CN113066239A - Password safety input device - Google Patents
Password safety input device Download PDFInfo
- Publication number
- CN113066239A CN113066239A CN202110364076.2A CN202110364076A CN113066239A CN 113066239 A CN113066239 A CN 113066239A CN 202110364076 A CN202110364076 A CN 202110364076A CN 113066239 A CN113066239 A CN 113066239A
- Authority
- CN
- China
- Prior art keywords
- sha
- character
- key
- digest
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F19/00—Complete banking systems; Coded card-freed arrangements adapted for dispensing or receiving monies or the like and posting such transactions to existing accounts, e.g. automatic teller machines
- G07F19/20—Automatic teller machines [ATMs]
- G07F19/201—Accessories of ATMs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1016—Devices or methods for securing the PIN and other transaction-data, e.g. by encryption
Abstract
The invention provides a password safety input device, which comprises a character input and display device, wherein the character input and display device is fixedly arranged in a character fixed installation area, the display output device is fixedly arranged in a display fixed installation area, a PCB fixed installation seat for fixedly installing a PCB is arranged in a base, the PCB is fixedly arranged on the PCB fixed installation seat, a controller is arranged on the PCB, a data end for character input and display is connected with a character input and display end of the controller, and a display end for display output is connected with a display end of the controller; the character input and display comprises A button display keys, when the controller receives a password input trigger signal, the input characters are displayed on the character input and display, the password characters are input through the button display keys, and when the controller receives the password input, the received password is transmitted to the verification terminal for verification. The invention can realize the safe password input and ensure the privacy of the user.
Description
Technical Field
The invention relates to the technical field of password devices, in particular to a password security input device.
Background
The password keyboard is one of indispensable computer peripheral equipment of financial cash register system, and the wide application is used in service trades such as communication, government, transportation, government, industry and commerce, tax, supermarket, uses in cooperation with bank system, POS machine and management system, mainly is used for inputing the password. When the characters are input, the characters on the button display keys are kept unchanged, and the patent application No. 2018216620332, entitled 'a double anti-peeping password input device for banks', discloses that a front view port is arranged on the upper side of the front end of a machine body, an input port is arranged on the lower side of the front end of the machine body, and at least three number keys are uniformly and movably connected to the bottom end of the inner part of the front view port. Because the bottom surface of the front view port inclines upwards at an angle of forty-five degrees to sixty degrees from front to back, the front end and the back end of the pressing block are upwards tilted at an angle of fifteen degrees to thirty degrees, and the pressing block from front to back is a straight line inclined at an angle of forty-five degrees to sixty degrees, so that when a password is input by pressing the pressing block, hands of a user pressing the keys can be difficultly seen by other people, the sequence of the keys can not be memorized, then, because of the inclination at the bottom of the front view port, the actions of the digital keys can be difficultly seen when other people peep from the top, and the problems that the existing password input device is difficult to protect account passwords and the visual angles of the digital keys are difficult to select and observe according to the requirements of customers are solved.
Disclosure of Invention
The invention aims to at least solve the technical problems in the prior art, and particularly innovatively provides a password security input device.
In order to achieve the above purpose, the invention provides a password security input device, which comprises a base, wherein a character fixing installation area for fixedly installing character input and display and a display fixing installation area for fixedly installing display output are arranged on the base, the character input and display are fixedly installed in the character fixing installation area, the display output is fixedly installed in the display fixing installation area, a PCB circuit board fixing installation seat for fixedly installing a PCB circuit board is arranged in the base, the PCB circuit board is fixedly installed on the PCB circuit board fixing installation seat, a controller is arranged on the PCB circuit board, a data end for character input and display is connected with a character input and display end of the controller, and a display end for display output is connected with a display end of the controller; the character input and display comprises A button display keys, namely a 1 st key, a 2 nd key, a 3 rd key and … … for a button display and an A-th key for the button display respectively;
when the controller receives a password input trigger signal, input characters are displayed on the character input and display, a 1 st key, a 2 nd key, a 3 rd key, … … and an A-th key are displayed through buttons to input password characters, and when the controller receives the password input, the received password is transmitted to the verification terminal to be verified.
The invention also provides a method for realizing safe password input, which comprises the following steps:
s1, the controller receives the input password;
s2, the verification terminal determines whether the password received by its controller is consistent with a preset password preset in the verification terminal:
if the password received by the controller is consistent with a preset password preset in the verification terminal, the verification is successful;
if the password received by the controller is inconsistent with a preset password preset in the verification terminal, the verification fails; return is made to step S1.
In conclusion, by adopting the technical scheme, the password input safety can be realized, and the privacy of the user is ensured.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic diagram of the present invention.
FIG. 2 is a schematic illustration of the present invention.
FIG. 3 is a schematic illustration of the present invention.
FIG. 4 is a schematic illustration of the present invention.
FIG. 5 is a schematic illustration of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the accompanying drawings are illustrative only for the purpose of explaining the present invention, and are not to be construed as limiting the present invention.
