CN112464183A - Security information input method, information security device, and storage medium - Google Patents

Security information input method, information security device, and storage medium Download PDF

Info

Publication number
CN112464183A
CN112464183A CN201910841601.8A CN201910841601A CN112464183A CN 112464183 A CN112464183 A CN 112464183A CN 201910841601 A CN201910841601 A CN 201910841601A CN 112464183 A CN112464183 A CN 112464183A
Authority
CN
China
Prior art keywords
information
security
safety
information input
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910841601.8A
Other languages
Chinese (zh)
Inventor
陈柳章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Excelsecu Data Technology Co Ltd
Original Assignee
Shenzhen Excelsecu Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Excelsecu Data Technology Co Ltd filed Critical Shenzhen Excelsecu Data Technology Co Ltd
Priority to CN201910841601.8A priority Critical patent/CN112464183A/en
Priority to PCT/CN2020/096585 priority patent/WO2021042808A1/en
Publication of CN112464183A publication Critical patent/CN112464183A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Input From Keyboards Or The Like (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a safety information input method, a safety information input device and a storage medium, wherein the method comprises the steps of receiving an information acquisition instruction sent by a terminal; sending keyboard equipment type description information to a terminal according to the information acquisition instruction; after the terminal identifies the information safety equipment as a keyboard, generating safety information; and inputting the safety information into the terminal through a keyboard protocol. User keys are simulated through the information safety equipment, safety information is input into the terminal, manual input of a user is not needed, and user experience is improved.

Description

Security information input method, information security device, and storage medium
Technical Field
The present invention relates to the field of identity authentication, and in particular, to a security information input method, an information security device, and a storage medium.
Background
At present, with the development of computer networks, online transactions are more and more popular, but meanwhile, security problems of online transactions involving bank accounts, passwords and the like also come along with the online transactions, and the online transactions are more and more concerned. At present, the common protection modes include a fixed password, a static password, a dynamic password and the like. However, the password needs to be manually input into the terminal and submitted to the server for identity authentication, so that the operation is complicated, the user experience is poor, and the password is peeped in the input process.
Disclosure of Invention
The main object of the present invention is to provide a secure information input method, an information security device, and a storage medium, which can realize automatic password input without manually inputting a password.
In order to achieve the above object, the present invention provides a security information input method applied to an information security device, the method comprising,
receiving an information acquisition instruction sent by a terminal;
sending keyboard equipment type description information to a terminal according to the information acquisition instruction;
after the terminal identifies the information safety equipment as a keyboard, generating safety information;
and inputting the safety information into the terminal through a keyboard protocol.
Further, the "generating security information" includes:
judging whether an operation that a user confirms to input safety information is received;
and if the operation that the user confirms to input the safety information is received, generating the safety information.
Further, the security information input method includes:
entering an identity recognition request process;
detecting whether identity recognition information is received;
if the identity identification information is received, judging whether the identity identification information is matched with preset identity authentication information;
and if the identity identification information is matched with the preset identity authentication information, allowing the safety information to be sent.
Further, the identification request process includes a fingerprint identification process and/or a password identification process.
Further, after the "inputting the security information into the terminal through a keyboard protocol", the security information inputting method further includes:
generating an enter confirmation instruction;
and inputting the enter confirmation instruction into the terminal through a keyboard protocol.
Further, before the step of sending the keyboard device type description information to the terminal according to the information obtaining instruction, the security information input method includes:
judging whether a command for switching to a safety information input mode is received;
and if a command for switching to the safety information input mode is received, switching the current application mode to the safety information input mode.
The invention also provides an information security device, further comprising a processor and a memory, the memory storing a security information input program configured to be executed by the processor to implement the security information input method of any one of the above.
Further, the information safety device further comprises at least one of a USB module or a Bluetooth module.
Further, the information security device includes an FIDO (Fast Identity authentication mode) module, and the FIDO module can switch the current application mode to the security information input mode through mode switching.
The present invention also provides a storage medium which is a computer-readable storage medium having a security information input program stored thereon, the security information input program being executable by one or more processors to implement the security information input method as described in any one of the above.
The method and the device for inputting the safety information have the advantages that the safety information is input into the terminal by simulating the key of the user through the information safety equipment without manual input of the user, and the user experience is improved.
Drawings
Fig. 1 is a schematic structural diagram of an information security device according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a security information input method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a display interface of an input box of a terminal;
fig. 4 is a schematic flowchart of another security information input method according to an embodiment of the present invention;
the implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the description relating to "first", "second", etc. in the present invention is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
Referring to fig. 1, an information security apparatus according to an embodiment of the present invention includes a processor 300, a memory 400, a USB module 600, a bluetooth module 700, and a Fast Identity authentication mode (FIDO) module 800. The information security device further comprises a network interface (not shown) and a communication bus 700. The processor 300, mode switch module 500, and FIDO module 600 are connected via a communication bus 500. The memory 400 stores a secure information input program configured to be executed by the processor 300, and the processor 300 executes the secure information input program to implement the secure information input method.
Specifically, the information security device further includes at least one of a USB module 600 or a bluetooth module 700. The information safety equipment can send the safety information to the terminal in a wired transmission mode through the USB; or the safety information is input into the terminal by establishing Bluetooth communication with the terminal. The information security apparatus includes an FIDO module 800, and the FIDO module 800 can switch a current application mode to a security information input mode through mode switching. The FIDO verification mode can be directly entered through mode switching, and FIDO authentication can be directly performed when connection is established with a terminal which performs identity authentication by using FIDO.
Referring to fig. 2, an embodiment of the present invention further provides a security information input method, which is applied to information security equipment, where the security information input method includes:
step S101: receiving an information acquisition instruction sent by a terminal;
step S103: sending keyboard equipment type description information to a terminal according to the information acquisition instruction;
step S105: after the terminal identifies the information safety equipment as a keyboard, generating safety information;
step S107: and inputting the safety information into the terminal through a keyboard protocol.
In this embodiment, after the information security device establishes a communication connection with the terminal, the terminal needs to determine the type of the information security device, and the information security device sends keyboard device type description information to the terminal to prepare for inputting security information by using a simulated keyboard. The input keyboard device type description may be a keyboard descriptor or a keyboard descriptor based on the bluetooth protocol. Specifically, after the information security device establishes data connection with the terminal through the USB module 600 or the bluetooth module 700, the information security device sends the input keyboard device type description to the terminal, so that the terminal device recognizes the information security device as a keyboard. Specifically, when the terminal sends the keyboard descriptor to the terminal through the USB module 600 or the bluetooth module 700, the terminal recognizes the information security device as a keyboard and waits for the information security device to input characters. And generating safety information, and inputting the safety information to an input box of the terminal according to a keyboard protocol. In some embodiments, before sending the keyboard device type description information to the terminal, it is determined whether a command to switch to the security information input mode is received; and if a command of switching to the safety information input mode is received, switching the current FIDO mode to the safety information input mode. If the current mode is the safety information input mode, after the terminal identifies that the information safety equipment is a keyboard, whether a command for switching to the FIDO mode is received or not is judged, if the command is received, the mode is switched to the FIDO mode, and if the command is not received, the safety information input mode is continued.
Specifically, as shown in fig. 3, in the process of login and transaction of a user using the terminal, the terminal displays a security information input box to wait for the user to input security information, and inputs the security information through the corresponding input keyboard device type description to complete the input of identity information.
Preferably, the method further comprises: judging whether an operation that a user confirms to input safety information is received;
