CN114650143A - Password input method and terminal - Google Patents
Password input method and terminal Download PDFInfo
- Publication number
- CN114650143A CN114650143A CN202210261552.2A CN202210261552A CN114650143A CN 114650143 A CN114650143 A CN 114650143A CN 202210261552 A CN202210261552 A CN 202210261552A CN 114650143 A CN114650143 A CN 114650143A
- Authority
- CN
- China
- Prior art keywords
- password
- key
- equipment
- mobile equipment
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 230000005540 biological transmission Effects 0.000 claims description 40
- 230000006855 networking Effects 0.000 claims description 19
- 238000004590 computer program Methods 0.000 claims description 8
- 230000000977 initiatory effect Effects 0.000 claims description 7
- 230000008569 process Effects 0.000 claims description 3
- 230000002093 peripheral effect Effects 0.000 abstract description 5
- 230000009466 transformation Effects 0.000 abstract description 5
- 238000010586 diagram Methods 0.000 description 6
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
- G07G1/0009—Details of the software in the checkout register, electronic cash register [ECR] or point of sale terminal [POS]
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07G—REGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
- G07G1/00—Cash registers
- G07G1/12—Cash registers electronically operated
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72466—User interfaces specially adapted for cordless or mobile telephones with selection means, e.g. keys, having functions defined by the mode or the status of the device
Abstract
According to the password input method and the terminal, if the initiated password input request needs the password input of the mobile equipment, the mobile equipment is interconnected with the password input terminal; the mobile equipment inputs a password through a password keyboard, encrypts the password, receives the encrypted password and sends the encrypted password to the order receiving program. Therefore, the mobile terminal is only used as a peripheral of the password keyboard, financial equipment level transformation of the mobile terminal is not needed, and the mobile terminal is not limited by the performance of the mobile terminal, so that a user does not need to input a password on public equipment, and the safety and the convenience of password input are improved.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a password input method and a terminal.
Background
With the continuous development of the Android system, the Android mobile phone becomes a terminal which is used most frequently by a plurality of users; the Android system is also widely used for receipt equipment such as POS machines and cash registers at present. When the order receiving equipment performs order receiving operation, the safety of the user password needs to be guaranteed; in the current method, a password input interface is popped up on a POS (point of sale) machine or a cash register by an order receiving program, and a user inputs a bank card password; the interface is often used on self-service equipment, but is usually inconvenient to use because a merchant needs to give the POS equipment interface to the user, and the user needs to worry about password leakage when inputting the password; another common method is that a merchant connects a password keyboard outside the POS or cash register, and when a user needs to input a password such as a bank card, the user inputs the password through the external password keyboard. This method is widely used at present, and the security accords with the requirement of trade, but still has some defects, such as: when the user inputs the password, the password is peeped by other people inevitably, or some lawless persons use some means to crack the password by pressing the left trace on the password keyboard by the user; in addition, the password keyboard is used as a device with multiple people sharing attributes, and some scenes needing to reduce contact between people cannot be met.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: provided are a password input method and a terminal, which can improve the security and convenience of password input.
In order to solve the technical problems, the invention adopts the technical scheme that:
a password input method comprising the steps of:
initiating a password input request, judging whether the password input request needs to be input through mobile equipment or not, and if so, performing equipment interconnection with the mobile equipment;
and receiving an encrypted password input by a password keyboard in the mobile equipment, and sending the encrypted password to an order receiving program.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a password input terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
initiating a password input request, judging whether the password input request needs to be input through mobile equipment or not, and if so, performing equipment interconnection with the mobile equipment;
and receiving an encrypted password input by a password keyboard in the mobile equipment, and sending the encrypted password to an order receiving program.
The invention has the beneficial effects that: if the initiated password input request needs password input by the mobile equipment, the mobile equipment is interconnected with the mobile equipment; the mobile equipment inputs a password through a password keyboard, encrypts the password, receives the encrypted password and sends the encrypted password to the order receiving program. Therefore, the mobile terminal is only used as a peripheral of the password keyboard, financial equipment level transformation of the mobile terminal is not needed, and the mobile terminal is not limited by the performance of the mobile equipment, so that a user does not need to input a password on public equipment, and the safety and the convenience of password input are improved.
Drawings
Fig. 1 is a flowchart of a password input method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a password input terminal according to an embodiment of the present invention;
FIG. 3 is a block diagram of a method for inputting a password according to an embodiment of the present invention;
FIG. 4 is a timing diagram illustrating a password entry method according to an embodiment of the present invention;
description of reference numerals:
1. a password input terminal; 2. a memory; 3. a processor.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1, fig. 3 and fig. 4, an embodiment of the present invention provides a password input method, including:
initiating a password input request, judging whether the password input request needs to be input through mobile equipment or not, and if so, performing equipment interconnection with the mobile equipment;
and receiving an encrypted password input by a password keyboard in the mobile equipment, and sending the encrypted password to a receipt program.
From the above description, the beneficial effects of the present invention are: if the initiated password input request needs the password input of the mobile equipment, the mobile equipment is interconnected with the mobile equipment; the mobile equipment inputs a password through a password keyboard, encrypts the password, receives the encrypted password and then sends the encrypted password to the order receiving program. Therefore, the mobile terminal is only used as a peripheral of the password keyboard, financial equipment level transformation of the mobile terminal is not needed, and the mobile terminal is not limited by the performance of the mobile equipment, so that a user does not need to input a password on public equipment, and the safety and the convenience of password input are improved.
Further, device interfacing with the mobile device comprises:
and transmitting the network connection information to the mobile equipment through wireless transmission, selecting a networking mode with the highest priority according to a preset priority determined by the mobile equipment through the transmission rate and the stability of networking connection, and establishing connection with the mobile equipment.
According to the description, the priority is determined according to the transmission rate and the networking connection stability, and the connection is established according to the networking mode with the highest priority, so that the equipment interconnection efficiency can be improved.
Further, receiving an encrypted password entered by a password keypad in the mobile device comprises:
negotiating a transmission key with the mobile equipment through a channel established by equipment interconnection, and sending the transmission key to the mobile equipment;
and receiving an encrypted password which is input by the mobile equipment through the disorder password keyboard by using the transmission key.
As can be seen from the above description, the mobile device inputs the password by using the out-of-order password keyboard, and the password is encrypted by transmitting the secret key, so that the security of the password is further ensured.
Further, sending the encrypted password to the receiving process includes:
decrypting the encrypted password using the transmission key;
and encrypting the decrypted password by using a pre-stored data key, and sending the encrypted password of the data key to an order receiving program for decryption.
As can be seen from the above description, after the transmission key is decrypted for the encrypted password, the decrypted password is encrypted by using the data key, and the receiving procedure is input to decrypt the data key, so that the mobile device only participates in the input and encryption of the password, and does not involve the subsequent financial transaction processing, and is not limited by the performance of the mobile device, thereby improving the universality of the password input by the mobile device.
Further, encrypting the decrypted password using the pre-stored data key includes:
the data key comprises a local key, a device key and a working key;
and decrypting the equipment key through the local key, decrypting the working key according to the decrypted equipment key, and encrypting the decrypted password by using the decrypted working key.
As can be seen from the above description, the decrypted password can be encrypted using the decrypted working key by decrypting one by one according to the pre-stored local key, device key, and working key, thereby ensuring the security of data.
Referring to fig. 2, another embodiment of the present invention provides a password input terminal, including a memory, a processor, and a computer program stored in the memory and running on the processor, where the processor executes the computer program to implement the following steps:
initiating a password input request, judging whether the password input request needs to be input through mobile equipment or not, and if so, performing equipment interconnection with the mobile equipment;
and receiving an encrypted password input by a password keyboard in the mobile equipment, and sending the encrypted password to an order receiving program.
As can be seen from the above description, if the initiated password input request requires the mobile device to perform password input, the mobile device and the mobile device perform device interconnection; the mobile equipment inputs a password through a password keyboard, encrypts the password, receives the encrypted password and sends the encrypted password to the order receiving program. Therefore, the mobile terminal is only used as a peripheral of the password keyboard, financial equipment level transformation of the mobile terminal is not needed, and the mobile terminal is not limited by the performance of the mobile equipment, so that a user does not need to input a password on public equipment, and the safety and the convenience of password input are improved.
Further, device interfacing with the mobile device comprises:
and transmitting the network connection information to the mobile equipment through wireless transmission, selecting a networking mode with the highest priority according to a preset priority determined by the mobile equipment through the transmission rate and the stability of networking connection, and establishing connection with the mobile equipment.
According to the description, the priority is determined according to the transmission rate and the networking connection stability, and the connection is established according to the networking mode with the highest priority, so that the equipment interconnection efficiency can be improved.
Further, receiving an encrypted password entered by a password keypad in the mobile device comprises:
negotiating a transmission key with the mobile equipment through a channel established by equipment interconnection, and sending the transmission key to the mobile equipment;
and receiving an encrypted password which is input by the mobile equipment through the disorder password keyboard by using the transmission key.
As can be seen from the above description, the mobile device inputs the password by using the out-of-order password keyboard, and encrypts the transmission key of the password, thereby further ensuring the security of the password.
Further, sending the encrypted password to a receiving procedure includes:
decrypting the encrypted password using the transmission key;
and encrypting the decrypted password by using a pre-stored data key, and sending the encrypted password of the data key to an order receiving program for decryption.
As can be seen from the above description, after the transmission key is decrypted for the encrypted password, the decrypted password is encrypted by using the data key, and the receiving procedure is input to decrypt the data key, so that the mobile device only participates in the input and encryption of the password, and does not involve the subsequent financial transaction processing, and is not limited by the performance of the mobile device, thereby improving the universality of the password input by the mobile device.
Further, encrypting the decrypted password using the pre-stored data key includes:
the data key comprises a local key, a device key and a working key;
and decrypting the equipment key through the local key, decrypting the working key according to the decrypted equipment key, and encrypting the decrypted password by using the decrypted working key.
As can be seen from the above description, the decrypted password can be encrypted using the decrypted working key by decrypting one by one according to the pre-stored local key, device key, and working key, so as to ensure the security of data.
The password input method and the terminal are suitable for a scene that a mobile device is required to serve as a POS or a cash register and an external PINPAD keyboard, and are described in the following through specific implementation modes:
example one
Referring to fig. 1, fig. 3 and fig. 4, a password input method, where an execution main body of the method is a terminal, in this embodiment, the execution main body terminal is a merchant terminal a, and a mobile device is a user terminal B, includes the steps of:
and S1, initiating a password input request, judging whether the password input request needs to be input through the mobile equipment, and if so, performing equipment interconnection with the mobile equipment.
Step S1 includes:
and transmitting the network connection information to the mobile equipment through wireless transmission, selecting a networking mode with the highest priority according to a preset priority determined by the mobile equipment through the transmission rate and the stability of networking connection, and establishing connection with the mobile equipment.
Specifically, when a user needs to use a mobile phone of the user to input passwords such as bank cards, a password input request of the user is initiated in a receiving flow by the terminal a. The terminal B needs to discover the equipment in a mode of touching the two-dimensional code applied by the merchant through NFC or scanning the two-dimensional code applied by the merchant.
If the user selects to touch the mobile phone NFC with the mobile phone touch the merchant terminal, the specific flow is as follows:
1. the method comprises the steps that an ad hoc network service of a terminal A receives a call request of a receipt application of the terminal A, an Android native NFC interface is used, an NFC card reading function is started, and card reading of a terminal B is waited;
2, the ad hoc network service of the terminal B simulates the terminal B equipment into an NFC card by using the Android native NFC simulation card function;
3. when the terminal A reads the device B which is simulated as the NFC card and the AID is the appointed AID, the information such as the IP, the port and the Bluetooth address of the terminal A is sent to the terminal B through the NFC channel;
4. and after the terminal B receives the NFC information sent by the terminal A, verifying the designated AID, and if the verification is passed, receiving the terminal information, the IP address and other information sent by the terminal A through the NFC channel.
If the user selects to scan the two-dimensional code of the merchant terminal by using the mobile phone, the specific flow is as follows:
1. the self-networking service of the terminal A generates a two-dimensional code according to the information read before, such as the IP and the port of the terminal A, including the IP and the port of a WiFi local area network, a Bluetooth address and the port and the like, displays a two-dimensional code interface on the terminal A, and waits for a mobile phone of a user to scan the two-dimensional code;
2. the terminal B calls a code scanning connection interface of the ad hoc network service;
3. popping up a code scanning interface by the ad hoc network service of the terminal B;
4. and the terminal B scans the two-dimensional code of the terminal A, and the ad hoc network service of the terminal B analyzes network connection information such as terminal information, WiFi information and Bluetooth information contained in the two-dimensional code.
The ad hoc network service of the terminal B decides an optimal connection channel according to the WiFi information, the Bluetooth information, the USB port information, the Ethernet information, the NFC information and other network connection information sent by the terminal A, the networking mode is according to the current available networking mode of the terminal A and the terminal B, and the priority is as follows: USB communication-bluetooth networking-WiFi P2P networking-WiFi AP networking-NFC networking. And when the networking mode is not reachable, the information of the terminal A is acquired again, and the optimal connection channel is established by re-decision.
And the terminal A and the terminal B establish an equipment interconnection channel after networking is successful, and service interaction data required by subsequent application can be transmitted through the established channel.
And S2, receiving the encrypted password input by the password keyboard in the mobile equipment, and sending the encrypted password to an order receiving program.
S21, negotiating a transmission key with the mobile equipment through a channel established by equipment interconnection, and sending the transmission key to the mobile equipment; and receiving an encrypted password which is input by the mobile equipment through the disorder password keyboard by using the transmission key.
In this embodiment, after performing point-to-point trust binding, the two terminals need to negotiate the transmission key of terminal a and terminal B.
In order to ensure that the password input by the user cannot be intercepted by an Android system or other applications, the password interface popped up by the user mobile phone interface needs to be randomly arranged and cannot be intercepted by clicking coordinates or messages.
Specifically, a request for acquiring a random password keyboard is sent to the SE by a device interconnection module of the terminal B, and the SE module randomly generates a set of vector diagrams with randomly distributed password numbers and records real numbers corresponding to coordinates; and forwarding the random sequencing vector diagram generated by the SE through the equipment interconnection module, and displaying the out-of-order password keyboard UI by the application of the terminal B. When the user terminal B inputs the password, recording the clicked coordinate point, and displaying a number instead of a specific number; after the user clicks the password determining button, the coordinate point clicked this time is forwarded to the SE module, and the SE module calculates the real password according to the corresponding relation of the coordinates and the vector diagram stored before.
The password is encrypted by using a PINLock and 3DES encryption algorithm, and the encrypted password is subjected to double encryption by using a transmission key negotiated by the interconnection of the previous devices.
S22, decrypting the encrypted password by using the transmission key, encrypting the decrypted password by using a pre-stored data key, and sending the encrypted password of the data key to an order receiving program for decryption.
Specifically, the data key is a key at the POS terminal, and the data key includes a local key, a device key, and a working key. The local secret key is an SE chip written into the POS equipment when the POS equipment leaves a factory and is used for decrypting the equipment secret key; the equipment key is pushed and written into the terminal through a mother POS or a server by a bank, and is used for decrypting the working key; the working key is dynamically generated, pushed and written into the POS machine by the banking business background and is used for encrypting data transmitted by the POS terminal and the banking business background; the data keys are written into the SE chip of the POS respectively in the mode.
And decrypting the encrypted password by using a transmission key preset in an SE module of the terminal A to obtain a password PINBlock, encrypting the PINBlock by using a data key, forwarding the PINBlock encrypted by the data key to a receipt program, and verifying the password input by the user by the bank according to the data key of the background of the bank.
Example two
Referring to fig. 2, a password input terminal includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor executes the computer program to implement the steps of a password input method according to an embodiment.
In summary, according to the password input method and the terminal provided by the present invention, if the initiated password input request requires the mobile device to perform password input, the device is interconnected with the mobile device; the mobile equipment inputs the password through the disorder password keyboard, encrypts the password by using the transmission key, decrypts the password by using the transmission key after receiving the encrypted password, encrypts the decrypted password by using the data key, and transmits the data encrypted by the data key to the receiving process to decrypt the data key, so that the password input safety is further improved. Therefore, the mobile terminal is only used as a peripheral of the password keyboard, financial equipment level transformation of the mobile terminal is not needed, and the mobile terminal is not limited by the performance of the mobile equipment, so that a user does not need to input a password on public equipment, and the safety and the convenience of password input are improved.
The above description is only an embodiment of the present invention, and is not intended to limit the scope of the present invention, and all equivalent modifications made by the present invention and the contents of the accompanying drawings, which are directly or indirectly applied to the related technical fields, are included in the scope of the present invention.
Claims (10)
1. A password input method, comprising the steps of:
initiating a password input request, judging whether the password input request needs to be input through mobile equipment or not, and if so, performing equipment interconnection with the mobile equipment;
and receiving an encrypted password input by a password keyboard in the mobile equipment, and sending the encrypted password to an order receiving program.