The invention discloses a password safety input device, which comprises a base 2, wherein a character fixing installation area for fixedly installing a character input and display 3 and a display fixing installation area for fixedly installing a display output 1 are arranged on the base 2, the character input and display 3 is fixedly installed in the character fixing installation area, the display output 1 is fixedly installed in the display fixing installation area, a PCB circuit board fixing installation seat for fixedly installing a PCB circuit board is arranged in the base 2, the PCB circuit board is fixedly installed on the PCB circuit board fixing installation seat, a controller is arranged on the PCB circuit board, a data end of the character input and display 3 is connected with a character input and display end of the controller, and a display end of the display output 1 is connected with a display end of the controller; the character input and display 3 comprises A button display keys, namely a 1 st key, a 2 nd key, a 3 rd key, … … and an A-th key for the button display respectively; in this embodiment, the device further comprises a data transceiver module disposed on the PCB, wherein a data transceiver end of the data transceiver module is connected to a data transceiver end of the controller, the data transceiver module comprises a data transceiver wireless module or/and a data transceiver wired module, the data transceiver end of the data transceiver wireless module is connected to a data transceiver wireless end of the controller, the data transceiver end of the data transceiver wired module is connected to a data transceiver wired end of the controller, and the data transceiver wireless module comprises one or any combination of a 4G data transceiver wireless module, a 5G data transceiver wireless module, and a WiFi data transceiver wireless module; the data transceiving end of the 4G data transceiving wireless module is connected with the data transceiving wireless 4G end of the controller, the data transceiving end of the 5G data transceiving wireless module is connected with the data transceiving wireless 5G end of the controller, the data transceiving end of the WiFi data transceiving wireless module is connected with the data transceiving wireless WiFi end of the controller, the data transceiving wired module comprises a hundred-megabyte data transceiving wired module or/and a gigabit data transceiving wired module, the data transceiving end of the data transceiving wired hundred-megabyte module is connected with the data transceiving wired hundred-megabyte end of the controller, and the data transceiving end of the data transceiving wired gigabit module is connected with the data transceiving wired gigabit end of the controller.
When the controller receives a password input trigger signal, the input characters are displayed on the character input and display 3, the 1 st key, the 2 nd key, the 3 rd key, … … and the A-th key are displayed through the buttons to input password characters, and when the controller receives the password input, the received password is transmitted to the verification terminal for verification. In the present embodiment, the button display key has a display and input function, for example, the character number "5" is displayed on the button display key, and when the button display key is pressed, the character number "5" is input into the controller, displayed on the a button display keys are a different characters, for example 10 button display keys, the number "0" is displayed on the 1 st key of the button display, the number "1" is displayed on the 2 nd key of the button display, the number "2" is displayed on the 3 rd key of the button display, the number "3" is displayed on the 4 th key of the button display, the number "4" is displayed on the 5 th key of the button display, the number "5" is displayed on the 6 th key of the button display, the number "6" is displayed on the 7 th key of the button display, the number "7" is displayed on the 8 th key of the button display, a numeral "8" is displayed on the 9 th key of the button display, and a numeral "9" is displayed on the 10 th key of the button display; when the button 7 is pressed or triggered, the number 6 is displayed and is input into the controller.
The invention also discloses a method for realizing safe password input, which comprises the following steps:
s1, the controller receives the input password;
s2, the verification terminal determines whether the password received by its controller is consistent with a preset password preset in the verification terminal:
if the password received by the controller is consistent with a preset password preset in the verification terminal, the verification is successful;
if the password received by the controller is inconsistent with a preset password preset in the verification terminal, the verification fails; return is made to step S1.
In a preferred embodiment of the present invention, step S1 includes the following steps:
and S11, judging whether the input password trigger signal is received:
if a trigger signal for inputting a password is received, after 1-time calculation, displaying A different characters on a button display 1 st key, a button display 2 nd key, a button display 3 rd key, … … and a button display A th key; step S12 is executed;
if the input password trigger signal is not received, returning to the step S11;
s12, judging whether the password character input trigger signal is received:
if receiving the password character input triggering signal, inputting the characters displayed on the triggered button display key into the controller, and after 2 times of calculation, displaying A different characters on the button display 1 st key, the button display 2 nd key, the button display 3 rd key, … … and the button display A th key; step S13 is executed;
if the password character input trigger signal is not received, returning to the step S12;
s13, judging whether the password character input trigger signal is received:
if receiving the password character input triggering signal, inputting the characters displayed on the triggered button display key into the controller, and after 3 times of calculation, displaying A different characters on the button display 1 st key, the button display 2 nd key, the button display 3 rd key, … … and the button display A th key; step S14 is executed;
if the password character input trigger signal is not received, returning to the step S13;
s14, judging whether the password character input trigger signal is received:
if a password character input triggering signal is received, inputting characters displayed on a triggered button display key into a controller, and after 4 times of calculation, displaying A different characters on a button display 1 st key, a button display 2 nd key, a button display 3 rd key, … … and a button display A th key; step S15 is executed;
if the password character input trigger signal is not received, returning to the step S14;
s15, judging whether the password character input trigger signal is received:
if a password character input triggering signal is received, inputting characters displayed on a triggered button display key into a controller, and after 5 times of calculation, displaying A different characters on a button display 1 st key, a button display 2 nd key, a button display 3 rd key, … … and a button display A th key; step S16 is executed;
if the password character input trigger signal is not received, returning to the step S15;
……;
until the password input is received. Wherein, after D times of calculation, D is a positive integer greater than or equal to 1, namely, the a-th character B is usedaAnd D times of processing are carried out, and the digest value is obtained by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512.