and if the operation that the user confirms to input the safety information is received, generating the safety information.
In this embodiment, if it is determined that the terminal identifies that the information security device is a keyboard, the information security device waits for the user to confirm the input of the security information in a cycle, and the user confirms the operation of inputting the security information through a key, so as to generate the security information and input the security information to the terminal. Specifically, a single-click key may be used as an operation for the user to confirm the input of the security information, and a double-click key may be used as a command to switch to the FIDO mode or a command to switch to the security information input mode.
Preferably, referring to fig. 4, the security information input method may further include:
step S301: entering an identity recognition request process;
step S303: detecting whether identity recognition information is received; if the identification information is received, step S305 is executed; otherwise, executing step S301;
step S305: judging whether the identity identification information is matched with preset identity authentication information or not; if the identification information matches with the preset identification information, executing step S307; otherwise, executing step S301;
step S307: allowing the transmission of secure information.
Specifically, in order to prevent the information security device from being stolen by a person, the identity of the user needs to be further verified. In this embodiment, the identification request process includes at least one of a fingerprint identification process and an authentication password identification process. The fingerprint information or the identity authentication password is pre-stored in the information security equipment, so that the identity of the user can be further confirmed before the security information is input to the terminal.
In one embodiment, the information security device is a dynamic token and the security information is a dynamic password. In another embodiment, the information security device is a scrambler, the security information is an account password, and the scrambler further includes, after the terminal recognizes that the scrambler is a keyboard: the account list is displayed. After the user selects an account, an account password corresponding to the selected account is input into the terminal through a keyboard protocol (specifically, the account is input into the terminal first, and the password is input into the terminal when the user confirmation instruction is received again).
According to the information safety equipment in the embodiment, the user key is simulated through the information safety equipment, the safety information is input into the terminal, manual input of a user is not needed, and the user experience is improved.
In this embodiment, the memory 400 includes at least one type of readable storage medium, which includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, and the like. The memory 400 may be an internal storage unit of the information security device, such as a hard disk of the information security device, in some embodiments. The memory 400 may also be an external storage device of the information security device in other embodiments, such as a plug-in hard disk provided on the information security device, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and so on. Further, the memory 400 may also include both an internal storage unit and an external storage device of the information security apparatus. The memory 400 may be used not only to store application software installed in the information security apparatus and various types of data, such as a code of the information security apparatus, etc., but also to temporarily store data that has been output or is to be output.
Processor 300, which in some embodiments may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor or other data Processing chip, executes program code or processes data stored in memory 400, such as executing a security information input program.
The network interface may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), and is typically used to establish a communication link between the information security device and other electronic devices.
The network interface is used to enable connectivity communications between these components.
A communication bus 500 is used to enable connectivity communication between these components.
Furthermore, an embodiment of the present invention further provides a storage medium, where a security information input program is stored on the storage medium, and the security information input program is executable by one or more processors to implement the following operations:
step S101: receiving an information acquisition instruction sent by a terminal;
step S103: sending keyboard equipment type description information to a terminal according to the information acquisition instruction;
step S105: after the terminal identifies the information safety equipment as a keyboard, generating safety information;
step S107: and inputting the safety information into the terminal through a keyboard protocol.
The storage medium of the present invention is substantially the same as the above-mentioned embodiments of the security information input method and the information security device, and will not be described herein again.
It should be noted that the above-mentioned numbers of the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for causing an information security device to execute the method according to the embodiments of the present invention.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A safety information input method is applied to information safety equipment and is characterized by comprising the following steps,
receiving an information acquisition instruction sent by a terminal;
sending keyboard equipment type description information to a terminal according to the information acquisition instruction;
after the terminal identifies the information safety equipment as a keyboard, generating safety information;
and inputting the safety information into the terminal through a keyboard protocol.
2. The security information input method according to claim 1, wherein the "generating security information" includes:
judging whether an operation that a user confirms to input safety information is received;
and if the operation that the user confirms to input the safety information is received, generating the safety information.
3. The secure information input method according to claim 1, characterized in that the secure information input method includes:
entering an identity recognition request process;
detecting whether identity recognition information is received;
if the identity identification information is received, judging whether the identity identification information is matched with preset identity authentication information;
and if the identity identification information is matched with the preset identity authentication information, allowing the safety information to be sent.
4. The security information input method of claim 3, wherein the identification request process comprises a fingerprint identification process and/or a password identification process.
5. The security information input method according to claim 1, wherein after the "inputting the security information into the terminal by a keyboard protocol", the security information input method further comprises:
generating an enter confirmation instruction;
and inputting the enter confirmation instruction into the terminal through a keyboard protocol.
6. The security information input method according to claim 1, wherein before the "sending keyboard device type description information to the terminal according to the acquisition information instruction", the security information input method includes:
judging whether a command for switching to a safety information input mode is received;
and if a command for switching to the safety information input mode is received, switching the current application mode to the safety information input mode.
7. An information security device, further comprising a processor and a memory, the memory storing a security information input program configured to be executed by the processor to implement the security information input method of any one of claims 1 to 6.
8. The information security device of claim 7, further comprising at least one of a USB module or a bluetooth module.
9. The information security device of claim 8, wherein the information security device comprises a Fast Identity authentication (FIDO) module, and the FIDO module switches a current application mode to a security information input mode by mode switching.
10. A storage medium, characterized by: the storage medium is a computer-readable storage medium having stored thereon a security information input program executable by one or more processors to implement the security information input method of any one of claims 1-6.
CN201910841601.8A 2019-09-06 2019-09-06 Security information input method, information security device, and storage medium Pending CN112464183A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910841601.8A CN112464183A (en) 2019-09-06 2019-09-06 Security information input method, information security device, and storage medium
PCT/CN2020/096585 WO2021042808A1 (en) 2019-09-06 2020-06-17 Security information input method, information security device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910841601.8A CN112464183A (en) 2019-09-06 2019-09-06 Security information input method, information security device, and storage medium

Publications (1)

Publication Number Publication Date
CN112464183A true CN112464183A (en) 2021-03-09

Family

ID=74807738

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910841601.8A Pending CN112464183A (en) 2019-09-06 2019-09-06 Security information input method, information security device, and storage medium

Country Status (2)

Country Link
CN (1) CN112464183A (en)
WO (1) WO2021042808A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030226016A1 (en) * 2002-05-31 2003-12-04 International Business Machines Corporation Assurance of authentication in a computer system apparatus and method
CN102902903A (en) * 2012-10-10 2013-01-30 山东中孚信息产业股份有限公司 Electronic commerce intelligent password key with button and implementation method for electronic commerce intelligent password key
CN103425944A (en) * 2013-07-16 2013-12-04 深圳市文鼎创数据科技有限公司 Information safety input method and information safety device
CN105072114A (en) * 2015-08-11 2015-11-18 深圳市文鼎创数据科技有限公司 Automatic form filling method, password manager, upper computer and system
CN107315933A (en) * 2017-05-16 2017-11-03 武汉普利商用机器有限公司 A kind of fingerprint cipher keyboard

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030226016A1 (en) * 2002-05-31 2003-12-04 International Business Machines Corporation Assurance of authentication in a computer system apparatus and method
CN102902903A (en) * 2012-10-10 2013-01-30 山东中孚信息产业股份有限公司 Electronic commerce intelligent password key with button and implementation method for electronic commerce intelligent password key
CN103425944A (en) * 2013-07-16 2013-12-04 深圳市文鼎创数据科技有限公司 Information safety input method and information safety device
CN105072114A (en) * 2015-08-11 2015-11-18 深圳市文鼎创数据科技有限公司 Automatic form filling method, password manager, upper computer and system
CN107315933A (en) * 2017-05-16 2017-11-03 武汉普利商用机器有限公司 A kind of fingerprint cipher keyboard

Also Published As

Publication number Publication date
WO2021042808A1 (en) 2021-03-11

Similar Documents

Publication Publication Date Title
CN109544135B (en) Bank card binding method and device, storage medium and mobile terminal
TWI530894B (en) Method and related apparatus for information verification and apparatus thereof
EP3188105B1 (en) Verification information transmission method and terminal
US20110185181A1 (en) Network authentication method and device for implementing the same
US9667626B2 (en) Network authentication method and device for implementing the same
JP5217890B2 (en) Application downloading system and method for portable terminal
CN101221641B (en) On-line trading method and its safety affirmation equipment
CN109257321B (en) Secure login method and device
JP2009015712A (en) Authentication device, authentication method, and authentication program
CN104469736B (en) A kind of data processing method, server and terminal
CN110351672A (en) Information-pushing method, device and electronic equipment
KR101603963B1 (en) Authentication method using fingerprint information and certification number, user terminal and financial institution server
CN115038062A (en) Bluetooth authentication method, device and equipment
CN111586074B (en) Communication method, server, Internet of things system and readable storage medium
CN104079527A (en) Information processing method and electronic equipment
CN110602679B (en) Display and transmission method, identity authentication and data transmission device and terminal
CN109858235B (en) Portable equipment and password obtaining method and device thereof
EP3410332B1 (en) A system and method for transferring data to an authentication device
CN113935008B (en) User authentication method, device, electronic equipment and computer readable storage medium
KR101459283B1 (en) 2 Channel authentication device and method
CN112464183A (en) Security information input method, information security device, and storage medium
CN105471884A (en) Authentication method and server
CN109067551A (en) A kind of real name identification method, computer readable storage medium and terminal device
CN104113417A (en) Dynamic password identity authentication method and system based on near field communication (NFC)
CN114531679A (en) Mobile terminal permission interaction system and method based on user identification card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination