Detailed description of the invention
For making the purpose of the application, technical scheme and advantage clearer, specifically real below in conjunction with the application
Execute example and technical scheme is clearly and completely described by corresponding accompanying drawing.Obviously, described
Embodiment is only some embodiments of the present application rather than whole embodiments.Based on the enforcement in the application
Example, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise
Example, broadly falls into the scope of the application protection.
Existing protect Private Network data by dynamic token technology during, it is understood that there may be dynamic password
The problem of checking difficulty, the application provides a kind of dynamic token control method solving foregoing problems, below ties
Close accompanying drawing and describe this method in detail.
Fig. 1 is token terminal 100 and the schematic diagram of token server 200 in the embodiment of the present application.
Token terminal 100 and token server 200 are with identical key, generate in time or event becomes respectively
Change, effective dynamic password in a certain time interval;Token terminal 100 can be physical token or mobile phone
Token, does not repeats at this.
When verifying dynamic password, user checks current dynamic password from token terminal 100, then this is moved
State password is manually entered into the interface page of token server 200, to complete the checking of dynamic password.
Fig. 2 is the process of dynamic token control method in the application first embodiment, and the method includes walking as follows
Suddenly.
S12a, the time-out request of reception token terminal.
In the embodiment of the present application, suspend and ask when user has verifying dynamic password demand, by artificial transmission
To token terminal 100.
Concrete, user can by triggering the pause button in token terminal 100, or voice, password etc. its
His mode realizes sending token terminal 100 suspending request, does not repeats at this.
S14a, according to token terminal suspend request suspend token terminal 100 generate dynamic password.
When token terminal 100 obtains and suspends request, the dynamic password that token terminal 100 is generated is the most temporary
Stop, thus be supplied to user's enough time and check dynamic password this moment.
Certainly, the time-out duration of dynamic password can be preset according to user's request so that different operating ability
With having grace time to complete the typing of dynamic password per family.
Even say, can suspend request among built-in time-out duration instruction is set, such as, at dynamic token
Timing options is provided on the pause button of 100, after user's selected time-out duration, then triggers pause button.
S16a, the time-out of transmission token server are asked to token server 200, the time-out of token server
Request is for suspending the dynamic password that token server 200 generates.
Shown in Fig. 1, led to by channel 300 between token terminal 100 and token server 200
Letter.
When the dynamic password that token terminal 100 is generated is suspended, is sent by the first channel 300 and suspend
Request is to token server 200 so that the dynamic password that token server 200 is generated also suspends;This
Time, user has the time interface page typing dynamic password at token server 200 of abundance, it is not necessary to worry
Owing to password typing operation is time-consuming the most long, cause token terminal 100 and dynamic password on token server 200
It is difficult to mate the verifying dynamic password failure caused so that the checking of dynamic password is easier to.
Meanwhile, when there being dynamic password to suspend demand, user can suspend token terminal 100 within a very short time
Dynamic password generated with token server 200 so that the checking of dynamic password is the most convenient, improves user
Operating experience for token terminal 100 so that this token terminal 100 has more preferable market value.
Fig. 3 is the process of dynamic token control method in the application the second embodiment, compared with previous embodiment,
Difference is, dynamic token control method also includes being positioned at the following steps after step S16a.
S22a, the wake request of reception token terminal.
With in previous embodiment time-out ask contrary, wake request when user completes verifying dynamic password,
By artificial transmission to token terminal 100.
Equally, user can by triggering the button that wakes up up in token terminal 100, or voice, password etc. other
Mode realizes token terminal 100 is sent wake request, does not repeats at this.
S24a, wake request according to token terminal wake up the dynamic password that token terminal 100 generates up.
When token terminal 100 obtains wake request, in token terminal 100 due to acquisition time-out request certainly
The dynamic dynamic password suspended is automatically wakened up.
As a example by dynamic password time dependent token terminal 100, wake up the dynamic of token terminal 100 generation up
The process of state password specifically includes: token terminal 100 obtains current time, by current moment and dynamic token
Initial time compare, thus obtain current dynamic password and in token terminal 100, show this dynamic mouth
Order.
Certainly, when the dynamic password of token terminal 100 is with event change, its wakeup process and said process class
Seemingly, do not repeat at this.
S26a, send token server wake request to token server 200, waking up up of token server
Request is for waking up the dynamic password that token server 200 generates up.
After in token terminal 100 and token server 200, dynamic password is all waken up, user can enter again
Mobile state password authentication;The wakeup process of dynamic password and aforementioned token terminal in this token server 200
The wakeup process of 100 is consistent, does not repeats at this.
Fig. 4 is the process of dynamic token control method in the application the 3rd embodiment, compared with previous embodiment,
Difference is, token control method also includes the following steps between step S22a and S24a.
