CN105760741A - Code input method, security chip and system - Google Patents
Code input method, security chip and system Download PDFInfo
- Publication number
- CN105760741A CN105760741A CN201610094146.6A CN201610094146A CN105760741A CN 105760741 A CN105760741 A CN 105760741A CN 201610094146 A CN201610094146 A CN 201610094146A CN 105760741 A CN105760741 A CN 105760741A
- Authority
- CN
- China
- Prior art keywords
- keyboard
- sequence
- random data
- cpu
- random
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000012545 processing Methods 0.000 claims description 9
- 238000013478 data encryption standard Methods 0.000 claims description 7
- 238000010586 diagram Methods 0.000 description 8
- 239000011159 matrix material Substances 0.000 description 5
- 238000004891 communication Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention provides a code input method, a security chip and a system.The method comprises the steps that the security chip generates random data sequences and sends the random data sequences to a CPU so that the CPU can display a random keyboard on a display screen according to keyboard position sequences and the random data sequences, wherein the random data sequences correspond to the keyboard position sequences in a one-to-one mode; the security chip acquires input positions of a user on the random keyboard and determines a user code according to the input positions, the keyboard position sequences and the random data sequences; the security chip encrypts the user code, generates encryption data and sends the encryption data to the CPU.By means of the code input method, the security chip and the system, safety of code inputting of the user is improved.
Description
Technical Field
The present invention relates to communications technologies, and in particular, to a password input method, a security chip, and a system.
Background
With the development of communication technology, terminal devices such as mobile phones and tablet computers are widely used. The scenes that a user needs to input a password in the process of using the terminal device are more and more, for example, the password is input when logging in a mobile banking, and the password is input when the user uses mobile payment services such as the mobile banking and the like to carry out payment of electronic commerce. In order to protect the fund security of the user, it is very important to improve the security of the user when inputting the password using the terminal device.
In the prior art, when a user inputs a password, a Central Processing Unit (CPU) of a terminal device generates a random data sequence, generates a random keyboard according to the random data sequence and a keyboard position sequence, and sends the random keyboard to a display screen for displaying, the user inputs the user password on the touch screen based on the random keyboard, and the CPU obtains an input position of the user on the touch screen and obtains the user password according to the keyboard position sequence, the random data sequence and the input position.
However, in the above process, in the processes of generating the random data sequence by the CPU, generating the random keyboard, and acquiring the input position of the user on the touch screen by the CPU, there may be a case where the random keyboard and the input position of the user are intercepted by other plug-ins or programs, so as to obtain the user password, which threatens the fund security of the user, and therefore, the security of the above process is low when the user inputs the password.
Disclosure of Invention
The invention provides a password input method, a security chip and a system, which are used for improving the security of password input.
The invention provides a password input method, which comprises the following steps:
the method comprises the steps that a security chip generates a random data sequence and sends the random data sequence to a Central Processing Unit (CPU), so that the CPU displays a random keyboard on a display screen according to a keyboard position sequence and the random data sequence, wherein the random data sequence corresponds to the keyboard position sequence one by one;
the security chip acquires an input position of a user on the random keyboard through a touch screen, and determines a user password according to the input position, the keyboard position sequence and the random data sequence;
and the security chip encrypts the user password to generate encrypted data and sends the encrypted data to the CPU.
Further, before the secure chip generates the random data sequence, the method further includes:
and the safety chip receives a work starting instruction sent by the CPU.
Further, the determining, by the security chip, the user password according to the input position, the keyboard position sequence, and the random data sequence includes:
the safety chip determines a sub-keyboard position sequence corresponding to the input position according to the input position and the keyboard position sequence;
the safety chip determines a sub-random data sequence corresponding to the sub-keyboard position sequence according to the sub-keyboard position sequence and the random data sequence;
and the safety chip determines the sub-random data sequence as the user password.
Further, the encrypting the user password by the security chip to generate encrypted data includes:
the security chip encrypts the user password by adopting a data encryption standard DES to generate encrypted data; or,
and the security chip encrypts the user password by adopting an Advanced Encryption Standard (AES) to generate encrypted data.
Further, after the secure chip receives the work start instruction sent by the CPU, the method further includes:
and the safety chip sends a response instruction of the work starting instruction to the CPU according to the work starting instruction.