In a preferred embodiment of the present invention, in step S11, after 1 calculation, the method for displaying a different characters on the 1 st, 2 nd, 3 rd, … … and a-th keys comprises the following steps:
s111, carrying out the following operations on A different characters:
wherein, the Hash Algorithm < > represents a digest one-way Algorithm which adopts one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Bathe symbol a represents the a-th character, a is 1, 2, 3, … …, A;
wherein, B1Representing the 1 st character, B2Representing the 2 nd character, B3Denotes the 3 rd character, … …, BARepresenting the A-th character; character 1B12 nd character B2Character No. 3B3… …, character A and character BAForming A different characters;
Summaryindicates the a-th character B a1 time of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
wherein, SummaryIndicates the 1 st character B 11 time of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Summaryindicates the 2 nd character B 21 time of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Summaryindicates the 3 rd character B 31 time of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
……;
Summaryindicates the A-th character B A1 time of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
、SummaryArranged in the order from big to small or from small to big to obtain SummarySummarySummary……、Summary
Wherein, SummaryRepresents the Summary value SummarySummarySummary……、Summary 1 st abstract value arranged from big to small or from small to big;
Summaryrepresents the Summary value SummarySummarySummary……、SummaryThe 2 nd abstract value is arranged from big to small or from small to big;
Summaryrepresents the Summary value SummarySummarySummary……、SummaryThe 3 rd abstract value is arranged from big to small or from small to big;
Summaryrepresents the Summary value SummarySummarySummary……、SummaryThe A-th abstract values are arranged in a descending order or a descending order;
s113, obtaining SummaryCorresponding to the character in the operation in step S111, b is 1, 2, 3, … …, a; summaryRepresents the Summary value SummarySummarySummary……、SummaryThe b-th abstract values are arranged in a descending order or a descending order;
……;
and S114, sequentially displaying the characters sequentially obtained in the step S113 on a 1 st button display key, a 2 nd button display key, a 3 rd button display key, … … and an A-th button display key.
In a preferred embodiment of the present invention, in step S12, after 2 times of calculation, the method for displaying a different characters on the 1 st key, the 2 nd key, the 3 rd key, the … … and the a th key comprises the following steps:
s121, carrying out the following operations on A different characters:
wherein, the Hash Algorithm < > represents a digest one-way Algorithm which adopts one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Bathe symbol a represents the a-th character, a is 1, 2, 3, … …, A;
wherein, B1Representing the 1 st character, B2Representing the 2 nd character, B3Denotes the 3 rd character, … …, BARepresenting the A-th character; character 1B 12 nd character B2Character No. 3B3… …, character A and character BAForming A different characters;
Summaryindicates the a-th character BaPerforming 2 times of digest value obtained by using one-way algorithm of digests of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
wherein, SummaryIndicates the 1 st character B1Performing 2 times of digest value obtained by using one-way algorithm of digests of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Summaryindicates the 2 nd character B2Performing 2 times of digest value obtained by using one-way algorithm of digests of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Summaryindicates the 3 rd character B3Performing 2 times of digest value obtained by using one-way algorithm of digests of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
……;
Summaryindicates the A-th character BAPerforming 2 times of digest value obtained by using one-way algorithm of digests of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
、SummaryArranged in the order from big to small or from small to big to obtain SummarySummarySummary……、Summary
SummaryRepresents the Summary value SummarySummarySummary……、Summary 1 st abstract value arranged from big to small or from small to big;
Summaryrepresents the Summary value SummarySummarySummary……、SummaryThe 2 nd abstract value is arranged from big to small or from small to big;
Summaryrepresents the Summary value SummarySummarySummary……、SummaryThe 3 rd abstract value is arranged from big to small or from small to big;
……;
Summaryrepresents the Summary value SummarySummarySummary……、SummaryThe A-th abstract values are arranged in a descending order or a descending order;
s123, obtaining SummaryCorresponding to the character in the operation in step S121, b is 1, 2, 3, … …, a; summaryRepresents the Summary value SummarySummarySummary……、SummaryThe b-th abstract values are arranged in a descending order or a descending order;
……;
and S124, sequentially displaying the characters sequentially obtained in the step S123 on a 1 st button display key, a 2 nd button display key, a 3 rd button display key, … … and an A-th button display key.
In a preferred embodiment of the present invention, in step S13, after 3 times of calculation, the method for displaying a different characters on the 1 st key, the 2 nd key, the 3 rd key, the … … and the a th key comprises the following steps:
s131, carrying out the following operations on A different characters:
wherein, the Hash Algorithm < > represents a digest one-way Algorithm which adopts one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Bathe symbol a represents the a-th character, a is 1, 2, 3, … …, A;
wherein, B1Representing the 1 st character, B2Representing the 2 nd character, B3Denotes the 3 rd character, … …, BARepresenting the A-th character; character 1B 12 nd character B2Character No. 3B3… …, character A and character BAForming A different characters;
Summaryindicates the a-th character BaPerforming 3 times of digest value obtained by using digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
wherein, SummaryIndicates the 1 st character B1Performing 3 times of digest value obtained by using digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Summaryindicates the 2 nd character B2Performing 3 times of digest value obtained by using digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Summaryindicates the 3 rd character B3Performing 3 times of digest value obtained by using digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
……;
Summaryindicates the A-th character BAPerforming 3 times of digest value obtained by using digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
、SummaryArranged in the order from big to small or from small to big to obtain SummarySummarySummary……、Summary
SummaryRepresents the Summary value SummarySummarySummary……、Summary 1 st abstract value arranged from big to small or from small to big;
Summaryrepresents the Summary value SummarySummarySummary……、SummaryThe 2 nd abstract value is arranged from big to small or from small to big;
Summaryrepresents the Summary value SummarySummarySummary……、SummaryThe 3 rd abstract value is arranged from big to small or from small to big;
……;
Summaryrepresents the Summary value SummarySummarySummary……、SummaryThe A-th abstract values are arranged in a descending order or a descending order;
s133, obtaining SummaryCorresponding to the character in the operation in step S131, b is 1, 2, 3, … …, a; summaryRepresents the Summary value SummarySummarySummary……、SummaryThe b-th abstract values are arranged in a descending order or a descending order;
……;
s134, the characters obtained in sequence in step S133 are displayed in sequence on the 1 st key, the 2 nd key, the 3 rd key, … … and the a th key of the button display.
In a preferred embodiment of the present invention, in step S14, after 4 times of calculation, the method for displaying a different characters on the 1 st key, the 2 nd key, the 3 rd key, the … … and the a th key comprises the following steps:
s141, carrying out the following operations on A different characters:
wherein, the Hash Algorithm < > represents a digest one-way Algorithm which adopts one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Bathe symbol a represents the a-th character, a is 1, 2, 3, … …, A;
wherein, B1Representing the 1 st character, B2Representing the 2 nd character, B3Denotes the 3 rd character, … …, BARepresenting the A-th character; character 1B 12 nd character B2Character No. 3B3… …, character A and character BAForming A different characters;
Summaryindicates the alpha wordSign B a4 times of digest values obtained by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
wherein, SummaryIndicates the 1 st character B 14 times of digest values obtained by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Summaryindicates the 2 nd character B 24 times of digest values obtained by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Summaryindicates the 3 rd character B 34 times of digest values obtained by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
……;
Summaryindicates the A-th character B A4 times of digest values obtained by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
、SummaryArranged in the order from big to small or from small to big to obtain SummarySummarySummary……、Summary
SummaryRepresents the Summary value SummarySummarySummary……、Summary 1 st abstract value arranged from big to small or from small to big;
Summaryrepresents the Summary value SummarySummarySummary……、SummaryThe 2 nd abstract value is arranged from big to small or from small to big;
Summaryrepresents the Summary value SummarySummarySummary……、SummaryThe 3 rd abstract value is arranged from big to small or from small to big;
……;
Summaryrepresents the Summary value SummarySummarySummary……、SummaryThe A-th abstract values are arranged in a descending order or a descending order;
s143, obtaining SummaryCorresponding to the character in the operation in step S141, b is 1, 2, 3, … …, a; summaryRepresents the Summary value SummarySummarySummary……、SummaryThe b-th abstract values are arranged in a descending order or a descending order;
……;
s144, the characters obtained in sequence in step S143 are displayed in sequence on the 1 st key, the 2 nd key, the 3 rd key, … … and the a th key of the button display.
In a preferred embodiment of the present invention, in step S15, after 5 times of calculation, the method for displaying a different characters on the 1 st key, the 2 nd key, the 3 rd key, the … … and the a th key of the button display includes the following steps:
s151, carrying out the following operations on A different characters:
wherein, the Hash Algorithm < > represents a digest one-way Algorithm which adopts one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Bathe symbol a represents the a-th character, a is 1, 2, 3, … …, A;
wherein, B1Representing the 1 st character, B2Representing the 2 nd character, B3Denotes the 3 rd character, … …, BARepresenting the A-th character; character 1B 12 nd character B2Character No. 3B3… …, character A and character BAForming A different characters;
Summaryindicates the a-th character B a5 times of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
wherein, SummaryIndicates the 1 st character B 15 times of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Summaryindicates the 2 nd character B 25 times of processing, using the abstract sheet of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512Obtaining a summary value by an algorithm;
Summaryindicates the 3 rd character B 35 times of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
……;
Summaryindicates the A-th character B A5 times of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
、SummaryArranged in the order from big to small or from small to big to obtain SummarySummarySummary……、Summary
SummaryRepresents the Summary value SummarySummarySummary……、Summary 1 st abstract value arranged from big to small or from small to big;
Summaryrepresents the Summary value SummarySummarySummary……、SummaryThe 2 nd abstract value is arranged from big to small or from small to big;
Summaryrepresents the Summary value SummarySummarySummary……、SummaryThe 3 rd abstract value is arranged from big to small or from small to big;
……;
Summaryrepresents the Summary value SummarySummarySummary……、SummaryThe A-th abstract values are arranged in a descending order or a descending order;
s153, obtaining SummaryCorresponding to the character in the operation in step S151, b is 1, 2, 3, … …, a; summaryRepresents the Summary value SummarySummarySummary……、SummaryThe b-th abstract values are arranged in a descending order or a descending order;
……;
s154, the characters sequentially obtained in step S153 are sequentially displayed on the 1 st key, the 2 nd key, the 3 rd key, … … and the a th key of the button display.
In a preferred embodiment of the present invention, a digest one-way algorithm using MD5 is adopted in each of step S111, step S121, step S131, step S141, and step S151;
or/and adopting a summary one-way algorithm adopting SHA-1 in step S111, step S121, step S131, step S141 and step S151;
or/and adopting a summary one-way algorithm adopting SHA-224 in each of the step S111, the step S121, the step S131, the step S141 and the step S151;
or/and adopting a summary one-way algorithm adopting SHA-256 in steps S111, S121, S131, S141 and S151;
or/and adopting a summary one-way algorithm adopting SHA-384 in step S111, step S121, step S131, step S141 and step S151;
or/and adopting a summary one-way algorithm adopting SHA-512 in steps S111, S121, S131, S141 and S151;
step S112, step S122, step S132, step S142 and step S152 are arranged in descending order;
or/and the steps S112, S122, S132, S142 and S152 are arranged in the descending order.
In a preferred embodiment of the present invention, step S2 includes:
the verification terminal performs the following operations on the received password:
Summary ValueC=Hash Algorithm<C>,
wherein, the Hash Algorithm < > represents a digest one-way Algorithm which adopts one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
c represents a password received by the controller;
Summary ValueCthe password C received by the verification terminal is represented to be subjected to 1 time of password digest value obtained by adopting a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
step S0 is further included before step S1, in which the verification terminal stores the obtained digest value of the preset password in the verification terminal, and the method for obtaining the preset password includes:
Summary Valuec=Hash Algorithm<c>,
wherein, the Hash Algorithm < > represents a digest one-way Algorithm which adopts one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
c represents a password received by the authentication terminal in advance;
Summary Valuecthe password c received by the verification terminal in advance is represented to be subjected to 1 time of preset password digest value obtained by adopting digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
if the password abstract value calculated by the controller is consistent with a preset password abstract value preset in the verification terminal, the verification is successful;
if the password abstract value calculated by the controller is inconsistent with a preset password abstract value preset in the verification terminal, the verification fails. The transmission is safe, and the safety and the reliability are better.