Time delay is preset in S23a, wait.
When stating step S22a to obtain wake request before execution, still wait that default time delay just performs step
S24a wakes up dynamic password in token terminal 100 up, thus gives user's certain time and confirm dynamic password
Whether typing completes, it is to avoid user's false touch wakes up button up and causes in token terminal 100 and token server 200
Dynamic password is by false wake-up.
Fig. 5 is the process of dynamic token control method in the application the 4th embodiment, compared with previous embodiment,
Difference is, token control method comprises the steps.
S12b, the time-out request of acquisition token server.
S14b, according to token server suspend request suspend token server 200 generate dynamic password.
In the embodiment of the present application, the time-out request of token server is sent by token terminal 100, is obtaining
When taking the request of this time-out, the dynamic password automatic pause that token server 200 is generated, it is simple to paused
The dynamic password of token terminal 100 keep consistent, it is ensured that user carries out the precision of verifying dynamic password.
Certainly, the time-out request of token server may be used without other modes, does not repeats at this.
Fig. 6 is the process of dynamic token control method in the application the 5th embodiment, compared with previous embodiment,
Difference is, token control method also comprises the steps.
S22b, the wake request of acquisition token server.
In the embodiment of the present application, the wake request of token server is sent by token terminal 100, is obtaining
When taking this wake request, token server 200 is asked and the dynamic password of automatic pause owing to acquisition suspends
Automatically wakened up.
S24b, wake request according to token server wake up the dynamic password that token server 200 generates up.
As a example by the time dependent token server of dynamic password 200, wake up token server 200 up and generate
The process of dynamic password specifically include: token server 200 obtains current time, by the current moment with dynamic
The initial time of state token compares, thus obtains current dynamic password and show on token server 200
This dynamic password.
When the dynamic password of token server 200 is with event change, its wakeup process is similar with said process,
Do not repeat at this;Certainly, the time-out request of token server may be used without other modes, does not do superfluous at this
State.
Fig. 7 is the process of dynamic token control method in the application sixth embodiment, compared with previous embodiment,
Difference is, token control method also comprises the steps.
S32b, determine that token server 200 generates the time-out moment of dynamic password, and open from this time-out moment
Beginning timing.
When token server 200 is suspended, can obtain according to the dynamic password on current token server 200
Go out current time, using current time as the time-out moment of dynamic password.
S34b, judge from suspending the wake request whether obtaining token server the moment in Preset Time, if
No, perform step S36b, if so, perform step S38b.
S36b, wake up up token server 200 generate dynamic password.
S38b, wake request according to token server wake up the dynamic password that token server 200 generates up.
The wake request moment too late, i.e. beyond Preset Time time, automatically waken up token server 200 and generate
Dynamic password, it is to avoid owing between token terminal 100 and token server 200, communication delay causes, order
Board terminal 100 is waken up, but token server 200 is not waken up, and causes follow-up cannot be carried out dynamically
Password authentication.
Fig. 8 controls the structural representation of device for the dynamic token that the embodiment of the present application provides, and the application implements
The Token Control device that example is provided is based on dynamic token control method in aforementioned first to the 3rd embodiment,
Therefore the detail of this device can refer to aforementioned dynamic token control method, is the most no longer repeated.
Token Control device 10a, is positioned among token terminal 100, and this Token Control device 10 includes:
Token terminal suspends request receiver module 12a, receives the time-out request of token terminal;
Token terminal is suspended request and is performed module 14a, asks to suspend token eventually according to the time-out of token terminal
The dynamic password that end generates;
Token server suspends request sending module 16a, and the time-out request sending token server takes to token
Business device, the request that suspends of token server is used for suspending the dynamic password that token server 200 generates.
In the embodiment of the present application, dynamic token controls device 10a and also includes:
The request of token terminal wake-up receives device, receives the wake request of token terminal;
The request of token terminal wake-up performs module, wakes up token terminal up according to the wake request of token terminal raw
The dynamic password become;
Token server wake request sending module, sends the wake request of token server to token service
Device, the wake request of token server is for waking up the dynamic password that token server 200 generates up.
In the embodiment of the present application, dynamic token controls device 10a and also includes time delay module, specifically for:
After receiving the wake request of token terminal, wake up token up eventually according to the wake request of token terminal
Before the dynamic password that end generates, wait and preset time delay.
In the embodiment of the present application, token terminal is handset token.
Fig. 9 is the structural representation that in another embodiment of the application, dynamic token controls device, and the application implements
The Token Control device that example is provided is based on dynamic token control method in aforementioned 4th to the 5th embodiment,
Therefore the detail of this device can refer to aforementioned dynamic token control method, is the most no longer repeated.
Token Control device 10b, is positioned among token server 200, at the dynamic mouth that token terminal generates
When order is suspended, this Token Control device 10b includes:
Token server suspends acquisition request module 12b, obtains the time-out request of token server;
Token server suspends request and performs module 14b, asks moratorium according to the time-out of token server
The dynamic password that board server generates.
In the embodiment of the present application, dynamic token controls device 10b and also includes:
Token server wake request acquisition module, obtains the wake request of token server;
Token server wake request performs module, wakes up token clothes up according to the wake request of token server
The dynamic password that business device generates.
In the embodiment of the present application, dynamic token controls device 10b and also includes: predetermined time determination module, uses
In:
Determine that token server generates the time-out moment of dynamic password.
When token server is suspended, when can draw current according to the dynamic password on current token server
Carve, using current time as the time-out moment of dynamic password.
Judge whether to obtain in Preset Time the wake request of token server from suspending the moment, if it is not, call out
The dynamic password that token server of waking up generates.
The Token Control device that the embodiment of the present application is provided so that token terminal and token server are produced
Dynamic password can suspend when user has verifying dynamic password demand, thus give user's enough time and enter
The input of Mobile state password, improves the input accuracy of dynamic password, it is to avoid owing to token server end moves
The change of state password causes verifying dynamic password failure so that verifying dynamic password is simple
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or meter
Calculation machine program product.Therefore, the present invention can use complete hardware embodiment, complete software implementation or knot
The form of the embodiment in terms of conjunction software and hardware.And, the present invention can use and wherein wrap one or more
Computer-usable storage medium containing computer usable program code (include but not limited to disk memory,
CD-ROM, optical memory etc.) form of the upper computer program implemented.
The present invention is with reference to method, equipment (system) and computer program product according to embodiments of the present invention
The flow chart of product and/or block diagram describe.It should be understood that can by computer program instructions flowchart and
/ or block diagram in each flow process and/or flow process in square frame and flow chart and/or block diagram and/
Or the combination of square frame.These computer program instructions can be provided to general purpose computer, special-purpose computer, embedding
The processor of formula datatron or other programmable data processing device is to produce a machine so that by calculating
The instruction that the processor of machine or other programmable data processing device performs produces for realizing at flow chart one
The device of the function specified in individual flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and computer or the process of other programmable datas can be guided to set
In the standby computer-readable memory worked in a specific way so that be stored in this computer-readable memory
Instruction produce and include the manufacture of command device, this command device realizes in one flow process or multiple of flow chart
The function specified in flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, makes
Sequence of operations step must be performed to produce computer implemented place on computer or other programmable devices
Reason, thus the instruction performed on computer or other programmable devices provides for realizing flow chart one
The step of the function specified in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
In a typical configuration, calculating equipment includes one or more processor (CPU), input/defeated
Outgoing interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory
(RAM) and/or the form such as Nonvolatile memory, such as read only memory (ROM) or flash memory (flAsh
RAM).Internal memory is the example of computer-readable medium.
Computer-readable medium includes that removable media permanent and non-permanent, removable and non-can be by appointing
Where method or technology realize information storage.Information can be computer-readable instruction, data structure, program
Module or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory
(PRAM), static RAM (SRAM), dynamic random access memory (DRAM), its
The random access memory (RAM) of his type, read only memory (ROM), electrically erasable are read-only
Memorizer (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read only memory
(CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette tape, tape magnetic
Disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be calculated
The information that equipment accesses.According to defining herein, computer-readable medium does not include temporary computer-readable matchmaker
Body (trAnsitory mediA), such as data signal and the carrier wave of modulation.
Also, it should be noted term " includes ", " comprising " or its any other variant are intended to non-
Comprising of exclusiveness, so that include that the process of a series of key element, method, commodity or equipment not only wrap
Include those key elements, but also include other key elements being not expressly set out, or also include for this process,
The key element that method, commodity or equipment are intrinsic.In the case of there is no more restriction, statement " include
One ... " key element that limits, it is not excluded that including the process of described key element, method, commodity or setting
Other identical element is there is also in Bei.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer journey
Sequence product.Therefore, the application can use complete hardware embodiment, complete software implementation or combine software and
The form of the embodiment of hardware aspect.And, the application can use and wherein include calculating one or more
The computer-usable storage medium of machine usable program code (include but not limited to disk memory, CD-ROM,
Optical memory etc.) form of the upper computer program implemented.
The foregoing is only embodiments herein, be not limited to the application.For this area skill
For art personnel, the application can have various modifications and variations.All institutes within spirit herein and principle
Any modification, equivalent substitution and improvement etc. made, within the scope of should be included in claims hereof.