The present invention also provides a security chip, comprising:
the device comprises a generating module, a display module and a control module, wherein the generating module is used for generating a random data sequence and sending the random data sequence to a Central Processing Unit (CPU) so that the CPU displays a random keyboard on a display screen according to a keyboard position sequence and the random data sequence, and the random data sequence corresponds to the keyboard position sequence one by one;
the acquisition module is used for acquiring an input position of a user on the random keyboard through a touch screen and determining a user password according to the input position, the keyboard position sequence and the random data sequence;
and the encryption module is used for encrypting the user password to generate encrypted data and sending the encrypted data to the CPU.
Further, the secure chip further includes:
and the first receiving module is used for receiving the work starting instruction sent by the CPU.
Further, the acquiring module specifically includes:
an acquisition submodule for acquiring an input position of a user on the random keyboard through a touch screen
The first determining submodule is used for determining a sub-keyboard position sequence corresponding to the input position according to the input position and the keyboard position sequence;
the second determining submodule is used for determining a sub random data sequence corresponding to the sub keyboard position sequence according to the sub keyboard position sequence and the random data sequence;
and the third determining submodule is used for determining the sub-random data sequence as the user password.
Further, the secure chip further includes:
and the sending module is used for sending a response instruction of the work starting instruction to the CPU according to the work starting instruction.
The present invention also provides a password input system, comprising:
a central processing unit CPU, a display screen, a touch screen and a security chip according to any one of claims 6 to 9;
the safety chip is respectively connected with the CPU and the touch screen, and the CPU is connected with the display screen.
The invention provides a password input method, a security chip and a system, wherein a random data sequence is generated by the security chip and sent to the CPU, so that the CPU displays a random keyboard on a display screen according to the keyboard position sequence and the random data sequence, wherein the random data sequence corresponds to the keyboard position sequence one by one, the security chip acquires an input position of a user on the random keyboard and determines a user password according to the input position, the keyboard position sequence and the random data sequence, the security chip encrypts the user password to generate encrypted data and sends the encrypted data to the CPU, the security chip generates the random data sequence and acquires the input position of the user, the user password is finally determined and encrypted to generate the encrypted data to be sent to the CPU, and because the security of the security chip is higher, compared with the mode that the CPU generates the random keyboard sequence and acquires the input position of the user, the random data sequence generated by the security chip and the acquired input position of the user cannot be read, and therefore the security of the user in inputting the password is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic structural diagram of a password input system provided in the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a password input method according to the present invention;
FIG. 3 is a schematic diagram of the random keyboard provided in FIG. 2;
fig. 4 is a flowchart illustrating a second embodiment of a password input method according to the present invention;
fig. 5 is a schematic structural diagram of a first security chip according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a second embodiment of the security chip provided in the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Fig. 1 is a schematic structural diagram of a password input system provided by the present invention. As shown in fig. 1, the password input system provided by the present invention includes:
CPU101, display screen 102, touch-sensitive screen 103 and secure chip 104. The secure chip 104 is connected to the CPU101 and the touch screen 103, respectively, and the CPU101 is connected to the display screen 102.
The secure chip 104 is connected between the CPU101 and the touch panel 103, and physically isolates the CPU101 from the touch panel 103. The secure chip 104 may perform a password entry method as will be described below.
The password input system can be a user terminal device such as a mobile phone, a tablet computer, a personal digital assistant (PDA for short) and a vehicle-mounted computer. The user can use the password input system to input the password so as to log in the mobile banking and carry out mobile payment and other businesses.
Fig. 2 is a schematic flow chart of a password input method according to a first embodiment of the present invention. As shown in fig. 2, the password input method provided in this embodiment includes:
s101: the safety chip generates a random data sequence and sends the random data sequence to the CPU, so that the CPU displays a random keyboard on the display screen according to the keyboard position sequence and the random data sequence.
The random data sequence corresponds to the keyboard position sequence one by one.
Specifically, the security chip in this embodiment may be a security chip in the prior art, and the security chip can only be written with data and cannot be read. The security chip generates a random data sequence based on its internal logic, and sends the random data sequence to the CPU after generation. The CPU is stored with a keyboard position sequence, receives the random data sequence sent by the security chip, and generates a random keyboard according to the keyboard position sequence and the random data sequence.
The random keyboard in this embodiment may be a keyboard with only 10 numbers, such as 0-9, or a keyboard containing 26 english letters and 10 numbers, or a keyboard containing 26 english letters, 10 numbers, and common punctuation marks. In the embodiment, the random keyboard is 10 numbers for explanation, and it can be understood that the random keyboard is implemented in a similar manner when the random keyboard is in other two forms.
The keyboard position sequence represents the display position and the display form of the random keyboard, and when the display position and the display form of the random keyboard are in a fixed form, for example, fig. 3 is a schematic structural diagram of the random keyboard provided in fig. 2, and when the display position and the display form of the random keyboard are in the form shown in fig. 3, the keyboard position sequence may be 10 two-digit numbers 00-09, which are numbered in order from left to right and from top to bottom, the position of the upper left corner is represented by 00, and the position of the lower right corner is represented by 09. The random data sequences correspond to the keyboard position sequences one to one, which means that the number of the random data sequences is the same as that of the keyboard position sequences and corresponds to the keyboard position sequences according to the sequence arrangement sequence. For example, assuming that the random data sequence is 3517924068, 00 corresponds to 3, 01 corresponds to 5, … …, 09 corresponds to 8, and the final random keyboard is shown in FIG. 3. It will be appreciated that when the random keyboard is a 10 digit keyboard having only 0-9, to implement a random keyboard, the random data sequence is a sequence of digits between 0-9 which contains all of the 10 digits and each digit appears only once. When the random keyboard is a keyboard containing 26 english alphabets and 10 numerals, in order to realize the random keyboard, the random data sequence is a sequence containing all 26 english alphabets and 10 data between 0 and 9, and each alphabet and numeral appears only once.
It should be noted that when the display position and the display form of the random keyboard are not fixed, the keyboard position sequence may be in the form of a matrix, each row in the matrix represents a keyboard position, the first column in each row represents an abscissa, and the second column represents an ordinate. The matrix is a 10 x 2 matrix, and random data sequences are in one-to-one correspondence with each row in the matrix.
S102: the security chip acquires an input position of a user on a random keyboard through the touch screen, and determines a user password according to the input position, the keyboard position sequence and the random data sequence.
Specifically, the touch screen and the display screen are arranged in an overlapped mode, a random keyboard is displayed on the display screen, and a user can input a user password on the random keyboard through the touch screen.
The safety chip firstly acquires an input position of a user on the random keyboard through the touch screen, specifically, the touch screen enables the user to input through the IIC protocol, and the safety chip is provided with the drive of the IIC protocol, so that the input position of the user on the random keyboard through the touch screen can be acquired. The number of the input positions is the same as the length of the user password, and optionally, after the security chip acquires the input positions of the user, the input positions can be stored according to the input sequence of the user.
And after the input position of the user is obtained, determining the password of the user according to the corresponding relation among the input position, the keyboard position sequence and the random data sequence.
S103: the security chip encrypts the user password to generate encrypted data and sends the encrypted data to the CPU.
Specifically, after determining the user password, the security chip encrypts the user password, and the security chip may encrypt the user password by using a Data Encryption Standard (DES) to generate encrypted data. Or, the security chip may also encrypt the user password by using advanced encryption standard (AES for short) to generate encrypted data. For example, a personal identification number (PIN code) such as the chinese financial Integrated Circuit (IC) card specification (PBOC3.0) is used for encryption. And after the security chip generates the encrypted data, sending the encrypted data to the CPU for the next operation.
In the process of S101-S103, the security chip generates a random data sequence, and the security chip obtains an input position of a user on a random keyboard through the touch screen, and after obtaining a user password, encrypts the user password and sends the encrypted user password to the CPU.
The invention provides a password input method, which generates a random data sequence through a security chip and sends the random data sequence to a CPU (central processing unit) so that the CPU displays a random keyboard on a display screen according to a keyboard position sequence and the random data sequence, wherein the random data sequence corresponds to the keyboard position sequence one by one, the security chip acquires an input position of a user on the random keyboard and determines a user password according to the input position, the keyboard position sequence and the random data sequence, the security chip encrypts the user password to generate encrypted data and sends the encrypted data to the CPU, the security chip generates the random data sequence and acquires the input position of the user, finally determines the user password and encrypts the user password to generate the encrypted data and sends the encrypted data to the CPU, and compared with the mode that the CPU generates the random data sequence and acquires the input position of the user, the security chip has higher security, the random data sequence generated by the security chip and the input position of the user acquired by the random data sequence cannot be read, so that the security of the user in inputting the password is improved.
Fig. 4 is a flowchart illustrating a second embodiment of a password input method according to the present invention. The password input method provided in this embodiment is based on the embodiment shown in fig. 2, and a specific description is made on steps before S101 and a step of S102. As shown in fig. 4, the password input method provided in this embodiment includes:
s401: and the safety chip receives a work starting instruction sent by the CPU.
Specifically, when the user needs to perform the password input operation, the CPU sends a work start instruction to the security chip to instruct the security chip to perform work. The safety chip receives the work starting instruction. Optionally, the secure chip may send a response instruction of the work start instruction to the CPU according to the work start instruction. After the safety chip sends a response instruction of the work starting instruction to the CPU, the safety chip obtains the authority of the touch screen, and the communication between the CPU and the touch screen is cut off through hardware.
S402: the safety chip generates a random data sequence and sends the random data sequence to the CPU, so that the CPU displays a random keyboard on the display screen according to the keyboard position sequence and the random data sequence.
The random data sequence corresponds to the keyboard position sequence one by one.
S402 is the same as the implementation of S101, and is not described here again.
S403: and the safety chip determines a sub-keyboard position sequence corresponding to the input position according to the input position and the keyboard position sequence.
S404: and the safety chip determines a sub-random data sequence corresponding to the sub-keyboard position sequence according to the sub-keyboard position sequence and the random data sequence.
S405: the safety chip determines the sub-random data sequence as a user password.
Specifically, the sub-keyboard position sequence is included in the keyboard position sequence, and the sub-random data sequence is included in the random data sequence. The length of the sub-keyboard position sequence and the length of the sub-random data sequence are the same as the length of the user password. For example, taking the random keyboard shown in fig. 3 as an example, the keyboard position sequence is 10 two-digit numbers 00-09, the random data sequence is 3517924068, and assuming that the user password is 1234, the security chip can obtain the input position of the user, and according to the input position and the keyboard position sequence, it can be determined that the sub-keyboard position sequence corresponding to the input position is 02-05-00-06. After the sub-keyboard position sequence is obtained, a sub-random data sequence corresponding to the sub-keyboard position sequence is determined according to the sub-keyboard position sequence and the random data sequence, in this example, the number in the random data sequence corresponding to 02 is 1, the number in the random data sequence corresponding to 05 is 2, the number in the random data sequence corresponding to 00 is 3, and the number in the random data sequence corresponding to 06 is 4, and then the sub-random data sequence corresponding to the sub-keyboard position sequence is determined to be 1234. The security chip determines that the sub-random data sequence is the user password, i.e., 1234 the user password.
S406: the security chip encrypts the user password to generate encrypted data and sends the encrypted data to the CPU.
S406 is the same as the implementation process of S103, and is not described here again.
The password input method provided by this embodiment receives a work start instruction sent by a CPU through a security chip, the security chip generates a random data sequence and sends the random data sequence to the CPU, so that the CPU displays a random keyboard on a display screen according to a keyboard position sequence and the random data sequence, the security chip determines a sub-keyboard position sequence corresponding to an input position according to the input position and the keyboard position sequence, the security chip determines a sub-random data sequence corresponding to the sub-keyboard position sequence according to the sub-keyboard position sequence and the random data sequence, the security chip determines that the sub-random data sequence is a user password, the security chip encrypts the user password to generate encrypted data and sends the encrypted data to the CPU, the security chip can enter a working state after the CPU sends the work start instruction, except that the security of the user when inputting the password, the authorization of the touch screen authority is obtained, the flexibility is higher, and the user experience is improved.
Fig. 5 is a schematic structural diagram of a security chip according to a first embodiment of the present invention. As shown in fig. 5, the security chip provided in this embodiment includes:
and the generating module 51 is configured to generate a random data sequence and send the random data sequence to the CPU, so that the CPU displays a random keyboard on the display screen according to the keyboard position sequence and the random data sequence.
The random data sequence corresponds to the keyboard position sequence one by one.
And the obtaining module 52 is configured to obtain an input position of the user on the random keyboard through the touch screen, and determine a user password according to the input position, the keyboard position sequence, and the random data sequence.
And an encryption module 53, configured to encrypt the user password, generate encrypted data, and send the encrypted data to the CPU.
The encryption module 53 is specifically configured to encrypt the user password by using DES. Or, the user password is encrypted by using AES.
The security chip provided in this embodiment is used to execute the password input method in the embodiment shown in fig. 2, and the implementation principle is similar, which is not described herein again.
The security chip provided by the invention is provided with a generation module for generating a random data sequence and sending the random data sequence to a CPU (central processing unit) so that the CPU displays a random keyboard on a display screen according to a keyboard position sequence and the random data sequence, wherein the random data sequence corresponds to the keyboard position sequence one by one, an acquisition module for acquiring an input position of a user on the random keyboard and determining a user password according to the input position, the keyboard position sequence and the random data sequence, an encryption module for encrypting the user password to generate encrypted data and sending the encrypted data to the CPU, the random data sequence is generated by the security chip, the input position of the user is acquired by the security chip, the user password is finally determined and encrypted to generate encrypted data to be sent to the CPU, and because the security of higher security of the security chip, compared with the mode that the CPU generates the random data sequence and acquires the input position of the user, the random data sequence generated by the security chip and the acquired input position of the user cannot be read, and therefore the security of the user in inputting the password is improved.
Fig. 6 is a schematic structural diagram of a second embodiment of the security chip provided in the present invention. As shown in fig. 6, the security chip provided in this embodiment further includes, on the basis of the foregoing embodiment:
the first receiving module 61 is configured to receive a work starting instruction sent by the CPU.
And a sending module 62, configured to send a response instruction of the work starting instruction to the CPU according to the work starting instruction.
The obtaining module 52 specifically includes:
the obtaining sub-module 524 is configured to obtain an input position of the user on the random keyboard through the touch screen.
The first determining submodule 521 is configured to determine a sub-keyboard position sequence corresponding to the input position according to the input position and the keyboard position sequence.
And a second determining submodule 522, configured to determine, according to the sub-keyboard position sequence and the random data sequence, a sub-random data sequence corresponding to the sub-keyboard position sequence.
A third determining submodule 523, configured to determine that the sub-random data sequence is the user password.
The security chip provided in this embodiment may be specifically used to execute the password input method in the embodiment shown in fig. 4, and the implementation principle is similar, which is not described herein again.
The security chip provided by this embodiment is configured with a first receiving module for receiving a work start instruction sent by a CPU, a sending module for sending a response instruction of the work start instruction to the CPU according to the work start instruction, a first determining submodule for determining a sub-keyboard position sequence corresponding to an input position according to the input position and the keyboard position sequence, a second determining submodule for determining a sub-random data sequence corresponding to the sub-keyboard position sequence according to the sub-keyboard position sequence and the random data sequence, and a third determining submodule for determining that the sub-random data sequence is a user password.
The invention also provides a password input system. As shown in fig. 1, the secure chip 104 may be the secure chip shown in fig. 5 or fig. 6.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (10)
1. A password input method, comprising:
the method comprises the steps that a security chip generates a random data sequence and sends the random data sequence to a Central Processing Unit (CPU), so that the CPU displays a random keyboard on a display screen according to a keyboard position sequence and the random data sequence, wherein the random data sequence corresponds to the keyboard position sequence one by one;
the security chip acquires an input position of a user on the random keyboard through a touch screen, and determines a user password according to the input position, the keyboard position sequence and the random data sequence;
and the security chip encrypts the user password to generate encrypted data and sends the encrypted data to the CPU.
2. The method of claim 1, wherein before the secure chip generates the random data sequence, further comprising:
and the safety chip receives a work starting instruction sent by the CPU.
3. The method of claim 1 or 2, wherein the secure chip determining a user password from the input location, the sequence of keyboard locations, and the random data sequence comprises:
the safety chip determines a sub-keyboard position sequence corresponding to the input position according to the input position and the keyboard position sequence;
the safety chip determines a sub-random data sequence corresponding to the sub-keyboard position sequence according to the sub-keyboard position sequence and the random data sequence;
and the safety chip determines the sub-random data sequence as the user password.
4. The method of claim 1, wherein the security chip encrypts the user password to generate encrypted data, comprising:
the security chip encrypts the user password by adopting a data encryption standard DES to generate encrypted data; or,
and the security chip encrypts the user password by adopting an Advanced Encryption Standard (AES) to generate encrypted data.
5. The method according to claim 2, wherein after the secure chip receives the work start instruction sent by the CPU, the method further comprises:
and the safety chip sends a response instruction of the work starting instruction to the CPU according to the work starting instruction.
6. A security chip, comprising:
the device comprises a generating module, a display module and a control module, wherein the generating module is used for generating a random data sequence and sending the random data sequence to a Central Processing Unit (CPU) so that the CPU displays a random keyboard on a display screen according to a keyboard position sequence and the random data sequence, and the random data sequence corresponds to the keyboard position sequence one by one;
the acquisition module is used for acquiring an input position of a user on the random keyboard through a touch screen and determining a user password according to the input position, the keyboard position sequence and the random data sequence;
and the encryption module is used for encrypting the user password to generate encrypted data and sending the encrypted data to the CPU.
7. The security chip of claim 6, wherein the security chip further comprises:
and the first receiving module is used for receiving the work starting instruction sent by the CPU.
8. The security chip according to claim 6 or 7, wherein the obtaining module specifically comprises:
the acquisition submodule is used for acquiring an input position of a user on the random keyboard through a touch screen;
the first determining submodule is used for determining a sub-keyboard position sequence corresponding to the input position according to the input position and the keyboard position sequence;
the second determining submodule is used for determining a sub random data sequence corresponding to the sub keyboard position sequence according to the sub keyboard position sequence and the random data sequence;
and the third determining submodule is used for determining the sub-random data sequence as the user password.
9. The security chip of claim 7, wherein the security chip further comprises:
and the sending module is used for sending a response instruction of the work starting instruction to the CPU according to the work starting instruction.
10. A password entry system, comprising:
a central processing unit CPU, a display screen, a touch screen and a security chip according to any one of claims 6 to 9;
the safety chip is respectively connected with the CPU and the touch screen, and the CPU is connected with the display screen.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610094146.6A CN105760741A (en) | 2016-02-19 | 2016-02-19 | Code input method, security chip and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610094146.6A CN105760741A (en) | 2016-02-19 | 2016-02-19 | Code input method, security chip and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105760741A true CN105760741A (en) | 2016-07-13 |
Family
ID=56330966
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610094146.6A Pending CN105760741A (en) | 2016-02-19 | 2016-02-19 | Code input method, security chip and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105760741A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106991306A (en) * | 2017-03-17 | 2017-07-28 | 维沃移动通信有限公司 | A kind of method and mobile terminal for inputting password |
CN107273736A (en) * | 2017-05-10 | 2017-10-20 | 百富计算机技术(深圳)有限公司 | Cipher-code input method, device, computer equipment and storage medium |
CN107358094A (en) * | 2017-07-10 | 2017-11-17 | 广东天波信息技术股份有限公司 | The password input system and method for smart machine |
CN107657187A (en) * | 2017-09-29 | 2018-02-02 | 百富计算机技术(深圳)有限公司 | A kind of keyboard and input method and system applied to android system |
CN108710810A (en) * | 2018-05-22 | 2018-10-26 | 中国银联股份有限公司 | A kind of acquisition methods of password, traction equipment and terminal |
CN108846302A (en) * | 2018-06-26 | 2018-11-20 | 江苏恒宝智能系统技术有限公司 | A kind of cipher-code input method |
WO2019210767A1 (en) * | 2018-05-04 | 2019-11-07 | 飞天诚信科技股份有限公司 | Method for secure interaction on universal platform and smart terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000057262A1 (en) * | 1999-03-24 | 2000-09-28 | Radiant Systems, Inc. | System for securing entry of encrypted and non-encrypted information on a touch screen |
CN103729605A (en) * | 2014-01-13 | 2014-04-16 | 深圳市中航软件技术有限公司 | Password input method based on touch screen, and touch terminal |
CN104156642A (en) * | 2014-07-22 | 2014-11-19 | 杭州晟元芯片技术有限公司 | Security password input system and method based on security touch screen control chip |
-
2016
- 2016-02-19 CN CN201610094146.6A patent/CN105760741A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2000057262A1 (en) * | 1999-03-24 | 2000-09-28 | Radiant Systems, Inc. | System for securing entry of encrypted and non-encrypted information on a touch screen |
CN103729605A (en) * | 2014-01-13 | 2014-04-16 | 深圳市中航软件技术有限公司 | Password input method based on touch screen, and touch terminal |
CN104156642A (en) * | 2014-07-22 | 2014-11-19 | 杭州晟元芯片技术有限公司 | Security password input system and method based on security touch screen control chip |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106991306A (en) * | 2017-03-17 | 2017-07-28 | 维沃移动通信有限公司 | A kind of method and mobile terminal for inputting password |
CN106991306B (en) * | 2017-03-17 | 2019-08-20 | 维沃移动通信有限公司 | A kind of method and mobile terminal inputting password |
CN107273736A (en) * | 2017-05-10 | 2017-10-20 | 百富计算机技术(深圳)有限公司 | Cipher-code input method, device, computer equipment and storage medium |
WO2018205456A1 (en) * | 2017-05-10 | 2018-11-15 | 百富计算机技术(深圳)有限公司 | Password input method, computer device, and storage medium |
CN107273736B (en) * | 2017-05-10 | 2019-08-30 | 百富计算机技术(深圳)有限公司 | Cipher-code input method, device, computer equipment and storage medium |
CN107358094A (en) * | 2017-07-10 | 2017-11-17 | 广东天波信息技术股份有限公司 | The password input system and method for smart machine |
CN107657187A (en) * | 2017-09-29 | 2018-02-02 | 百富计算机技术(深圳)有限公司 | A kind of keyboard and input method and system applied to android system |
WO2019210767A1 (en) * | 2018-05-04 | 2019-11-07 | 飞天诚信科技股份有限公司 | Method for secure interaction on universal platform and smart terminal |
CN108710810A (en) * | 2018-05-22 | 2018-10-26 | 中国银联股份有限公司 | A kind of acquisition methods of password, traction equipment and terminal |
CN108710810B (en) * | 2018-05-22 | 2022-03-08 | 中国银联股份有限公司 | Password obtaining method, transaction equipment and terminal |
CN108846302A (en) * | 2018-06-26 | 2018-11-20 | 江苏恒宝智能系统技术有限公司 | A kind of cipher-code input method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10565357B2 (en) | Method for securely transmitting a secret data to a user of a terminal | |
CN105760741A (en) | Code input method, security chip and system | |
US10171428B2 (en) | Confidential data management method and device, and security authentication method and system | |
US20160127134A1 (en) | User authentication system and method | |
EP3230917B1 (en) | System and method for enabling secure authentication | |
US20170103250A1 (en) | Fingerprint decryption method and device | |
US10045210B2 (en) | Method, server and system for authentication of a person | |
CN104239804A (en) | Data protecting method and device | |
CN105005731A (en) | Data encryption and decryption methods and mobile terminal | |
US20190377863A1 (en) | Password input method, computer device and storage medium | |
US20160055473A1 (en) | Transaction device, transaction system using the same and transaction method using the same | |
CN105069365A (en) | Data processing method and mobile terminal | |
US8984599B2 (en) | Real time password generation apparatus and method | |
US10552618B2 (en) | Method and apparatus for transmission of visually encoded data | |
KR101392537B1 (en) | User memory method using plural one time password | |
WO2018082930A1 (en) | Method for securely performing a sensitive operation using a non-secure terminal | |
EP3319067B1 (en) | Method for authenticating a user by means of a non-secure terminal | |
CN106326703A (en) | An encryption method, a decryption method and an electronic apparatus | |
EP3319000A1 (en) | Method for securing a transaction performed from a non-secure terminal | |
EP3319001A1 (en) | Method for securely transmitting a secret data to a user of a terminal | |
US20140143858A1 (en) | Processing arrangement and a method for processing information in a machine-to-human communications interface | |
CN103294943A (en) | Encrypted signature handwriting device and method | |
CN112035901B (en) | Information input method, device, electronic equipment and medium | |
EP3319068A1 (en) | Method for securely transmitting a secret data to a user of a terminal | |
KR101648779B1 (en) | Method for secure text input in information terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160713 |