One specific example is given below (all using MD5, which outputs a 16-bit 16-ary lowercase string):
if the user inputs the set password 023 on the verification terminal in advance, the controller executes the following operations:
it 4453d247e0117381 is stored in the authentication terminal.
Firstly, a controller receives a password input trigger signal, and a 1 st key, a 2 nd key, a 3 rd key, a 4 th key, a 5 th key, a 6 th key, a 7 th key, an 8 th key, a 9 th key and a 10 th key are respectively displayed for a button from top to bottom on a character input and display 3 from left to right; the method also comprises a delete button key and a confirm button key, wherein the delete button key is used for deleting the character with the input error and the confirm button key is used for inputting the trigger input completion signal; 10 characters are 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 respectively; 0-9 is a digital character, and A characters can be digital characters (0-9), capital letter characters (A-Z) or lowercase letter characters (a-Z) independently, or one or any combination of the digital characters 0-9, one or any combination of the capital letter characters A-Z, or one or any combination of the capital letter characters A-Z or the lowercase letter characters a-Z or any combination thereof.
And a second step of performing the following operations:
in this embodiment, since 0 does not have a digest one-way algorithm, it is replaced with another character other than a, such as the lower case letter o.
Thirdly, arranging the components in sequence from small to big to obtain:
fourthly, the characters corresponding to the operation are sequentially 0, 9, 3, 6, 2, 1, 4, 5, 7 and 8;
a fifth step of displaying a character 0 on a 1 st key of the button display, a character 9 on a 2 nd key of the button display, a character 3 on a 3 rd key of the button display, a character 6 on a 4 th key of the button display, a character 2 on a 5 th key of the button display, a character 1 on a 6 th key of the button display, a character 4 on a 7 th key of the button display, a character 5 on an 8 th key of the button display, a character 7 on a 9 th key of the button display, and a character 8 on a 10 th key of the button display; as shown in fig. 2.
Sixthly, if a 1 st key input triggering signal of the button display is received, inputting a character 0 displayed on the 1 st key of the triggered button display into the controller;
the seventh step, carry out the following operations:
and eighthly, arranging the components in sequence from small to big to obtain:
ninth, the characters corresponding to the operation are 7, 3, 4, 8, 2, 1, 9, 0, 6 and 5 in sequence;
tenth, displaying the character 7 on the 1 st key of the button display, the character 3 on the 2 nd key of the button display, the character 4 on the 3 rd key of the button display, the character 8 on the 4 th key of the button display, the character 2 on the 5 th key of the button display, the character 1 on the 6 th key of the button display, the character 9 on the 7 th key of the button display, the character 0 on the 8 th key of the button display, the character 6 on the 9 th key of the button display, and the character 5 on the 10 th key of the button display; as shown in fig. 3.
Eleventh, if receiving the 5 th key input triggering signal of the button display, inputting the character 2 displayed on the 5 th key of the triggered button display into the controller;
a twelfth step of performing the following operations:
step eleven, arranging the materials in sequence from small to big to obtain:
fourteenth, the characters in the corresponding operation are 7, 1, 9, 8, 5, 6, 2, 4, 3 and 0 in sequence;
fifteenth step, displaying character 7 on the 1 st key of the button display, character 1 on the 2 nd key of the button display, character 9 on the 3 rd key of the button display, character 8 on the 4 th key of the button display, character 5 on the 5 th key of the button display, character 6 on the 6 th key of the button display, character 2 on the 7 th key of the button display, character 4 on the 8 th key of the button display, character 3 on the 9 th key of the button display, and character 0 on the 10 th key of the button display; as shown in fig. 4.
Sixthly, if a 9 th key input triggering signal of the button display is received, inputting the characters 3 displayed on the 9 th key of the triggered button display into the controller;
seventeenth, the following operations are performed:
eighteenth, arranging according to a sequence from small to big to obtain:
nineteenth step, the characters corresponding to the operation are 5, 2, 1, 4, 9, 6, 3, 8, 0 and 7 in sequence;
twentieth, displaying the character 5 on the 1 st key of the button display, the character 2 on the 2 nd key of the button display, the character 1 on the 3 rd key of the button display, the character 4 on the 4 th key of the button display, the character 9 on the 5 th key of the button display, the character 6 on the 6 th key of the button display, the character 3 on the 7 th key of the button display, the character 8 on the 8 th key of the button display, the character 0 on the 9 th key of the button display, and the character 7 on the 10 th key of the button display; as shown in fig. 5.
Twenty-first step, receiving the password input finishing trigger signal, namely receiving the 'confirm' trigger signal, and then receiving the password input finishing trigger signal.
A twenty-second step of transmitting the received password (023) to the authentication terminal, where the following operations are performed:
the authentication is successful because the calculated password digest value (4453d247e0117381) is consistent with the preset password digest value (4453d247e0117381) stored in the authentication terminal.
While embodiments of the invention have been shown and described, it will be understood by those of ordinary skill in the art that: various changes, modifications, substitutions and alterations can be made to the embodiments without departing from the principles and spirit of the invention, the scope of which is defined by the claims and their equivalents.
Claims (10)
1. A password safety input device comprises a base (2), wherein a character fixing installation area for fixedly installing character input and display (3) and a display fixing installation area for fixedly installing display output (1) are arranged on the base (2), the character input and display (3) are fixedly installed in the character fixing installation area, and the display output (1) is fixedly installed in the display fixing installation area; the character input and display (3) comprises A button display keys, namely a 1 st button display key, a 2 nd button display key, a 3 rd button display key, … … and an A-th button display key;
when the controller receives a password input trigger signal, the input characters are displayed on the character input and display (3), the 1 st key, the 2 nd key, the 3 rd key, … … and the A-th key are displayed through the buttons to input password characters, and when the controller receives the password input, the received password is transmitted to the verification terminal for verification.
2. A method for realizing safe password input is characterized by comprising the following steps:
s1, the controller receives the input password;
s2, the verification terminal determines whether the password received by its controller is consistent with a preset password preset in the verification terminal:
if the password received by the controller is consistent with a preset password preset in the verification terminal, the verification is successful;
if the password received by the controller is inconsistent with a preset password preset in the verification terminal, the verification fails; return is made to step S1.
3. The method for realizing secure password input according to claim 2, wherein the step S1 includes the following steps:
and S11, judging whether the input password trigger signal is received:
if a trigger signal for inputting a password is received, after 1-time calculation, displaying A different characters on a button display 1 st key, a button display 2 nd key, a button display 3 rd key, … … and a button display A th key; step S12 is executed;
if the input password trigger signal is not received, returning to the step S11;
s12, judging whether the password character input trigger signal is received:
if receiving the password character input triggering signal, inputting the characters displayed on the triggered button display key into the controller, and after 2 times of calculation, displaying A different characters on the button display 1 st key, the button display 2 nd key, the button display 3 rd key, … … and the button display A th key; step S13 is executed;
if the password character input trigger signal is not received, returning to the step S12;
s13, judging whether the password character input trigger signal is received:
if receiving the password character input triggering signal, inputting the characters displayed on the triggered button display key into the controller, and after 3 times of calculation, displaying A different characters on the button display 1 st key, the button display 2 nd key, the button display 3 rd key, … … and the button display A th key; step S14 is executed;
if the password character input trigger signal is not received, returning to the step S13;
s14, judging whether the password character input trigger signal is received:
if a password character input triggering signal is received, inputting characters displayed on a triggered button display key into a controller, and after 4 times of calculation, displaying A different characters on a button display 1 st key, a button display 2 nd key, a button display 3 rd key, … … and a button display A th key; step S15 is executed;
if the password character input trigger signal is not received, returning to the step S14;
s15, judging whether the password character input trigger signal is received:
if a password character input triggering signal is received, inputting characters displayed on a triggered button display key into a controller, and after 5 times of calculation, displaying A different characters on a button display 1 st key, a button display 2 nd key, a button display 3 rd key, … … and a button display A th key; step S16 is executed;
if the password character input trigger signal is not received, returning to the step S15;
……;
until the password input is received.
4. The method for realizing secure password input according to claim 3, wherein in step S11, after 1 calculation, the method for displaying A different characters on the 1 st button, the 2 nd button, the 3 rd button, … … and the A th button comprises the following steps:
s111, carrying out the following operations on A different characters:
wherein, the Hash Algorithm < > represents a digest one-way Algorithm which adopts one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
wherein, B1Representing the 1 st character, B2Representing the 2 nd character, B3Denotes the 3 rd character, … …, BARepresenting the A-th character; character 1B12 nd character B2Character No. 3B3… …, character A and character BAForming A different characters;
indicates the a-th character Ba1 time of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
wherein the content of the first and second substances,indicates the 1 st character B11 time of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
indicates the 2 nd character B21 time of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
indicates the 3 rd character B31 time of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
……;
indicates the A-th character BA1 time of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
s112, the abstract value is processed Arranged in the order from big to small or from small to big to obtain
Wherein the content of the first and second substances,represents the abstract value 1 st abstract value arranged from big to small or from small to big;
represents the abstract value The 2 nd abstract value is arranged from big to small or from small to big;
represents the abstract value The 3 rd abstract value is arranged from big to small or from small to big;
represents the abstract value The A-th abstract values are arranged in a descending order or a descending order;
s113, obtainingCorresponding to the character in the operation in step S111, b is 1, 2, 3, … …, a;represents the abstract value The b-th abstract values are arranged in a descending order or a descending order;
……;
and S114, sequentially displaying the characters sequentially obtained in the step S113 on a 1 st button display key, a 2 nd button display key, a 3 rd button display key, … … and an A-th button display key.
5. The method for realizing secure password input according to claim 3, wherein in step S12, after 2 times of calculation, the method for displaying A different characters on the 1 st button, the 2 nd button, the 3 rd button, … … and the A th button comprises the following steps:
s121, carrying out the following operations on A different characters:
wherein, the Hash Algorithm < > represents a digest one-way Algorithm which adopts one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Bathe symbol a represents the a-th character, a is 1, 2, 3, … …, A;
wherein, B1Representing the 1 st character, B2Representing the 2 nd character, B3Denotes the 3 rd character, … …, BARepresenting the A-th character; character 1B12 nd character B2Character No. 3B3… …, character A and character BAForming A different characters;
indicates the a-th character BaPerforming 2 times of digest value obtained by using one-way algorithm of digests of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
wherein the content of the first and second substances,indicates the 1 st character B1Performing 2 times of digest value obtained by using one-way algorithm of digests of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
indicating the 2 nd characterB2Performing 2 times of digest value obtained by using one-way algorithm of digests of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
indicates the 3 rd character B3Performing 2 times of digest value obtained by using one-way algorithm of digests of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
……;
indicates the A-th character BAPerforming 2 times of digest value obtained by using one-way algorithm of digests of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
s122, the abstract value is extracted Arranged in the order from big to small or from small to big to obtain
Represents the abstract value According to the size from big to smallThe 1 st abstract value is arranged from small to big;
represents the abstract value The 2 nd abstract value is arranged from big to small or from small to big;
represents the abstract value The 3 rd abstract value is arranged from big to small or from small to big;
……;
represents the abstract value The A-th abstract values are arranged in a descending order or a descending order;
s123, obtainingWhen the corresponding step S121 is operated1, 2, 3, … …, a;represents the abstract value The b-th abstract values are arranged in a descending order or a descending order;
……;
and S124, sequentially displaying the characters sequentially obtained in the step S123 on a 1 st button display key, a 2 nd button display key, a 3 rd button display key, … … and an A-th button display key.
6. The method for realizing secure password input according to claim 3, wherein in step S13, after 3 times of calculation, the method for displaying A different characters on the 1 st button, the 2 nd button, the 3 rd button, … … and the A th button comprises the following steps:
s131, carrying out the following operations on A different characters:
wherein, the Hash Algorithm < > represents a digest one-way Algorithm which adopts one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Bathe symbol a represents the a-th character, a is 1, 2, 3, … …, A;
wherein, B1Representing the 1 st character, B2Representing the 2 nd character, B3Denotes the 3 rd character, … …, BARepresenting the A-th character; character 1B12 nd character B2Character No. 3B3… …, character A and character BAForming A different characters;
indicates the a-th character BaPerforming 3 times of digest value obtained by using digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
wherein the content of the first and second substances,indicates the 1 st character B1Performing 3 times of digest value obtained by using digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
indicates the 2 nd character B2Performing 3 times of digest value obtained by using digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
indicates the 3 rd character B3Performing for 3 times by using one of MD5, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512The abstract value obtained by the abstract one-way algorithm is obtained;
……;
indicates the A-th character BAPerforming 3 times of digest value obtained by using digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
s132, the abstract value is added Arranged in the order from big to small or from small to big to obtain
represents the abstract value The 2 nd abstract value is arranged from big to small or from small to big;
represents the abstract value The 3 rd abstract value is arranged from big to small or from small to big;
……;
represents the abstract value The A-th abstract values are arranged in a descending order or a descending order;
s133, obtainingCorresponding to the character in the operation in step S131, b is 1, 2, 3, … …, a;represents the abstract value The b-th abstract values are arranged in a descending order or a descending order;
……;
s134, the characters obtained in sequence in step S133 are displayed in sequence on the 1 st key, the 2 nd key, the 3 rd key, … … and the a th key of the button display.
7. The method for realizing secure password input according to claim 3, wherein in step S14, after 4 times of calculation, the method for displaying A different characters on the 1 st button, the 2 nd button, the 3 rd button, the … … and the A th button comprises the following steps:
s141, carrying out the following operations on A different characters:
wherein, the Hash Algorithm < > represents a digest one-way Algorithm which adopts one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Bawhich represents the a-th character of the character,a=1、2、3、……、A;
wherein, B1Representing the 1 st character, B2Representing the 2 nd character, B3Denotes the 3 rd character, … …, BARepresenting the A-th character; character 1B12 nd character B2Character No. 3B3… …, character A and character BAForming A different characters;
indicates the a-th character Ba4 times of digest values obtained by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
wherein the content of the first and second substances,indicates the 1 st character B14 times of digest values obtained by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
indicates the 2 nd character B24 times of digest values obtained by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
indicates the 3 rd character B34 times of digest values obtained by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
……;
indicates the A-th character BA4 times of summary obtained by using one-way algorithm of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512A value;
s142, the abstract value is processed Arranged in the order from big to small or from small to big to obtain
represents the abstract value The 2 nd abstract value is arranged from big to small or from small to big;
show the abstractValue of The 3 rd abstract value is arranged from big to small or from small to big;
……;
represents the abstract value The A-th abstract values are arranged in a descending order or a descending order;
s143, obtainingCorresponding to the character in the operation in step S141, b is 1, 2, 3, … …, a;represents the abstract value The b-th abstract values are arranged in a descending order or a descending order;
……;
s144, the characters obtained in sequence in step S143 are displayed in sequence on the 1 st key, the 2 nd key, the 3 rd key, … … and the a th key of the button display.
8. The method for realizing secure password input according to claim 3, wherein in step S15, after 5 times of calculation, the method for displaying A different characters on the 1 st button, the 2 nd button, the 3 rd button, the … … and the A th button comprises the following steps:
s151, carrying out the following operations on A different characters:
wherein, the Hash Algorithm < > represents a digest one-way Algorithm which adopts one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
Bathe symbol a represents the a-th character, a is 1, 2, 3, … …, A;
wherein, B1Representing the 1 st character, B2Representing the 2 nd character, B3Denotes the 3 rd character, … …, BARepresenting the A-th character; character 1B12 nd character B2Character No. 3B3… …, character A and character BAForming A different characters;
indicates the a-th character Ba5 times of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
wherein the content of the first and second substances,indicates the 1 st character B15 times of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
indicates the 2 nd character B25 times of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
indicates the 3 rd character B35 times of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
……;
indicates the A-th character BA5 times of obtaining a digest value by using a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
s152, the abstract value is added Arranged in the order from big to small or from small to big to obtain
represents the abstract value The 2 nd abstract value is arranged from big to small or from small to big;
represents the abstract value The 3 rd abstract value is arranged from big to small or from small to big;
……;
represents the abstract value The A-th abstract values are arranged in a descending order or a descending order;
s153, obtainingCorresponding to the character in the operation in step S151, b is 1, 2, 3, … …, a;represents the abstract value The b-th abstract values are arranged in a descending order or a descending order;
……;
S154, the characters sequentially obtained in step S153 are sequentially displayed on the 1 st key, the 2 nd key, the 3 rd key, … … and the a th key of the button display.
9. The method for realizing secure password input according to any one of claims 4 to 8, wherein a digest one-way algorithm using MD5 is adopted in each of step S111, step S121, step S131, step S141 and step S151;
or/and adopting a summary one-way algorithm adopting SHA-1 in step S111, step S121, step S131, step S141 and step S151;
or/and adopting a summary one-way algorithm adopting SHA-224 in each of the step S111, the step S121, the step S131, the step S141 and the step S151;
or/and adopting a summary one-way algorithm adopting SHA-256 in steps S111, S121, S131, S141 and S151;
or/and adopting a summary one-way algorithm adopting SHA-384 in step S111, step S121, step S131, step S141 and step S151;
or/and adopting a summary one-way algorithm adopting SHA-512 in steps S111, S121, S131, S141 and S151;
step S112, step S122, step S132, step S142 and step S152 are arranged in descending order;
or/and the steps S112, S122, S132, S142 and S152 are arranged in the descending order.
10. The method for realizing secure password input according to claim 2, wherein step S2 includes:
the verification terminal performs the following operations on the received password:
Summary ValueC=Hash Algorithm<C>,
wherein, the Hash Algorithm < > represents a digest one-way Algorithm which adopts one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
c represents a password received by the controller;
Summary ValueCthe password C received by the verification terminal is represented to be subjected to 1 time of password digest value obtained by adopting a digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
step S0 is further included before step S1, in which the verification terminal stores the obtained digest value of the preset password in the verification terminal, and the method for obtaining the preset password includes:
Summary Valuec=Hash Algorithm<c>,
wherein, the Hash Algorithm < > represents a digest one-way Algorithm which adopts one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
c represents a password received by the authentication terminal in advance;
Summary Valuecthe password c received by the verification terminal in advance is represented to be subjected to 1 time of preset password digest value obtained by adopting digest one-way algorithm of one of MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512;
if the password abstract value calculated by the controller is consistent with a preset password abstract value preset in the verification terminal, the verification is successful;
if the password abstract value calculated by the controller is inconsistent with a preset password abstract value preset in the verification terminal, the verification fails.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110364076.2A CN113066239A (en) | 2021-04-03 | 2021-04-03 | Password safety input device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110364076.2A CN113066239A (en) | 2021-04-03 | 2021-04-03 | Password safety input device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113066239A true CN113066239A (en) | 2021-07-02 |
Family
ID=76565565
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110364076.2A Withdrawn CN113066239A (en) | 2021-04-03 | 2021-04-03 | Password safety input device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113066239A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102265650A (en) * | 2009-01-06 | 2011-11-30 | 上海昂贝电子科技有限公司 | Security key inputting system for touch screen device |
CN104049897A (en) * | 2014-06-26 | 2014-09-17 | 深圳市中兴移动通信有限公司 | Touch screen device unlocking method and device |
CN104992119A (en) * | 2015-07-17 | 2015-10-21 | 上海众人网络安全技术有限公司 | Sensitive information anti-interception safety transmission method and system |
CN105893884A (en) * | 2016-04-21 | 2016-08-24 | 深圳市旭子科技有限公司 | Touch encryption keyboard and data input method |
-
2021
- 2021-04-03 CN CN202110364076.2A patent/CN113066239A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102265650A (en) * | 2009-01-06 | 2011-11-30 | 上海昂贝电子科技有限公司 | Security key inputting system for touch screen device |
CN104049897A (en) * | 2014-06-26 | 2014-09-17 | 深圳市中兴移动通信有限公司 | Touch screen device unlocking method and device |
CN104992119A (en) * | 2015-07-17 | 2015-10-21 | 上海众人网络安全技术有限公司 | Sensitive information anti-interception safety transmission method and system |
CN105893884A (en) * | 2016-04-21 | 2016-08-24 | 深圳市旭子科技有限公司 | Touch encryption keyboard and data input method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2713327A1 (en) | Validating a transaction with a secure input and a non-secure output | |
JP2003241889A (en) | Alphanumeric keypad, display system and method therefor | |
US9760739B2 (en) | Information processing device | |
JP2003302956A (en) | System and method for fast data transfer to display driver | |
US20140380463A1 (en) | Password setting and verification | |
US9571621B2 (en) | Dynamic unlocking method and electronic apparatus using the same | |
CN101729548A (en) | Method for fault-tolerant user information authentication | |
WO2017097207A1 (en) | Operation instruction inputting method, backend device and terminal | |
CN107273736A (en) | Cipher-code input method, device, computer equipment and storage medium | |
JP2008234440A (en) | Password input system and method | |
EP3399489A1 (en) | Settlement system, user terminal and method executed therein, settlement device and method executed therein, and program | |
US10108790B2 (en) | Password authenticating device for preventing leakage of passwords | |
CN113066239A (en) | Password safety input device | |
CN104680376B (en) | A kind of Transaction Information verification method and device | |
US10019560B2 (en) | Password authenticating device for preventing leakage of passwords | |
JP2003308255A (en) | System and method for fast cyclic redundancy check calculation | |
CN113096304A (en) | Password input safety device | |
JP2010103967A (en) | Intelligent cipher key apparatus for enhancing pin code input security and its method | |
CN104834441A (en) | Touch screen unlocking method and apparatus | |
US20130276102A1 (en) | Methods and systems for enabling a secure password entry using a non-secure device | |
JP2003345765A (en) | System and method for authorization of data string | |
US10019073B2 (en) | Keyboard device | |
US10469483B2 (en) | Electronic device facilitating password entry and recall | |
US10291798B2 (en) | Password entry device and image processing apparatus | |
US20190354942A1 (en) | Money voucher |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20210702 |
|
WW01 | Invention patent application withdrawn after publication |