2. The method of claim 1, wherein interfacing with the mobile device comprises:
and transmitting the network connection information to the mobile equipment through wireless transmission, selecting a networking mode with the highest priority according to a preset priority determined by the mobile equipment through the transmission rate and the stability of networking connection, and establishing connection with the mobile equipment.
3. The method of claim 1, wherein receiving the encrypted password from the mobile device via the password keypad comprises:
negotiating a transmission key with the mobile equipment through a channel established by equipment interconnection, and sending the transmission key to the mobile equipment;
and receiving an encrypted password which is input by the mobile equipment through the disorder password keyboard by using the transmission key.
4. A password input method according to claim 3, wherein sending the encrypted password to a receiving procedure comprises:
decrypting the encrypted password using the transmission key;
and encrypting the decrypted password by using a pre-stored data key, and sending the encrypted password of the data key to the order receiving program for decryption.
5. The method of claim 4, wherein encrypting the decrypted password using the pre-stored data key comprises:
the data key comprises a local key, a device key and a working key;
and decrypting the equipment key through the local key, decrypting the working key according to the decrypted equipment key, and encrypting the decrypted password by using the decrypted working key.
6. A password input terminal comprising a memory, a processor and a computer program stored on said memory and executable on said processor, wherein said processor when executing said computer program implements the steps of:
initiating a password input request, judging whether the password input request needs to be input through mobile equipment or not, and if so, performing equipment interconnection with the mobile equipment;
and receiving an encrypted password input by a password keyboard in the mobile equipment, and sending the encrypted password to a receipt program.
7. The password entry terminal of claim 6, wherein device interfacing with the mobile device comprises:
and transmitting the network connection information to the mobile equipment through wireless transmission, selecting a networking mode with the highest priority according to a preset priority determined by the mobile equipment through the transmission rate and the stability of networking connection, and establishing connection with the mobile equipment.
8. The password input terminal of claim 6, wherein receiving the encrypted password input by the password keypad in the mobile device comprises:
negotiating a transmission key with the mobile equipment through a channel established by equipment interconnection, and sending the transmission key to the mobile equipment;
and receiving an encrypted password which is input by the mobile equipment through the disorder password keyboard by using the transmission key.
9. The password input terminal of claim 8, wherein sending the encrypted password to the receiving process comprises:
decrypting the encrypted password using the transmission key;
and encrypting the decrypted password by using a pre-stored data key, and sending the encrypted password of the data key to the order receiving program for decryption.
10. The password input terminal of claim 9, wherein encrypting the decrypted password using the pre-stored data key comprises:
the data key comprises a local key, a device key and a working key;
and decrypting the equipment key through the local key, decrypting the working key according to the decrypted equipment key, and encrypting the decrypted password by using the decrypted working key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210261552.2A CN114650143B (en) | 2022-03-16 | 2022-03-16 | Password input method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210261552.2A CN114650143B (en) | 2022-03-16 | 2022-03-16 | Password input method and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114650143A true CN114650143A (en) | 2022-06-21 |
CN114650143B CN114650143B (en) | 2023-11-24 |
Family
ID=81993255
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210261552.2A Active CN114650143B (en) | 2022-03-16 | 2022-03-16 | Password input method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114650143B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060058568A (en) * | 2004-11-25 | 2006-05-30 | 엘지전자 주식회사 | Method for setting password in wireless terminal |
CN102013130A (en) * | 2010-10-27 | 2011-04-13 | 江苏科技大学 | Bank deposit terminal password input system and implementing method thereof |
CN103679448A (en) * | 2013-11-29 | 2014-03-26 | 天地融科技股份有限公司 | Password inputting method and password inputting system |
JP2014090286A (en) * | 2012-10-30 | 2014-05-15 | Mmguard Inc | Mobile communication terminal and terminal control program |
CN103825740A (en) * | 2014-01-22 | 2014-05-28 | 武汉擎动网络科技有限公司 | Mobile terminal payment password transmission system and method |
CN104463040A (en) * | 2014-12-18 | 2015-03-25 | 恒宝股份有限公司 | Secure input method and system for password |
CN105282738A (en) * | 2015-11-24 | 2016-01-27 | 苏州铭冠软件科技有限公司 | Security authentication method for mobile terminal |
WO2018082237A1 (en) * | 2016-11-07 | 2018-05-11 | 广州视源电子科技股份有限公司 | Password input method and apparatus |
CN108154055A (en) * | 2018-01-10 | 2018-06-12 | 上海展扬通信技术有限公司 | Cipher-code input method, mobile terminal and storage medium |
CN113067697A (en) * | 2019-12-31 | 2021-07-02 | 王建清 | Remote password input method, storage medium, device and equipment |
-
2022
- 2022-03-16 CN CN202210261552.2A patent/CN114650143B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060058568A (en) * | 2004-11-25 | 2006-05-30 | 엘지전자 주식회사 | Method for setting password in wireless terminal |
CN102013130A (en) * | 2010-10-27 | 2011-04-13 | 江苏科技大学 | Bank deposit terminal password input system and implementing method thereof |
JP2014090286A (en) * | 2012-10-30 | 2014-05-15 | Mmguard Inc | Mobile communication terminal and terminal control program |
CN103679448A (en) * | 2013-11-29 | 2014-03-26 | 天地融科技股份有限公司 | Password inputting method and password inputting system |
CN103825740A (en) * | 2014-01-22 | 2014-05-28 | 武汉擎动网络科技有限公司 | Mobile terminal payment password transmission system and method |
CN104463040A (en) * | 2014-12-18 | 2015-03-25 | 恒宝股份有限公司 | Secure input method and system for password |
CN105282738A (en) * | 2015-11-24 | 2016-01-27 | 苏州铭冠软件科技有限公司 | Security authentication method for mobile terminal |
WO2018082237A1 (en) * | 2016-11-07 | 2018-05-11 | 广州视源电子科技股份有限公司 | Password input method and apparatus |
CN108154055A (en) * | 2018-01-10 | 2018-06-12 | 上海展扬通信技术有限公司 | Cipher-code input method, mobile terminal and storage medium |
CN113067697A (en) * | 2019-12-31 | 2021-07-02 | 王建清 | Remote password input method, storage medium, device and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN114650143B (en) | 2023-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9769127B2 (en) | Smart card accessible over a personal area network | |
CN101442525B (en) | System and method of performing electronic transactions | |
US8966096B2 (en) | Device-pairing by reading an address provided in device-readable form | |
JP4736398B2 (en) | Authentication method between secret terminals, secret information delivery method, apparatus, system, and program | |
KR100586654B1 (en) | Wireless banking system and wireless banking method using mobile phone | |
EP2634703B1 (en) | Removable storage device, and data processing system and method based on the device | |
US20070033136A1 (en) | Secured financial transaction device | |
KR20110081966A (en) | Authorization of server operations | |
US20180025332A1 (en) | Transaction facilitation | |
WO2018205456A1 (en) | Password input method, computer device, and storage medium | |
JP2016539605A (en) | Method in network security and system in network security | |
KR100996955B1 (en) | Security method using virtual keyboard | |
CN110740136A (en) | Network security control method for open bank and open bank platform | |
CN101808077A (en) | Information security input processing system and method and smart card | |
KR100447777B1 (en) | Hacking prevention of key stroke data | |
CN114650143B (en) | Password input method and terminal | |
JP5670001B1 (en) | Transaction system, transaction method, and information recording medium | |
US11961064B2 (en) | Information display method and apparatus, storage medium, and electronic device | |
CN114692120B (en) | National password authentication method, virtual machine, terminal equipment, system and storage medium | |
CN111491064A (en) | Voice service identity authentication method and system | |
JP6336383B2 (en) | Trading system | |
CN113837744A (en) | Transaction data processing method, transaction data processing system and terminal | |
JP2024513782A (en) | Transaction card-based authentication system and method | |
CN115167765A (en) | Data transfer method and device, storage medium and electronic equipment | |
KR20130139677A (en) | Data communication method in electronic payment system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Room 201-9, Zone C, No. 18 Guanri Road, Phase II, Software Park, Torch High tech Zone, Xiamen City, Fujian Province, 361000 Applicant after: Fujian Huisibo Digital Technology Co.,Ltd. Address before: No. 89 Software Avenue, Tongpan Road, Gulou District, Fuzhou City, Fujian Province, 350000. 510, Floor 5, 34 #, Zone C, Fuzhou Software Park Applicant before: FUZHOU HUISIBO INFORMATION TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |