossing the intelligent cipher key equipment offer receive the operational order and the user data;Or
The operational order and the user data that external equipment is sent are received by communication interface.
In addition, being write by the user data to before the intelligent cipher key equipment, the method further includes:The intelligence
Can key devices receive checking request to the intelligent cipher key equipment that the user sent by the client and random
Number, and according to the private key of the intelligent cipher key equipment random number is encrypted and according to the checking request by institute
The digital certificate and encrypted random number for stating intelligent cipher key equipment are sent to the client;The client is according to root certificate
The digital certificate of the intelligent cipher key equipment is verified, and according to the public key of the intelligent cipher key equipment to the encryption after
Random number be decrypted and the random number after decryption verified;Verifying the digital certificate and the random number
By rear, the user data is shown;Described write the user data to the intelligent cipher key equipment be specially:It is receiving
After the confirmation of the user data to the user to showing instructs, the intelligent cipher key equipment stores the number of users
According to.
In addition, the intelligent cipher key equipment receives operational order input by user and the user data specifically includes:Institute
It states intelligent cipher key equipment and receives the user data ciphertext that the client is sent, and according to the private key pair of the intelligent cipher key equipment
The user data ciphertext decrypts to obtain the user data, wherein, the client is according to the intelligent cipher key equipment
Public key is to the ciphering user data to generate the user data ciphertext;Alternatively, the intelligent cipher key equipment receives the visitor
The session key ciphertext and user data ciphertext that family end is sent, and it is close to the session according to the private key of the intelligent cipher key equipment
The decryption of key ciphertext is to obtain session key and the user data ciphertext is decrypted with described in obtaining according to the session key
User data, wherein, the client generates session key at random, and according to the public key of the intelligent cipher key equipment to the meeting
The encryption of words key with generate the session key ciphertext and according to the session key to the ciphering user data to generate
The user data ciphertext.
The method that client password input is carried out by intelligent cipher key equipment that first aspect present invention embodiment proposes, leads to
It crosses and first password is obtained according to pre-stored user data and is sent to client so that client input is set from intelligent key
The standby password received, is not required user to be manually entered, can be user-friendly, also, according to pre-stored user data
Generate the password of client input, it is not required that user's memory cipher avoids the problem that user is difficult to remember when account is numerous.
In order to achieve the above objectives, it is close that second aspect of the present invention embodiment proposed carries out client by intelligent cipher key equipment
The method of code input, including:Client sends password output request to intelligent cipher key equipment, so as to the intelligent cipher key equipment root
It exports and asks according to the password, show item list corresponding with pre-stored user data in the intelligent cipher key equipment,
And the intelligent cipher key equipment is caused to determine the account information that user selects in the item list, and according to the user
The account information of selection determines first password, wherein, the user data include account information and corresponding password, described first
Password is the password for login authentication;The client receives the first password that the intelligent cipher key equipment is sent;Institute
It states client and terminates the input first password.
The method that client password input is carried out by intelligent cipher key equipment that second aspect of the present invention embodiment proposes, leads to
Indicating intelligent key devices output password is crossed, and the first password that intelligent cipher key equipment is sent inputs, and can realize password
Automatically enter, without user input, can be user-friendly.
In order to achieve the above objectives, the intelligent cipher key equipment that third aspect present invention embodiment proposes, including:Receiving module,
Password for receiving client transmission exports request;Display module, for according to the password export ask, display with it is described
The corresponding item list of pre-stored user data in intelligent cipher key equipment, wherein, the user data includes account information
With corresponding password;Determining module, for determining account information that user selects in the item list, and according to the use
The account information of family selection determines first password, wherein, the first password is the password for login authentication;Sending module,
For the first password to be sent to the client, so that the client inputs the first password.
In addition, the determining module includes:First module, for the account information selected according to the user, from described
Password corresponding with the account information of user selection is obtained in user data;Second unit, for by the close of the acquisition
Code is determined as the first password, alternatively, the password of the acquisition is encrypted, obtains the first password.
In addition, the determining module includes:Third unit, for the account information selected according to the user, from described
It is obtained in user data in the account information of user's selection and information corresponding with the account information of user selection
One or more;Unit the 4th for using dynamic password computational algorithm, to the information of the acquisition be calculated dynamic
The dynamic password is determined as the first password by state password.
In addition, the intelligent cipher key equipment further includes:First memory module, for storing the private of the intelligent cipher key equipment
Key and digital certificate;Second memory module, for storing the user data;Transceiver module, for receiving behaviour input by user
Make instruction and the user data;Access control module for carrying out authentication to the user, and passes through in the user
After authentication, the write permission opening of second memory module is write to the user and by the user data
To second memory module;And safety chip, for the generation and certification and encryption and decryption being digitally signed.
In addition, the intelligent cipher key equipment further includes:Control module is activated, it is close in the intelligence for receiving the user
The active coding inputted in key equipment, and the active coding is verified into line activating and after activation is verified described in activation
The information storage function of intelligent cipher key equipment;Alternatively, receive activation request and the institute that the user is sent by the client
The active coding that user is inputted by the client is stated, and the active coding into line activating is verified and is led in activation verification
Later the information storage function of the intelligent cipher key equipment is activated, wherein, described information store function is used to implement the use
User data is write to the intelligent cipher key equipment;And opening module, for receiving the open command input by user, and root
The information storage function of the intelligent cipher key equipment is enabled according to the open command.
In addition, described in operation interface and control button that the transceiver module is provided by the intelligent cipher key equipment receive
Operational order and the user data;Alternatively, the operational order and described that external equipment sends is received by communication interface
User data.
In addition, the transceiver module receive the user by the client send to the intelligent cipher key equipment
Checking request and random number, the safety chip are encrypted the random number according to the private key of the intelligent cipher key equipment,
And the transceiver module according to the checking request by the digital certificate of the intelligent cipher key equipment and encrypted random number
It is sent to the client;Wherein, the client tests the digital certificate of the intelligent cipher key equipment according to root certificate
Card, and according to the public key of the intelligent cipher key equipment the encrypted random number is decrypted and to after decryption with
Machine number is verified;The display module is additionally operable to receive the operational order input by user and institute in the transceiver module
After stating user data, it is described to show that the user data and the access control module are received in the transceiver module
After user is to the confirmation instruction of the user data shown, the user data is write into second memory module.
In addition, the transceiver module receives the user data ciphertext that client is sent, the safety chip is according to the intelligence
Can the private keys of key devices the user data ciphertext is decrypted to obtain the user data, wherein, the client according to
The public key of the intelligent cipher key equipment is to the ciphering user data to generate the user data ciphertext;Alternatively, the transmitting-receiving
Module receives the session key ciphertext of client transmission and user data ciphertext, the safety chip are set according to the intelligent key
Standby private key decrypts the session key ciphertext to obtain session key, and according to the session key to the user data
Ciphertext decrypts to obtain the user data, wherein, the client generates session key at random, and according to the intelligent key
The public key of equipment encrypts the session key to generate the session key ciphertext and according to the session key to described
Ciphering user data is to generate the user data ciphertext.
The intelligent cipher key equipment that third aspect present invention embodiment proposes, by being obtained according to pre-stored user data
First password is simultaneously sent to client so that the password that client input is received from intelligent cipher key equipment is not required user manual
Input, can be user-friendly, also, the password of client input is generated according to pre-stored user data, is also not required to
User's memory cipher is wanted, avoids the problem that user is difficult to remember when account is numerous.
In order to achieve the above objectives, the client terminal device that fourth aspect present invention embodiment proposes, including:Sending module is used
In sending password output request to intelligent cipher key equipment, ask, show so that the intelligent cipher key equipment is exported according to the password
Show item list corresponding with pre-stored user data in the intelligent cipher key equipment and so that the intelligent key is set
The account information that standby definite user selects in the item list, and determine first according to the account information that the user selects
Password, wherein, the user data includes account information and corresponding password, and the first password is for the close of login authentication
Code;Receiving module, for receiving the first password that the intelligent cipher key equipment is sent;Input module, it is described for inputting
First password.
The client terminal device that fourth aspect present invention embodiment proposes, by indicating intelligent key devices output password, and
And the first password for sending intelligent cipher key equipment inputs, and can realize automatically entering for password, is inputted without user, Ke Yifang
Just user's operation.
In order to achieve the above objectives, fifth aspect present invention embodiment propose client device, including housing, processor,
Memory, circuit board and power circuit, wherein, circuit board is placed in the interior volume that housing surrounds, and processor and memory are set
It puts on circuit boards;Power circuit, for powering for each circuit or device of client device;Memory is used to store and can hold
Line program code;Processor is run and executable program code pair by reading the executable program code stored in memory
The program answered, for performing following steps:Password output request is sent to intelligent cipher key equipment, so that the intelligent key is set
Standby exported according to the password is asked, and shows entry column corresponding with pre-stored user data in the intelligent cipher key equipment
Table and the intelligent cipher key equipment is caused to determine the account information that user selects in the item list, and according to described
The account information of user's selection determines first password, wherein, the user data includes account information and corresponding password, described
First password is the password for login authentication;Receive the first password that the intelligent cipher key equipment is sent;Described in input
First password.
The client device that fifth aspect present invention embodiment proposes, by indicating intelligent key devices output password, and
And the first password for sending intelligent cipher key equipment inputs, and can realize automatically entering for password, is inputted without user, Ke Yifang
Just user's operation.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partly become from the following description
It obtains substantially or is recognized by the practice of the present invention.
Description of the drawings
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments
Substantially and it is readily appreciated that, wherein:
Fig. 1 is the stream for the method that client password input is carried out by intelligent cipher key equipment that one embodiment of the invention proposes
Journey schematic diagram;
Fig. 2 is the method that client password input is carried out by intelligent cipher key equipment that another embodiment of the present invention proposes
Flow diagram;
Fig. 3 is the method that client password input is carried out by intelligent cipher key equipment that another embodiment of the present invention proposes
Flow diagram;
Fig. 4 is the method that client password input is carried out by intelligent cipher key equipment that another embodiment of the present invention proposes
Flow diagram;
Fig. 5 is the structure diagram for the intelligent cipher key equipment that another embodiment of the present invention proposes;
Fig. 6 is the structure diagram for the intelligent cipher key equipment that another embodiment of the present invention proposes;
Fig. 7 is the structure diagram for the client terminal device that another embodiment of the present invention proposes.
Specific embodiment
The embodiment of the present invention is described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end
Same or similar label represents same or similar element or has the function of same or like element.Below with reference to attached
The embodiment of figure description is exemplary, and is only used for explaining the present invention, and is not considered as limiting the invention.On the contrary, this
The embodiment of invention includes falling into all changes in the range of the spirit and intension of attached claims, modification and equivalent
Object.
Fig. 1 is the stream for the method that client password input is carried out by intelligent cipher key equipment that one embodiment of the invention proposes
Journey schematic diagram, this method include:
S11:Intelligent cipher key equipment receives the password output request that client is sent;
Wherein, intelligent cipher key equipment can be the equipment for having storage capacity, for example, universal serial bus(Universal
Serial Bus, USB)Key, tone code key, the key that can be carried out wireless communication, correspondingly, intelligent cipher key equipment can pass through USB
Mode, tone code mode or wireless mode and client communication, wherein, wireless mode can include bluetooth approach, wifi modes
Or infrared mode etc..Specifically, USB modes can refer to that intelligent cipher key equipment passes through USB interface and client communication, tone code
Mode can refer to intelligent cipher key equipment by audio interface or loud speaker and client communication, and wireless mode can refer to intelligence
Energy key devices communicate after establishing wireless connection with client.
Client can refer to the equipment that user carries out network entry, for example, PC(Personal Computer,
PC), mobile phone, tablet computer etc..
When user will log in a certain account on the client, for example, it is necessary to which user's input is close when user uses Internetbank
Code, at this point, client can send password output request to intelligent cipher key equipment, it is corresponding close to be obtained from intelligent cipher key equipment
Code.In addition, the password in the embodiment of the present invention is referred to as password.
S12:Intelligent cipher key equipment is exported according to the password and asked, display and pre-stored use in intelligent cipher key equipment
The corresponding item list of user data, the user data include account information and corresponding password;
Wherein, each account information that user can use and corresponding close can be prestored in intelligent cipher key equipment
Code, for example, user may use Internetbank, Third-party payment and E-mail address, then can be preserved in intelligent cipher key equipment
Bank's card number and corresponding password, the user name of Third-party payment and corresponding password and, the user name of E-mail address and right
The password answered.In intelligent cipher key equipment password brocade is properly termed as storing the module of each account information and corresponding password
Capsule.
After intelligent cipher key equipment receives password output request, item corresponding with stored user data can be shown
Mesh list(It is of course also possible to it shows otherwise)It selects to log in for user and needs account to be used, carried out with above-mentioned example
Illustrate, then can show the user name of bank's card number, the user name of Third-party payment and E-mail address.
It is understood that including at least account in the item list of display, account and corresponding password can also be included,
For example, display bank's card number and corresponding password, the user name of Third-party payment and the use of corresponding password and E-mail address
Name in an account book and corresponding password.
It is above-mentioned by taking user data includes account information and corresponding password as an example, it is to be understood that user data may be used also
To include other information, such as the corresponding site information of account information, for example, user stores Taobao in intelligent cipher key equipment
Website name, user name(That is account information)With corresponding password.
It should be noted that user can the project self-defined to be stored, i.e., to be stored according to the increase and decrease of oneself demand
Project for example, the user data of user's storage can be web site name, log in the account of the website and corresponding password, also may be used
To be account and corresponding password, the corresponding password of account, the account and remarks are can also be.
In other words, the user data of storage can be divided into two classes:One kind is default project, is directly selected for user
It selects, for example, bank's card number, Web bank's login name, password, network address, name etc..It is also predeterminable multiple under each project
The project of subordinate, for example, row, industrial and commercial bank, agricultural bank etc. in being set under bank's card number.In addition, it is another kind of be blank for
The self-defined input in family, when user needs to store user data, an entry can be created, wherein, which may include multiple items
Mesh, for example, the species of bank card, account, password, remarks etc..
Correspondingly, account information can be included in display, that is, in the item list shown or including account information and
Corresponding password or including account information and corresponding site information, alternatively, including account information and corresponding password and
Corresponding site information needs project stored etc. including account information and user-defined other.
Wherein, site information can be specially at least one of:Uniform resource locator (the Uniform of website
Resource Locator, URL) address, the Internet protocol of website(Internet Protocol, IP)Address, domain name and net
Station name.
S13:Intelligent cipher key equipment determines the account information that user selects in the item list, and according to the user
The account information of selection determines first password, wherein, the first password is the password for login authentication;First password can be with
It is the corresponding original password of account information of user's selection(It is stored in corresponding with account information in intelligent cipher key equipment
Password)Or the ciphertext obtained after the original password is encrypted, can also be to user selection account information and
The dynamic password that its corresponding information is calculated.
Wherein, after intelligent cipher key equipment shows above-mentioned item list to user, user can be according to currently used
Situation selects corresponding account information.For example, user will currently use Internetbank, then user can select bank's card number.
After user completes the selection to account information, it is true to be sent to intelligent cipher key equipment that user can click on acknowledgement key
Recognize information, correspondingly, the confirmation message that account information and user that intelligent cipher key equipment is selected according to user are sent, it can be true
Determine the account information of user's selection.
As described above, each account information and corresponding password can be prestored in intelligent cipher key equipment, when user selects
After selecting one of account information, intelligent cipher key equipment can obtain corresponding password according to the account information of the selection.Example
Such as, after user selects bank's card number, intelligent cipher key equipment can obtain and bank's card number pair from pre-stored user data
The password answered.Afterwards, in the specific implementation, the password of acquisition can be determined as first password, is using the close of plaintext at this time
Code;Alternatively, can handle the password of acquisition, first password is obtained, processing can specifically include encryption, at this point,
First password is encrypted password, alternatively, processing can also be specifically to generate dynamic password according to the password of acquisition, will be obtained
As seed key dynamic password is calculated with reference to dynamic factor, at this point, first password is dynamic password in the password taken.When
It so, can also be using the account information that user selects as seed key, alternatively, account information and password is close together as seed
Dynamic password is calculated with reference to dynamic factor in key.It should be noted that seed key be generally number, account information and/or
Letter in encrypted message etc. can be converted to number by the ASCII character table of comparisons.
It is above-mentioned that the corresponding password of account information is included with user data, obtain the corresponding password of account information, and according to obtaining
The password taken is determined exemplified by first password.It is understood that as described above, user data can also include account information correspondence
Site information and/or user-defined sundry item information, at this point, also can according to site information generate dynamic password, will
The dynamic password of generation is determined as first password.Wherein it is possible to site information is converted into number first, afterwards again using dynamic
Cryptographic algorithm carries out number computing, the corresponding dynamic password of generation site information.
It can be seen from the above, the account information selected according to the user determines first password, may be employed such as lower section
Formula is realized:
According to the account information that the user selects, the account information pair with user selection is obtained from user data
The password answered, wherein, the user data includes at least account information and password corresponding with the account information, certainly,
It can also include site information, user-defined sundry item information etc.;The password of the acquisition is determined as described first
Password alternatively, the password of the acquisition is encrypted, obtains the first password.
Alternatively,
According to the account information that the user selects, the account that the user selects is obtained from pre-stored user data
One or more in family information and information corresponding with the account information of user selection, wherein, the user data
Including at least account information and password corresponding with the account information, it is, of course, also possible to be made by oneself including site information, user
Sundry item information of justice etc.;Using dynamic password computational algorithm, the information of the acquisition is carried out that dynamic password is calculated,
The dynamic password is determined as the first password.
As described above, user can the entry self-defined to be stored, the user data that user stores in intelligent cipher key equipment
The middle current account information to be used of selection, account information and its corresponding information(Such as site information, password etc.)In
One or more, in the case where that can be converted to number, can be used as seed key, and it is close to calculate dynamic with reference to dynamic factor
Code, for example, as seed key after account information is converted to number with corresponding site information.
S14:The first password is sent to the client by intelligent cipher key equipment, so as to described in client input
First password.
Wherein, after intelligent cipher key equipment obtains the corresponding password with the account information of user's selection, will can directly be somebody's turn to do
Password is sent to client, alternatively, after the password of acquisition is encrypted, the password after encryption is sent to client
End.Alternatively, according to the relevant one or more information generation dynamic passwords of the account information selected with user of acquisition, this is moved
State password is sent to client.
After client receives first password, it is possible to the first password is inputted in the position of input password, for example,
For user when using Internetbank, first password can be input to Password Input position by client.
Afterwards, the first password progress login authentication of the input may be employed in client, for example, client will in certification
The first password of Password Input position is sent to bank backstage, login authentication is carried out by bank backstage, to allow or refuse user
It logs in.Specifically, if first password is in plain text, backstage is directly authenticated;If first password is ciphertext, backstage is right
It is decrypted to obtain clear-text passwords, then is authenticated;If first password is dynamic password, backstage uses and intelligent key
The identical dynamic password algorithm of equipment calculates the information for being stored in backstage, and result of calculation and first password are compared, with
It is authenticated.
The present embodiment is by obtaining first password according to pre-stored user data and being sent to client so that client
The password that end input is received from intelligent cipher key equipment, is not required user to be manually entered, can be user-friendly, also, according to
The password of pre-stored user data generation client input, it is not required that user's memory cipher avoids using when account is numerous
The problem of family is difficult to remember.In addition, the intelligent cipher key equipment of the present embodiment can be in several ways with client communication, it can be with
Improve the scope of application.
In addition, item list corresponding with pre-stored user data in the intelligent cipher key equipment is shown in S12
Before, the above method can also include:The intelligent cipher key equipment stores the user data.
The intelligent cipher key equipment stores the user data and specifically includes:The intelligent cipher key equipment receives the user
The operational order of input and the user data;The intelligent cipher key equipment carries out authentication to the user, and described
After user is by authentication, by the write permission opening of the intelligent cipher key equipment to the user;By the user data
It writes to the intelligent cipher key equipment.Specifically, operational order input by user can be user in intelligent cipher key equipment
Add the instruction of new user data or to stored user data in intelligent cipher key equipment into edlin, modification, deletion
Deng instruction.The identity of user can be verified according to PIN code input by user.
In addition, before the intelligent cipher key equipment receives operational order input by user and the user data, may be used also
To activate the information storage function of intelligent cipher key equipment, specifically include:It is defeated on the intelligent cipher key equipment to receive the user
The active coding entered, and the active coding is verified into line activating and activates the intelligent key after activation is verified and is set
Standby information storage function;Pass through alternatively, receiving the activation request that the user is sent by the client with the user
The active coding of the client input, and the active coding into line activating is verified and institute is activated after activation is verified
The information storage function of intelligent cipher key equipment is stated, wherein, described information store function, which is used to implement, writes the user data
To the intelligent cipher key equipment.
In one embodiment, provide a kind of information storage function for enabling intelligent cipher key equipment and carry out data storage
Mode specifically includes:The open command input by user is received, and the intelligent key is enabled according to the open command and is set
Standby information storage function.
In addition, the intelligent cipher key equipment receives operational order input by user and the user data specifically includes:It is logical
The operation interface and control button for crossing the intelligent cipher key equipment offer receive the operational order and the user data;Or
The operational order and the user data that external equipment is sent are received by communication interface.Specifically, user can pass through
The keyboard that intelligent cipher key equipment provides(For example, physical keyboard or dummy keyboard)It inputs operation instruction and user data.User
Intelligent cipher key equipment can be also connected to client, on the client the corresponding management application program of installation, in management using journey
It is input operation instruction in the operation interface of sequence by equipment such as mouse, keyboard, touch-screens and user data, then passes through client
Communication interface operational order and user data are sent to intelligent cipher key equipment.
In addition, being write by the user data to before the intelligent cipher key equipment, the method further includes:The intelligence
Can key devices receive checking request to the intelligent cipher key equipment that the user sent by the client and random
Number, and according to the private key of the intelligent cipher key equipment random number is encrypted and according to the checking request by institute
The digital certificate and encrypted random number for stating intelligent cipher key equipment are sent to the client;The client is according to root certificate
The digital certificate of the intelligent cipher key equipment is verified, and according to the public key of the intelligent cipher key equipment to the encryption after
Random number be decrypted and the random number after decryption verified.Before user data is stored, intelligent key is verified
The identity of equipment ensures its reliability.
It is write by user data to before intelligent cipher key equipment, shows the user data;It is described by the number of users
It is specially according to write-in to the intelligent cipher key equipment:Refer in the confirmation for receiving the user data of the user to showing
After order, the intelligent cipher key equipment stores the user data.It can also be to intelligent cipher key equipment digital certificate and at random
It is several be verified after, show user data or just display the user's data after user data is received.It is true by user
It is stored again after recognizing, it is ensured that the correctness of the data of user's storage.
In addition, the intelligent cipher key equipment receives operational order input by user and the user data specifically includes:(1)
The intelligent cipher key equipment receives the user data ciphertext that the client is sent, and according to the private key of the intelligent cipher key equipment
The user data ciphertext is decrypted to obtain the user data, wherein, the client is according to the intelligent cipher key equipment
Public key to the ciphering user data to generate the user data ciphertext;Alternatively,(2)The intelligent cipher key equipment receives institute
The session key ciphertext and user data ciphertext of client transmission are stated, and according to the private key of the intelligent cipher key equipment to the meeting
Words key ciphertext decrypts to obtain session key and the user data ciphertext is decrypted to obtain according to the session key
The user data, wherein, the client generates session key at random, and according to the public key of the intelligent cipher key equipment to institute
State session key encryption with generate the session key ciphertext and according to the session key to the ciphering user data with
Generate the user data ciphertext.Ensure security of the user data in transmission.
Fig. 2 is the method that client password input is carried out by intelligent cipher key equipment that another embodiment of the present invention proposes
Flow diagram, this method include:
S21:Client terminal device to intelligent cipher key equipment send password output request, so as to the intelligent cipher key equipment according to
The password output request, shows item list corresponding with pre-stored user data in the intelligent cipher key equipment, with
And the intelligent cipher key equipment is caused to determine the account information that user selects in the item list, and selected according to the user
The account information selected determines first password, wherein, the user data includes account information and corresponding password, and described first is close
Code is the password for login authentication;
Wherein, client terminal device is, for example, PC, mobile phone or tablet computer etc..
Client terminal device can be after the login password input request of cipher authentication side's transmission is received, and this of transmission is close
Code output request, cipher authentication side is such as bank backstage, Third-party payment platform or mailbox authentication platform.
Receiving the flow performed after password output request for intelligent cipher key equipment can be referring specifically to other embodiment
In the description as described in intelligent cipher key equipment side, details are not described herein.
S22:Client terminal device receives the first password that the intelligent cipher key equipment is sent.Optionally, the reception
The first password that the intelligent cipher key equipment is sent, including:Receive the intelligent cipher key equipment is sent using USB modes first
Password;Alternatively, receive the first password that the intelligent cipher key equipment uses tone code mode to send;Alternatively, it is close to receive the intelligence
Key equipment uses the first password that wireless mode is sent.
S23:Client terminal device inputs the first password.For example, client terminal device by the Password Input to log in when institute
The position of password need to be inputted.Afterwards, which can also be sent to the authenticating parties such as bank backstage and carried out by client terminal device
Cipher authentication, to allow or refuse user's login.
The present embodiment is by indicating intelligent key devices output password, and the first password that intelligent cipher key equipment is sent
Input, can realize automatically entering for password, be inputted without user, can be user-friendly.
Fig. 3 is the method that client password input is carried out by intelligent cipher key equipment that another embodiment of the present invention proposes
Flow diagram, the present embodiment using intelligent cipher key equipment as USB key, client be PC exemplified by, and, using user using Internetbank as
Example and, to obtain the corresponding password of account information, and be transmitted as again after password is encrypted after obtaining password
Example.Referring to Fig. 3, the present embodiment includes:
S301:When user will log in Internetbank, bank backstage sends login password input request to PC.Since Internetbank logs in
When need input password, therefore, at this time bank backstage can send login password input request, so as to user input log in it is close
Code.
S302:PC sends password output request to USB key.The present embodiment in order to facilitate user operation, by account pair
The password answered is stored in USB key, is directly obtained Password Input from USB key afterwards rather than is manually entered by user,
Therefore, in order to obtain password, PC can send password output request to USB key.
In correlation technique, microcontroller or intelligent card chip built in USB key have certain memory space, can store use
The private key and digital certificate at family.The certification to user identity is realized using the public key algorithm built in USB key.Two generation USB
Key adds a physical button from hardware state, and adds display module or voice module, can be being sent to USB
Transaction data in key shows or enters for out.Prevent transaction data and be submitted to USB key processes in subscription client
In the danger that is tampered.And USB key have certain access control safety, USB key have in itself there are one PIN it is close
Code, user needs to correctly enter password ability normal use before USB key functions are used, and continuous mistake input is more than
Certain number will be automatically locked, and effectively prevent malice from cracking.
People have well solved the problem of network security authentication using USB Key technologies at present, and extensively
It is general to be applied to e-Bank payment field.The high safety characteristic of USB key ensures the private key of user and the safety of certificate.
But in correlation technique, using USB key carry out network bank business when still need user manually input account with
And login password, it is relatively time consuming laborious for more complicated Password Input.
And in the present embodiment, the account information of user and corresponding password are stored in advance in USB key, it is defeated when needing
When entering password, export password is inputted directly from USB key is manually entered with substituting.
S303:USB key show item list corresponding with stored user data in key.
Since the account that user may use is numerous, for example, user may use Internetbank, Third-party payment, electronics
Mailbox, social network sites etc. in order to avoid user remembers numerous passwords, can deposit these account informations and corresponding password
Storage, can be by the presentation of information of each entry of storage to user, by user when user needs a certain password in USB key
Select currently used account information.
S304:User selects currently used account information from the item list.For example, user can be existed by button
An entry to be selected is selected in multiple entries.In addition, user can confirm and use by clicking on acknowledgement key after completing to select
The selection at family.
S305:USB key obtain the corresponding password of account information of selection from pre-stored user data.
Since the user data in USB key is the corresponding account letter for preserving account information and password, being selected according to user
Breath finds corresponding password.
In correlation technique, if multiple accounts and password are arranged to incoherent by user, user is difficult to remember simultaneously easily
Forget.And if user for the ease of remembering and when being not easy to forget, can select the combination of same or like feature as password,
But the larger numerous passwords of relevance will directly threaten the safety of other accounts, it believed once wherein some is cracked
Breath safeguard protection has brought great hidden danger.
And in the present embodiment, since password is stored in USB key, artificial memory is not required, therefore, in order to ensure safety
Property, it avoids the password of attacker's one account of decoding that from can obtaining the password of other accounts, different account informations can be set
Corresponding password is uncorrelated.
S306:The password of acquisition is encrypted in USB key, obtains ciphertext.Optionally, can receive user
Confirmation message after the password of acquisition is encrypted.For example, after USB key obtain password, can be shown to user is
It is no to confirm encryption, if user clicks acknowledgement key, then the password that will be obtained is encrypted, otherwise without encryption
Processing.
In order to enable bank backstage can correctly decrypt, the Encryption Algorithm that USB key are used when being encrypted be with
Bank's algorithm for making an appointment of backstage, afterwards bank be decrypted using the engagement arithmetic.
S307:The ciphertext is sent to PC by USB key.Optionally, USB key are displayed whether obtaining ciphertext rear line
Confirm and send, after user clicks on acknowledgement key, ciphertext is sent to PC by USB key.
S308:The ciphertext is input to Password Input position by PC.It wherein, can be close by this after USB key receive ciphertext
The position of required input password when text is input to login.For example, when Internetbank logs in, Password Input column can be shown, PC is by the ciphertext
It is input to the input field.
Since input password generally is intended to carry out login authentication, this method can also include:
S309:The ciphertext is sent to bank backstage by PC.It wherein, can be defeated by the ciphertext after USB key receive ciphertext
Enter to the position of required input password when logging in.In bank authentication, the information of Password Input position can be sent to bank by PC
From the background, also it is achieved that and ciphertext is sent to bank backstage.
S310:The ciphertext of reception is decrypted in bank backstage, obtains the password of plaintext.As described above, after bank
Platform, which may be employed, is decrypted the ciphertext of reception with the algorithm that USB key make an appointment.
S311:Bank backstage is authenticated the password of plaintext, judges whether the password of the plaintext is correct, if correctly, holding
Row S312, otherwise performs S313.Wherein, bank backstage can pre-save the password of user, by compare the password of plaintext with
The password pre-saved, it can be determined that whether correct go out the clear-text passwords obtained after decryption.
S312:It logins successfully.For example, bank backstage sends login success message to PC, PC receives login success message
After can confirm that user is allowed to log in, page etc. after logging in can be shown to user afterwards.
S313:Login failure.For example, bank backstage sends login failure message to PC, PC receives login failure message
After can to user show login failure.
It should be noted that above-mentioned intelligent cipher key equipment is USB key, it is to be understood that other intelligent keys
Equipment, such as audio key, bluetooth key etc. can also be implemented.Above-mentioned client is PC, it is to be understood that other
Client, for example, mobile phone, tablet computer etc. can also implement.Above-mentioned is that user uses Internetbank, it is to be understood that is used
Family can also be in other usage scenarios, for example, user is carrying out Third-party payment, client can be put down to Third-party payment at this time
Platform is authenticated, other usage scenarios can also be with reference to the respective handling flow on bank backstage.
The present embodiment from pre-stored user data by obtaining password so that client input is set from intelligent key
The standby password received, is not required user to be manually entered, can be user-friendly, also, password is prestored, also not
User's memory cipher is needed, avoids the problem that user is difficult to remember when account is numerous.In addition, the present embodiment is close by prestoring
Code, the corresponding password of different accounts can be arranged to uncorrelated, therefore can be to avoid numerous password correlations when generate crack
The password of one account just threatens the problem of other account passwords, improves the security of each account password.It is right that the present embodiment passes through
The password of acquisition is encrypted, it is ensured that security when password transmits.
Fig. 4 is the method that client password input is carried out by intelligent cipher key equipment that another embodiment of the present invention proposes
Flow diagram, the present embodiment using intelligent cipher key equipment as USB key, client be PC exemplified by, and, using user using Internetbank as
Example and, to obtain the corresponding password of account information, and passed again according to the password of acquisition generation dynamic password after password is obtained
Exemplified by defeated.Referring to Fig. 4, the present embodiment includes:
S401:When user will log in Internetbank, bank backstage sends login password input request to PC.S402:PC is to USB
Key sends password output request.
S403:USB key show item list corresponding with stored user data in key.
S404:User selects currently used account information from the item list.
S405:USB key obtain the corresponding password of account information of selection from pre-stored user data.
S406:USB key generate dynamic password according to the password of acquisition.Wherein, dynamic password is with time of setting etc.
Variable and change automatically, dynamic random generation.
In the present embodiment, bank backstage and USB key can make an appointment operational factor and operation method.Bank backstage and
USBkey, using identical operation method, can generate identical dynamic password with identical operational factor.It is included in operational factor
Seed key, time factor, event factor etc..Therefore the dynamic password that user uses every time is different from, even if hacker intercepts and captures
Password, also can not be using this password come the identity of counterfeit validated user, because in addition logging in must use next time
One dynamic password.Dynamic password can effectively protect the certification of transaction and login safe, prevent invader's malicious sabotage resource,
It can effectively solve the problems, such as to invade as caused by cryptocompromise.In the present embodiment, USB key may be employed to be appointed in advance from the background with bank
Fixed operational factor and the operation method made an appointment, calculate the password of acquisition, obtain dynamic password.
S407:The dynamic password is sent to PC by USB key.Optionally, USB key are obtaining dynamic password rear line
It displays whether to confirm and send, after user clicks on acknowledgement key, dynamic password is sent to PC by USB key.
S408:The dynamic password is input to Password Input position by PC.It wherein, can after USB key receive dynamic password
The position of required input password during the dynamic password being input to login.For example, when Internetbank logs in, Password Input can be shown
The dynamic password is input to the input field by column, PC.
Since input password generally is intended to carry out login authentication, this method can also include:
S409:The dynamic password is sent to bank backstage by PC.Wherein, after USB key receive dynamic password, can incite somebody to action
The position of required input password when the dynamic password is input to login.In bank authentication, PC can be by the letter of Password Input position
Breath is sent to bank backstage, is also achieved that dynamic password being sent to bank backstage.
S410:Bank's hind computation dynamic password.Wherein, bank backstage can pre-save the password of user, afterwards, adopt
With the operational factor and operation method made an appointment with USB key, the password pre-saved is calculated, it is close to obtain dynamic
Code.
S411:The dynamic password that bank's backstage contrast conting obtains and the dynamic password received, judge that the dynamic received is close
Whether code is correct, if correctly, performing S312, otherwise performing S313.Wherein, by comparing, dynamic password and calculating when reception
During obtained dynamic password difference, it can be deduced that the dynamic password of reception is incorrect, when the dynamic password of reception is with being calculated
Dynamic password it is identical when, it can be deduced that the dynamic password of reception is correct.
S412:It logins successfully.For example, bank backstage sends login success message to PC, PC receives login success message
After can confirm that user is allowed to log in, page etc. after logging in can be shown to user afterwards.
S413:Login failure.For example, bank backstage sends login failure message to PC, PC receives login failure message
After can to user show login failure.
It should be noted that above-mentioned intelligent cipher key equipment is USB key, it is to be understood that other intelligent keys
Equipment, such as audio key, bluetooth key etc. can also be implemented.Above-mentioned client is PC, it is to be understood that other
Client, for example, mobile phone, tablet computer etc. can also implement.Above-mentioned is that user uses Internetbank, it is to be understood that is used
Family can also be in other usage scenarios, for example, user is carrying out Third-party payment, client can be put down to Third-party payment at this time
Platform is authenticated, other usage scenarios can also be with reference to the respective handling flow on bank backstage.Part in embodiment illustrated in fig. 4
Particular content is similar with embodiment illustrated in fig. 3, can refer to embodiment illustrated in fig. 3 and is understood.
The present embodiment with calculate dynamic password using when seed key be obtain static state corresponding with account information it is close
Exemplified by code, it is to be understood that seed key when calculating dynamic password can also be other information, as described in above-described embodiment
Site information, that is, account information, password and corresponding site information can be included in the user data stored, selected according to user
The account information selected can determine corresponding site information, generate dynamic password according to the site information afterwards.It is wherein it is possible to first
Site information is first converted into number, then computing is carried out to number and obtains dynamic password.Site information can be specially website
URL addresses or IP address.
The present embodiment from pre-stored user data by obtaining password so that client input is set from intelligent key
The standby password received, is not required user to be manually entered, can be user-friendly, also, password is prestored, also not
User's memory cipher is needed, avoids the problem that user is difficult to remember when account is numerous.In addition, the present embodiment is close by prestoring
Code, the corresponding password of different accounts can be arranged to uncorrelated, therefore can be to avoid numerous password correlations when generate crack
The password of one account just threatens the problem of other account passwords, improves the security of each account password.The present embodiment passes through root
Dynamic password is generated according to the password of acquisition, dynamic password is authenticated, password can be reduced and be stolen risk, ensure user account
Safety.
The structure diagram for the intelligent cipher key equipment that Fig. 5 proposes for another embodiment of the present invention, the intelligent cipher key equipment 50
Including receiving module 51, display module 52, determining module 53 and sending module 54.
Receiving module 51 is used to receive the password output request of client transmission;
Display module 52 be used for according to the password export ask, display with it is pre-stored in the intelligent cipher key equipment
The corresponding item list of user data, wherein, the user data includes account information and corresponding password.User data is shown
It has been described in detail before the item list shown, details are not described herein again.
Determining module 53 is selected for determining the account information that user selects in the item list according to the user
The account information selected determines first password, wherein, the first password is the password for login authentication.First password can be
The corresponding original password of account information of user's selection(It is stored in corresponding with account information close in intelligent cipher key equipment
Code)Or the ciphertext obtained after the original password is encrypted, can also be to user selection account information and its
The dynamic password that corresponding information is calculated.
As described above, each account information and corresponding password can be prestored in intelligent cipher key equipment, when user selects
After selecting one of account information, intelligent cipher key equipment can obtain corresponding password according to the account information of the selection.Example
Such as, after user selects bank's card number, intelligent cipher key equipment can obtain and bank's card number pair from pre-stored user data
The password answered.Afterwards, in the specific implementation, the password of acquisition can be determined as first password, is using the close of plaintext at this time
Code;Alternatively, can handle the password of acquisition, first password is obtained, processing can specifically include encryption, at this point,
First password is encrypted password, alternatively, processing can also be specifically to generate dynamic password according to the password of acquisition, at this point,
First password is dynamic password.It is of course also possible to the account information that user is selected is as seed key, alternatively, account is believed
Dynamic password is calculated with reference to dynamic factor together as seed key in breath and password.It should be noted that seed key one
As be that number, letter in account information and/or encrypted message etc. can be converted to number by the ASCII character table of comparisons.
It is above-mentioned that the corresponding password of account information is included with user data, obtain the corresponding password of account information, and according to obtaining
The password taken is determined exemplified by first password.It is understood that user data is gone back except including account information and corresponding password
It can include the corresponding site information of account information, user-defined sundry item information etc., at this point it is possible to which user is chosen
Account information and its at least one of corresponding information be converted to number, as the seed key for calculating dynamic password and using,
Particular content may refer to following embodiment.
Sending module 54 is used to the first password being sent to the client, so as to client input described the
One password.
Wherein, after intelligent cipher key equipment obtains the corresponding password with the account information of user's selection, will can directly be somebody's turn to do
Password is sent to client, alternatively, after the password of acquisition is encrypted, the password after encryption is sent to client
End.Alternatively, according to one or more information generation dynamic passwords corresponding with the account information of user's selection of acquisition, this is moved
State password is sent to client.
After client receives first password, it is possible to the first password is inputted in the position of input password, for example,
For user when using Internetbank, first password can be input to Password Input position by client.Afterwards, this may be employed in client
The first password of input carries out login authentication, for example, the first password of Password Input position is sent to by client in certification
Bank backstage carries out login authentication, to allow or refuse user's login by bank backstage.
In one embodiment, the sending module 54 is specifically used for:The first password is sent to by visitor using USB modes
Family end;Alternatively, the first password is sent to by client using tone code mode;Alternatively, using wireless mode by described first
Password is sent to client.
The present embodiment is by obtaining first password according to pre-stored user data and being sent to client so that client
The password that end input is received from intelligent cipher key equipment, is not required user to be manually entered, can be user-friendly, also, according to
The password of pre-stored information generation client input, it is not required that user's memory cipher, user is difficult when avoiding account numerous
The problem of to remember.In addition, the intelligent cipher key equipment of the present embodiment can improve in several ways with client communication
The scope of application.
Fig. 6 is the structure diagram for the intelligent cipher key equipment that another embodiment of the present invention proposes, in the present embodiment, described the
When one password is the password obtained after handling the password of the acquisition, the intelligent cipher key equipment 50 is in the reality shown in Fig. 5
On the basis of applying example, determining module 53 includes first module 531 and second unit 532.
First module 531 is used for the account information selected according to the user, is obtained from pre-stored user data
With the corresponding password of account information of user selection, wherein, the user data include at least account information and with institute
The corresponding password of account information is stated, it is, of course, also possible to the project letter stored including site information, other user-defined needs
Breath etc.;
Second unit 532 is used to the password of the acquisition being determined as the first password, alternatively, to the close of the acquisition
Code is encrypted, and obtains the first password.
Wherein, optionally, can be receive user confirmation message after the password of acquisition is encrypted.With intelligence
It for example, after USB key obtain password, can display whether to confirm encryption to user, such as exemplified by key devices are USB key
Fruit user clicks acknowledgement key, then the password that will be obtained is encrypted, otherwise without encryption.
In order to enable bank backstage can correctly decrypt, the Encryption Algorithm that USB key are used when being encrypted be with
Bank's algorithm for making an appointment of backstage, afterwards bank be decrypted using the engagement arithmetic.
In another embodiment, the determining module 53 includes:Third unit, for the account selected according to the user
Information obtains the account information of user's selection and the account with user selection from pre-stored user data
One or more in the corresponding information of information, wherein, the user data include at least account information and with the account
The corresponding password of information, it is, of course, also possible to need project information stored etc. including site information, user-defined other;
Unit the 4th for using dynamic password computational algorithm, carries out the information of the acquisition dynamic password is calculated, by described in
Dynamic password is determined as the first password.
In another embodiment, which can also include:First memory module, for storing the intelligence
The private key and digital certificate of key devices;Second memory module 55, for storing the user data;Transceiver module, for connecing
Receive operational order input by user and the user data;Access control module, for carrying out authentication to the user, and
After the user is by authentication, by the write permission opening of second memory module to the user and by institute
User data is stated to write to second memory module;And safety chip, for the generation and certification being digitally signed, with
And it encrypts and decrypts.
In one embodiment, in the user data that second memory module 55 stores, different account informations are corresponding close
Code is uncorrelated.
In addition, the intelligent cipher key equipment further includes:Control module is activated, it is close in the intelligence for receiving the user
The active coding inputted in key equipment, and the active coding is verified into line activating and after activation is verified described in activation
The information storage function of intelligent cipher key equipment;Alternatively, receive activation request and the institute that the user is sent by the client
The active coding that user is inputted by the client is stated, and the active coding into line activating is verified and is led in activation verification
Later the information storage function of the intelligent cipher key equipment is activated, wherein, described information store function is used to implement the use
User data is write to the intelligent cipher key equipment.
Intelligent cipher key equipment can also include:Opening module, for receiving the open command input by user, and according to
The open command enables the information storage function of the intelligent cipher key equipment.
Transceiver module can receive the operation by the operation interface and control button that the intelligent cipher key equipment provides
Instruction and the user data;Alternatively, the operational order and the user that external equipment is sent are received by communication interface
Data.
In addition, the transceiver module receive the user by the client send to the intelligent cipher key equipment
Checking request and random number, the safety chip are encrypted the random number according to the private key of the intelligent cipher key equipment,
And the transceiver module according to the checking request by the digital certificate of the intelligent cipher key equipment and encrypted random number
It is sent to the client;Wherein, the client tests the digital certificate of the intelligent cipher key equipment according to root certificate
Card, and according to the public key of the intelligent cipher key equipment the encrypted random number is decrypted and to after decryption with
Machine number is verified.It can verify the identity of intelligent cipher key equipment, ensure its reliability.
The display module is additionally operable to receive the operational order input by user and the user in the transceiver module
After data, show that the user data and the access control module receive the user couple in the transceiver module
After the confirmation instruction of the user data shown, the user data is write into second memory module.Ensure to use
The correctness of the data of family storage.
In addition, the transceiver module receives the user data ciphertext that client is sent, the safety chip is according to the intelligence
Can the private keys of key devices the user data ciphertext is decrypted to obtain the user data, wherein, the client according to
The public key of the intelligent cipher key equipment is to the ciphering user data to generate the user data ciphertext;Alternatively, the transmitting-receiving
Module receives the session key ciphertext of client transmission and user data ciphertext, the safety chip are set according to the intelligent key
Standby private key decrypts the session key ciphertext to obtain session key, and according to the session key to the user data
Ciphertext decrypts to obtain the user data, wherein, the client generates session key at random, and according to the intelligent key
The public key of equipment encrypts the session key to generate the session key ciphertext and according to the session key to described
Ciphering user data is to generate the user data ciphertext.Ensure security of the user data in transmission.
It should be noted that the module division of intelligent cipher key equipment is not limited to shown in the present embodiment, for example, can set
Transceiver module is realized and receives password output request, first password is sent to client and receive operational order and bank data
Function.
The present embodiment from pre-stored user data by obtaining password so that client input is set from intelligent key
The standby password received, is not required user to be manually entered, can be user-friendly, also, password is prestored, also not
User's memory cipher is needed, avoids the problem that user is difficult to remember when account is numerous.In addition, the intelligent cipher key equipment of the present embodiment
The scope of application can be improved in several ways with client communication.In addition, the present embodiment is by prestoring password,
The corresponding password of different accounts can be arranged to uncorrelated, thus can be to avoid numerous password correlations when generate crack one
The password of account just threatens the problem of other account passwords, improves the security of each account password.The present embodiment passes through to obtaining
Password be encrypted, it is ensured that password transmit when security.Alternatively, the present embodiment passes through the password according to acquisition
Dynamic password is generated, dynamic password is authenticated, password can be reduced and be stolen risk, ensures user account safety.Alternatively, this
Embodiment carries out the site information of acquisition computing generation dynamic password, it is ensured that the diversity of dynamic password generating mode,
Improve the scope of application.
Fig. 7 is the structure diagram for the client terminal device that another embodiment of the present invention proposes, which includes sending mould
Block 71, receiving module 72 and input module 73.Wherein, client terminal device can be PC, mobile phone or tablet computer etc..
Sending module 71 be used for intelligent cipher key equipment send password output request, so as to the intelligent cipher key equipment according to
The password output request, shows item list corresponding with pre-stored user data in intelligent cipher key equipment and makes
It obtains the intelligent cipher key equipment and determines the account information that user selects in the item list, and selected according to the user
Account information determines first password, wherein, the user data includes account information and corresponding password, and the first password is
For the password of login authentication.
Client terminal device can be after the login password input request of cipher authentication side's transmission is received, and this of transmission is close
Code output request, cipher authentication side is such as bank backstage, Third-party payment platform or mailbox authentication platform.It is close for intelligence
Key equipment receive after password output request the flow that performs can referring specifically in other embodiment on intelligent cipher key equipment
The description of side, details are not described herein.
Receiving module 72 is used to receive the first password that the intelligent cipher key equipment is sent.Optionally, the reception
Module 72 is specifically used for:Receive the first password that the intelligent cipher key equipment uses USB modes to send;Alternatively, receive the intelligence
Energy key devices use the first password that tone code mode is sent;It is sent out alternatively, receiving the intelligent cipher key equipment using wireless mode
The first password sent.
Input module 73 is used to input the first password.For example, client terminal device by the Password Input to log in when institute
The position of password need to be inputted.Afterwards, which can also be sent to the authenticating parties such as bank backstage and carried out by client terminal device
Cipher authentication, to allow or refuse user's login.
The present embodiment is by indicating intelligent key devices output password, and the first password that intelligent cipher key equipment is sent
Input, can realize automatically entering for password, be inputted without user, can be user-friendly.
The embodiment of the present invention additionally provides a kind of client device, which includes housing, processor, storage
Device, circuit board and power circuit, wherein, circuit board is placed in the interior volume that housing surrounds, and processor and memory are arranged on
On circuit board;Power circuit, for powering for each circuit or device of client device;Memory is used to store executable journey
Sequence code;Processor is corresponding with executable program code to run by reading the executable program code stored in memory
Program, for performing following steps:
S21’:Password output request is sent to intelligent cipher key equipment, so that the intelligent cipher key equipment is according to the password
Output request shows item list corresponding with pre-stored user data in the intelligent cipher key equipment and causes institute
It states intelligent cipher key equipment and determines the account information that user selects in the item list, and the account selected according to the user
Information determines first password, wherein, the user data include account information and corresponding password, the first password be for
The password of login authentication.Wherein, client device is, for example, PC, mobile phone or tablet computer etc..
Client device can be after the login password input request of cipher authentication side's transmission is received, and this of transmission is close
Code output request, cipher authentication side is such as bank backstage, Third-party payment platform or mailbox authentication platform.It is close for intelligence
Key equipment receive after password output request the flow that performs can referring specifically in other embodiment on intelligent cipher key equipment
The description of side, details are not described herein.
S22’:Receive the first password that the intelligent cipher key equipment is sent.Optionally, the reception intelligence is close
The first password that key equipment is sent, including:Receive the first password that the intelligent cipher key equipment uses USB modes to send;Alternatively,
Receive the first password that the intelligent cipher key equipment uses tone code mode to send;It is used alternatively, receiving the intelligent cipher key equipment
The first password that wireless mode is sent.
S23’:Input the first password.For example, client device by the Password Input to log in when required input password
Position.
Afterwards, which can also be sent to the authenticating parties such as bank backstage and carry out cipher authentication by client device,
To allow or refuse user's login.
The present embodiment is by indicating intelligent key devices output password, and the first password that intelligent cipher key equipment is sent
Input, can realize automatically entering for password, be inputted without user, can be user-friendly.
It should be noted that in the description of the present invention, term " first ", " second " etc. are only used for description purpose, without
It is understood that indicate or imply relative importance.In addition, in the description of the present invention, unless otherwise indicated, the meaning of " multiple "
It is two or more.
Any process described otherwise above or method description are construed as in flow chart or herein, represent to include
Module, segment or the portion of the code of the executable instruction of one or more the step of being used to implement specific logical function or process
Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable
Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combination thereof.Above-mentioned
In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage
Or firmware is realized.If for example, with hardware come realize in another embodiment, can be under well known in the art
Any one of row technology or their combination are realized:With for the logic gates to data-signal realization logic function
Discrete logic, have suitable combinational logic gate circuit application-specific integrated circuit, programmable gate array(PGA), scene
Programmable gate array(FPGA)Deng.
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries
Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium
In matter, the program upon execution, one or a combination set of the step of including embodiment of the method.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, it can also
That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould
The form that hardware had both may be employed in block is realized, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized in the form of software function module and is independent production marketing or in use, can also be stored in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description
Point is contained at least one embodiment of the present invention or example.In the present specification, schematic expression of the above terms is not
Centainly refer to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be any
One or more embodiments or example in combine in an appropriate manner.
Although the embodiment of the present invention has been shown and described above, it is to be understood that above-described embodiment is example
Property, it is impossible to limitation of the present invention is interpreted as, those of ordinary skill in the art within the scope of the invention can be to above-mentioned
Embodiment is changed, changes, replacing and modification.
Claims (18)
- A kind of 1. method that client password input is carried out by intelligent cipher key equipment, which is characterized in that including:Intelligent cipher key equipment receives the password output request that client is sent;The intelligent cipher key equipment is exported according to the password and asked, display and pre-stored use in the intelligent cipher key equipment The corresponding item list of user data, wherein, the user data includes account information and corresponding password;Wherein, the user Data further include the entry of self-defined input;The intelligent cipher key equipment determines the account information that user selects in the item list, and is selected according to the user Account information determine first password, wherein, the first password be for login authentication password;The first password is sent to the client by the intelligent cipher key equipment, so as to client input described first Password.
- 2. according to the method described in claim 1, it is characterized in that, the account information selected according to the user determines the One password, including:According to the account information that the user selects, the account information pair with user selection is obtained from the user data The password answered;The password of the acquisition is determined as the first password or the password of the acquisition is encrypted, Obtain the first password;Alternatively,According to the account information that the user selects, obtained from the user data user selection account information and One or more in information corresponding with the account information of user selection;Using dynamic password computational algorithm, to described The information of acquisition carries out that dynamic password is calculated, and the dynamic password is determined as the first password.
- 3. method according to claim 1 or 2, which is characterized in that pre- in the display and the intelligent cipher key equipment Before the corresponding item list of user data first stored, the method further includes:The intelligent cipher key equipment stores the user data.
- 4. according to the method described in claim 3, it is characterized in that, the intelligent cipher key equipment stores the user data, bag It includes:The intelligent cipher key equipment receives the operational order input by user and the user data;The intelligent cipher key equipment carries out authentication to the user, and after the user is by authentication, by institute The write permission opening of intelligent cipher key equipment is stated to the user;The user data is write to the intelligent cipher key equipment.
- 5. according to the method described in claim 4, it is characterized in that, receive operation input by user in the intelligent cipher key equipment Before instruction and the user data, the method further includes:The active coding that the user inputs on the intelligent cipher key equipment is received, and the active coding is verified into line activating, And the information storage function of the intelligent cipher key equipment is activated after activation is verified;Pass through alternatively, receiving the user The active coding that the activation request and the user that the client is sent are inputted by the client, and to the active coding into The information storage function of the intelligent cipher key equipment is verified and activated after activation is verified to line activating, wherein, the letter Breath store function, which is used to implement, writes the user data to the intelligent cipher key equipment;AndThe open command input by user is received, and the information for enabling according to the open command intelligent cipher key equipment is deposited Store up function.
- 6. according to the method described in claim 4, it is characterized in that, intelligent cipher key equipment reception operation input by user refers to Order and the user data specifically include:The operation interface and control button provided by the intelligent cipher key equipment receives the operational order and the number of users According to;OrThe operational order and the user data that external equipment is sent are received by communication interface.
- 7. it according to the method described in claim 4, it is characterized in that, is set writing the user data to the intelligent key Before standby, the method further includes:The intelligent cipher key equipment receives the verification to the intelligent cipher key equipment that the user is sent by the client Request and random number, and the random number is encrypted according to the private key of the intelligent cipher key equipment and is tested according to described The digital certificate of the intelligent cipher key equipment and encrypted random number are sent to the client by card request;The client verifies the digital certificate of the intelligent cipher key equipment according to root certificate, and close according to the intelligence The public key of key equipment is decrypted the encrypted random number and the random number after decryption is verified;Verifying that the digital certificate and the random number by rear, show the user data;Described write the user data to the intelligent cipher key equipment be specially:The user is being received to showing After the confirmation instruction of the user data, the intelligent cipher key equipment stores the user data.
- 8. according to the method described in claim 4, it is characterized in that, intelligent cipher key equipment reception operation input by user refers to Order and the user data specifically include:The intelligent cipher key equipment receives the user data ciphertext that the client is sent, and according to the intelligent cipher key equipment Private key decrypts the user data ciphertext to obtain the user data, wherein, the client is according to the intelligent key The public key of equipment is to the ciphering user data to generate the user data ciphertext;Alternatively,The intelligent cipher key equipment receives session key ciphertext and the user data ciphertext that the client is sent, and according to described The private key of intelligent cipher key equipment decrypts the session key ciphertext to obtain session key and according to the session key pair User data ciphertext decryption to obtain the user data, wherein, the client generates session key at random, and according to The public key of the intelligent cipher key equipment encrypts the session key to generate the session key ciphertext and according to the meeting Key is talked about to the ciphering user data to generate the user data ciphertext.
- A kind of 9. method that client password input is carried out by intelligent cipher key equipment, which is characterized in that including:Client sends password output request to intelligent cipher key equipment, so that the intelligent cipher key equipment is exported according to the password Request shows item list corresponding with pre-stored user data in the intelligent cipher key equipment, wherein, the number of users According to the entry for further including self-defined input;And the intelligent cipher key equipment is caused to determine that user selects in the item list Account information, and according to the user select account information determine first password, wherein, the user data include account Information and corresponding password, the first password are the password for login authentication;The client receives the first password that the intelligent cipher key equipment is sent;The client inputs the first password.
- 10. a kind of intelligent cipher key equipment, which is characterized in that including:Receiving module, the password for receiving client transmission export request;Display module is asked for being exported according to the password, display and pre-stored user in the intelligent cipher key equipment The corresponding item list of data, wherein, the user data includes account information and corresponding password;Wherein, the number of users According to the entry for further including self-defined input;Determining module, for determining account information that user selects in the item list, and selected according to the user Account information determines first password, wherein, the first password is the password for login authentication;Sending module, for the first password to be sent to the client, so that client input described first is close Code.
- 11. intelligent cipher key equipment according to claim 10, which is characterized in that the determining module includes:First module for the account information selected according to the user, is obtained from the user data and selected with the user The corresponding password of account information selected;Second unit, for the password of the acquisition to be determined as the first password, alternatively, being carried out to the password of the acquisition Encryption obtains the first password.
- 12. intelligent cipher key equipment according to claim 10, which is characterized in that the determining module includes:Third unit for the account information selected according to the user, obtains user's selection from the user data Account information and with the one or more in the corresponding information of account information of user selection;Unit the 4th for using dynamic password computational algorithm, to the information of the acquisition carries out that dynamic password is calculated, will The dynamic password is determined as the first password.
- 13. according to claim 10 to 12 any one of them intelligent cipher key equipment, which is characterized in that the intelligent cipher key equipment It further includes:First memory module, for storing the private key of the intelligent cipher key equipment and digital certificate;Second memory module, for storing the user data;Transceiver module, for receiving operational order input by user and the user data;Access control module, for carrying out authentication to the user, and after the user is by authentication, by institute The write permission opening of the second memory module is stated to write to the described second storage mould to the user and by the user data Block;AndSafety chip, for the generation and certification and encryption and decryption being digitally signed.
- 14. intelligent cipher key equipment according to claim 13, which is characterized in that the intelligent cipher key equipment further includes:Control module is activated, for receiving the active coding that the user inputs on the intelligent cipher key equipment, and is swashed to described The information storage function of the intelligent cipher key equipment into line activating is verified and activated after activation is verified to code living;Alternatively, The active coding that the activation request that the user is sent by the client is inputted with the user by the client is received, And the information for verifying and being activated after activation is verified the intelligent cipher key equipment into line activating to the active coding stores Function, wherein, described information store function, which is used to implement, writes the user data to the intelligent cipher key equipment;Opening module, for receiving the open command input by user, and it is close according to the open command to enable the intelligence The information storage function of key equipment.
- 15. intelligent cipher key equipment according to claim 13, which is characterized in that the transceiver module is close by the intelligence The operation interface and control button that key equipment provides receive the operational order and the user data;Alternatively, it is connect by communication Mouth receives the operational order and the user data that external equipment is sent.
- 16. intelligent cipher key equipment according to claim 13, which is characterized in that the transceiver module receives the user and leads to The checking request and random number to the intelligent cipher key equipment that the client is sent are crossed, the safety chip is according to the intelligence Can key devices private key the random number is encrypted and the transceiver module according to the checking request by the intelligence The digital certificate of energy key devices and encrypted random number are sent to the client;Wherein, the client is demonstrate,proved according to root Book verifies the digital certificate of the intelligent cipher key equipment, and according to the public key of the intelligent cipher key equipment to the encryption Random number afterwards is decrypted and the random number after decryption is verified;The display module is additionally operable to receive the operational order input by user and the user data in the transceiver module Afterwards, show that the user data and the access control module receive the user to display in the transceiver module After the confirmation instruction of the user data gone out, the user data is write into second memory module.
- 17. intelligent cipher key equipment according to claim 13, which is characterized in that the transceiver module receives client and sends User data ciphertext, the safety chip user data ciphertext is decrypted according to the private key of the intelligent cipher key equipment with The user data is obtained, wherein, the client is according to the public key of the intelligent cipher key equipment to the ciphering user data To generate the user data ciphertext;Alternatively,The transceiver module receives session key ciphertext and the user data ciphertext that client is sent, and the safety chip is according to institute The private key for stating intelligent cipher key equipment decrypts the session key ciphertext to obtain session key, and according to the session key pair User data ciphertext decryption to obtain the user data, wherein, the client generates session key at random, and according to The public key of the intelligent cipher key equipment encrypts the session key to generate the session key ciphertext and according to the meeting Key is talked about to the ciphering user data to generate the user data ciphertext.
- 18. a kind of client terminal device, which is characterized in that including:Sending module, for sending password output request to intelligent cipher key equipment, so that the intelligent cipher key equipment is according to Password output request, shows item list corresponding with pre-stored user data in the intelligent cipher key equipment, wherein, In, the user data further includes the entry of self-defined input;And the intelligent cipher key equipment is caused to determine user described The account information selected in item list, and first password is determined according to the account information that the user selects, wherein, the use User data includes account information and corresponding password, and the first password is the password for login authentication;Receiving module, for receiving the first password that the intelligent cipher key equipment is sent;Input module, for inputting the first password.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410132586.7A CN103929307B (en) | 2014-04-02 | 2014-04-02 | Cipher-code input method, intelligent cipher key equipment and client terminal device |
PCT/CN2015/071852 WO2015149582A1 (en) | 2014-04-02 | 2015-01-29 | Password input method, intelligent secret key device and client apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410132586.7A CN103929307B (en) | 2014-04-02 | 2014-04-02 | Cipher-code input method, intelligent cipher key equipment and client terminal device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103929307A CN103929307A (en) | 2014-07-16 |
CN103929307B true CN103929307B (en) | 2018-06-01 |
Family
ID=51147392
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410132586.7A Active CN103929307B (en) | 2014-04-02 | 2014-04-02 | Cipher-code input method, intelligent cipher key equipment and client terminal device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN103929307B (en) |
WO (1) | WO2015149582A1 (en) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103929307B (en) * | 2014-04-02 | 2018-06-01 | 天地融科技股份有限公司 | Cipher-code input method, intelligent cipher key equipment and client terminal device |
CN106789848A (en) * | 2015-11-23 | 2017-05-31 | 阿里巴巴集团控股有限公司 | A kind of user key storage method and server |
CN107026737B (en) * | 2016-01-29 | 2021-02-09 | 李明 | System for managing passwords through wearable equipment |
CN106126149A (en) * | 2016-06-30 | 2016-11-16 | 联想(北京)有限公司 | A kind of method of information processing, electronic equipment and input equipment |
CN106878245B (en) * | 2016-07-18 | 2020-04-24 | 阿里巴巴集团控股有限公司 | Graphic code information providing and obtaining method, device and terminal |
CN106533683A (en) * | 2016-11-11 | 2017-03-22 | 西安远眺网络科技有限公司 | Equipment authentication method using national commercial cryptographic algorithm |
ES2929464T3 (en) * | 2016-11-26 | 2022-11-29 | Huawei Tech Co Ltd | Method for securely controlling a smart home appliance and terminal device |
CN108092764B (en) * | 2017-11-02 | 2021-06-15 | 捷开通讯(深圳)有限公司 | Password management method and equipment and device with storage function |
CN107896221B (en) * | 2017-12-01 | 2019-11-12 | 北京深思数盾科技股份有限公司 | A kind of account binding method and device |
CN108549808B (en) * | 2018-04-19 | 2022-03-04 | 北京华大智宝电子系统有限公司 | Password management method and device |
CN110581829A (en) * | 2018-06-08 | 2019-12-17 | 中国移动通信集团有限公司 | Communication method and device |
CN109214147A (en) * | 2018-09-28 | 2019-01-15 | 内蒙古师范大学 | A kind of encryption system of accounting software |
CN110399717B (en) * | 2018-11-21 | 2023-03-14 | 腾讯科技(深圳)有限公司 | Key acquisition method and device, storage medium and electronic device |
CN109889342B (en) * | 2018-12-15 | 2023-07-18 | 中国平安人寿保险股份有限公司 | Interface test authentication method and device, electronic equipment and storage medium |
CN110247758B (en) * | 2019-05-30 | 2023-03-24 | 天翼数字生活科技有限公司 | Password management method and device and password manager |
CN110430043B (en) * | 2019-07-05 | 2022-11-08 | 视联动力信息技术股份有限公司 | Authentication method, system and device and storage medium |
CN110704254A (en) * | 2019-09-03 | 2020-01-17 | 福建升腾资讯有限公司 | Key controller, method and system for automatically testing POS transaction at low cost |
CN112039901B (en) * | 2020-09-02 | 2023-06-13 | 联仁健康医疗大数据科技股份有限公司 | Data transmission method, device and system |
CN112685698A (en) * | 2020-12-07 | 2021-04-20 | 湖南麒麟信安科技股份有限公司 | Software authorization method and system based on USB Key |
CN113132369A (en) * | 2021-04-12 | 2021-07-16 | 西安赤鸾信息科技有限公司 | Android mobile phone password automatic filling method and device |
CN113472793B (en) * | 2021-07-01 | 2023-04-28 | 中易通科技股份有限公司 | Personal data protection system based on hardware password equipment |
CN114553409B (en) * | 2022-02-24 | 2023-08-08 | 广东电网有限责任公司 | Password authentication method, system, device, storage medium, and program product |
CN115296854A (en) * | 2022-07-08 | 2022-11-04 | 中金金融认证中心有限公司 | Method for binding intelligent cipher key and terminal and related product |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008099756A1 (en) * | 2007-02-07 | 2008-08-21 | Nippon Telegraph And Telephone Corporation | Client device, key device, service providing device, user authentication system, user authentication method, program, and recording medium |
CN101697537A (en) * | 2009-10-20 | 2010-04-21 | 宇龙计算机通信科技(深圳)有限公司 | Access method for internet, system and mobile terminal |
CN101895513A (en) * | 2009-05-20 | 2010-11-24 | 广州盛华信息技术有限公司 | Log-in authentication system for service website and implementation method |
CN201717885U (en) * | 2010-03-12 | 2011-01-19 | 薛明 | Code providing equipment and code identification system |
CN103336746A (en) * | 2013-06-19 | 2013-10-02 | 江苏意源科技有限公司 | Safety encrypted USB (Universal Serial Bus) flash disk and data encryption method thereof |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008282096A (en) * | 2007-05-08 | 2008-11-20 | Winbond Electron Corp | Account password output device |
CN102932341B (en) * | 2012-10-25 | 2016-01-13 | 小米科技有限责任公司 | A kind of cipher processing method, device and equipment |
CN103023875B (en) * | 2012-11-21 | 2015-09-02 | 北京荣之联科技股份有限公司 | A kind of account management system and method |
CN102970299B (en) * | 2012-11-27 | 2015-06-03 | 西安电子科技大学 | File safe protection system and method thereof |
CN103929307B (en) * | 2014-04-02 | 2018-06-01 | 天地融科技股份有限公司 | Cipher-code input method, intelligent cipher key equipment and client terminal device |
CN103929306B (en) * | 2014-04-02 | 2016-04-06 | 天地融科技股份有限公司 | The approaches to IM of intelligent cipher key equipment and intelligent cipher key equipment |
-
2014
- 2014-04-02 CN CN201410132586.7A patent/CN103929307B/en active Active
-
2015
- 2015-01-29 WO PCT/CN2015/071852 patent/WO2015149582A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008099756A1 (en) * | 2007-02-07 | 2008-08-21 | Nippon Telegraph And Telephone Corporation | Client device, key device, service providing device, user authentication system, user authentication method, program, and recording medium |
CN101895513A (en) * | 2009-05-20 | 2010-11-24 | 广州盛华信息技术有限公司 | Log-in authentication system for service website and implementation method |
CN101697537A (en) * | 2009-10-20 | 2010-04-21 | 宇龙计算机通信科技(深圳)有限公司 | Access method for internet, system and mobile terminal |
CN201717885U (en) * | 2010-03-12 | 2011-01-19 | 薛明 | Code providing equipment and code identification system |
CN103336746A (en) * | 2013-06-19 | 2013-10-02 | 江苏意源科技有限公司 | Safety encrypted USB (Universal Serial Bus) flash disk and data encryption method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN103929307A (en) | 2014-07-16 |
WO2015149582A1 (en) | 2015-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103929307B (en) | Cipher-code input method, intelligent cipher key equipment and client terminal device | |
JP6264674B2 (en) | Authentication system and method using QR code | |
CN103929306B (en) | The approaches to IM of intelligent cipher key equipment and intelligent cipher key equipment | |
Garfinkel et al. | Usable security: History, themes, and challenges | |
US8656180B2 (en) | Token activation | |
US8555079B2 (en) | Token management | |
CN104270517B (en) | Information ciphering method and mobile terminal | |
CN103905188B (en) | Utilize the method and intelligent cipher key equipment of intelligent cipher key equipment generation dynamic password | |
CN103905204B (en) | The transmission method and Transmission system of data | |
CN107579817A (en) | User ID authentication method, apparatus and system based on block chain | |
CN106575334A (en) | Accessing a secured software application | |
CN108234115A (en) | The verification method of information security, device and system | |
JP2019530265A (en) | Method and apparatus for providing and acquiring graphic code information and terminal | |
CN106326763A (en) | Method and device for obtaining electronic file | |
JP2015130633A (en) | authentication system | |
CN108447154A (en) | Safe unlocking method and device, encryption and decryption method and device, lock and server | |
KR20210046357A (en) | Method and apparatus for key storing and recovery for blockchain based system | |
CN109981665A (en) | Resource provider method and device, resource access method and device and system | |
CN105187382A (en) | Multi-factor identity authentication method for preventing library collision attacks | |
CN108199847A (en) | Security processing method, computer equipment and storage medium | |
WO2017050152A1 (en) | Password security system adopted by mobile apparatus and secure password entering method thereof | |
Mahinderjit Singh et al. | A novel out-of-band biometrics authentication scheme for wearable devices | |
CN107124407A (en) | Data transmission method, device, readable storage medium storing program for executing, electronic equipment and system | |
CN201717885U (en) | Code providing equipment and code identification system | |
US10445510B2 (en) | Data checking apparatus and method using same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |