CN114650143A - Password input method and terminal - Google Patents

Password input method and terminal Download PDF

Info

Publication number
CN114650143A
CN114650143A CN202210261552.2A CN202210261552A CN114650143A CN 114650143 A CN114650143 A CN 114650143A CN 202210261552 A CN202210261552 A CN 202210261552A CN 114650143 A CN114650143 A CN 114650143A
Authority
CN
China
Prior art keywords
password
key
equipment
mobile equipment
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210261552.2A
Other languages
Chinese (zh)
Other versions
CN114650143B (en
Inventor
邱熠龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou Huisibo Information Technology Co ltd
Original Assignee
Fuzhou Huisibo Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuzhou Huisibo Information Technology Co ltd filed Critical Fuzhou Huisibo Information Technology Co ltd
Priority to CN202210261552.2A priority Critical patent/CN114650143B/en
Publication of CN114650143A publication Critical patent/CN114650143A/en
Application granted granted Critical
Publication of CN114650143B publication Critical patent/CN114650143B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/0009Details of the software in the checkout register, electronic cash register [ECR] or point of sale terminal [POS]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07GREGISTERING THE RECEIPT OF CASH, VALUABLES, OR TOKENS
    • G07G1/00Cash registers
    • G07G1/12Cash registers electronically operated
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72466User interfaces specially adapted for cordless or mobile telephones with selection means, e.g. keys, having functions defined by the mode or the status of the device

Abstract

According to the password input method and the terminal, if the initiated password input request needs the password input of the mobile equipment, the mobile equipment is interconnected with the password input terminal; the mobile equipment inputs a password through a password keyboard, encrypts the password, receives the encrypted password and sends the encrypted password to the order receiving program. Therefore, the mobile terminal is only used as a peripheral of the password keyboard, financial equipment level transformation of the mobile terminal is not needed, and the mobile terminal is not limited by the performance of the mobile terminal, so that a user does not need to input a password on public equipment, and the safety and the convenience of password input are improved.

Description

Password input method and terminal
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a password input method and a terminal.
Background
With the continuous development of the Android system, the Android mobile phone becomes a terminal which is used most frequently by a plurality of users; the Android system is also widely used for receipt equipment such as POS machines and cash registers at present. When the order receiving equipment performs order receiving operation, the safety of the user password needs to be guaranteed; in the current method, a password input interface is popped up on a POS (point of sale) machine or a cash register by an order receiving program, and a user inputs a bank card password; the interface is often used on self-service equipment, but is usually inconvenient to use because a merchant needs to give the POS equipment interface to the user, and the user needs to worry about password leakage when inputting the password; another common method is that a merchant connects a password keyboard outside the POS or cash register, and when a user needs to input a password such as a bank card, the user inputs the password through the external password keyboard. This method is widely used at present, and the security accords with the requirement of trade, but still has some defects, such as: when the user inputs the password, the password is peeped by other people inevitably, or some lawless persons use some means to crack the password by pressing the left trace on the password keyboard by the user; in addition, the password keyboard is used as a device with multiple people sharing attributes, and some scenes needing to reduce contact between people cannot be met.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: provided are a password input method and a terminal, which can improve the security and convenience of password input.
In order to solve the technical problems, the invention adopts the technical scheme that:
a password input method comprising the steps of:
initiating a password input request, judging whether the password input request needs to be input through mobile equipment or not, and if so, performing equipment interconnection with the mobile equipment;
and receiving an encrypted password input by a password keyboard in the mobile equipment, and sending the encrypted password to an order receiving program.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
a password input terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
initiating a password input request, judging whether the password input request needs to be input through mobile equipment or not, and if so, performing equipment interconnection with the mobile equipment;
and receiving an encrypted password input by a password keyboard in the mobile equipment, and sending the encrypted password to an order receiving program.
The invention has the beneficial effects that: if the initiated password input request needs password input by the mobile equipment, the mobile equipment is interconnected with the mobile equipment; the mobile equipment inputs a password through a password keyboard, encrypts the password, receives the encrypted password and sends the encrypted password to the order receiving program. Therefore, the mobile terminal is only used as a peripheral of the password keyboard, financial equipment level transformation of the mobile terminal is not needed, and the mobile terminal is not limited by the performance of the mobile equipment, so that a user does not need to input a password on public equipment, and the safety and the convenience of password input are improved.
Drawings
Fig. 1 is a flowchart of a password input method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a password input terminal according to an embodiment of the present invention;
FIG. 3 is a block diagram of a method for inputting a password according to an embodiment of the present invention;
FIG. 4 is a timing diagram illustrating a password entry method according to an embodiment of the present invention;
description of reference numerals:
1. a password input terminal; 2. a memory; 3. a processor.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1, fig. 3 and fig. 4, an embodiment of the present invention provides a password input method, including:
initiating a password input request, judging whether the password input request needs to be input through mobile equipment or not, and if so, performing equipment interconnection with the mobile equipment;
and receiving an encrypted password input by a password keyboard in the mobile equipment, and sending the encrypted password to a receipt program.
From the above description, the beneficial effects of the present invention are: if the initiated password input request needs the password input of the mobile equipment, the mobile equipment is interconnected with the mobile equipment; the mobile equipment inputs a password through a password keyboard, encrypts the password, receives the encrypted password and then sends the encrypted password to the order receiving program. Therefore, the mobile terminal is only used as a peripheral of the password keyboard, financial equipment level transformation of the mobile terminal is not needed, and the mobile terminal is not limited by the performance of the mobile equipment, so that a user does not need to input a password on public equipment, and the safety and the convenience of password input are improved.
Further, device interfacing with the mobile device comprises:
and transmitting the network connection information to the mobile equipment through wireless transmission, selecting a networking mode with the highest priority according to a preset priority determined by the mobile equipment through the transmission rate and the stability of networking connection, and establishing connection with the mobile equipment.
According to the description, the priority is determined according to the transmission rate and the networking connection stability, and the connection is established according to the networking mode with the highest priority, so that the equipment interconnection efficiency can be improved.
Further, receiving an encrypted password entered by a password keypad in the mobile device comprises:
negotiating a transmission key with the mobile equipment through a channel established by equipment interconnection, and sending the transmission key to the mobile equipment;
and receiving an encrypted password which is input by the mobile equipment through the disorder password keyboard by using the transmission key.
As can be seen from the above description, the mobile device inputs the password by using the out-of-order password keyboard, and the password is encrypted by transmitting the secret key, so that the security of the password is further ensured.
Further, sending the encrypted password to the receiving process includes:
decrypting the encrypted password using the transmission key;
and encrypting the decrypted password by using a pre-stored data key, and sending the encrypted password of the data key to an order receiving program for decryption.
As can be seen from the above description, after the transmission key is decrypted for the encrypted password, the decrypted password is encrypted by using the data key, and the receiving procedure is input to decrypt the data key, so that the mobile device only participates in the input and encryption of the password, and does not involve the subsequent financial transaction processing, and is not limited by the performance of the mobile device, thereby improving the universality of the password input by the mobile device.
Further, encrypting the decrypted password using the pre-stored data key includes:
the data key comprises a local key, a device key and a working key;
and decrypting the equipment key through the local key, decrypting the working key according to the decrypted equipment key, and encrypting the decrypted password by using the decrypted working key.
As can be seen from the above description, the decrypted password can be encrypted using the decrypted working key by decrypting one by one according to the pre-stored local key, device key, and working key, thereby ensuring the security of data.
Referring to fig. 2, another embodiment of the present invention provides a password input terminal, including a memory, a processor, and a computer program stored in the memory and running on the processor, where the processor executes the computer program to implement the following steps:
initiating a password input request, judging whether the password input request needs to be input through mobile equipment or not, and if so, performing equipment interconnection with the mobile equipment;
and receiving an encrypted password input by a password keyboard in the mobile equipment, and sending the encrypted password to an order receiving program.
As can be seen from the above description, if the initiated password input request requires the mobile device to perform password input, the mobile device and the mobile device perform device interconnection; the mobile equipment inputs a password through a password keyboard, encrypts the password, receives the encrypted password and sends the encrypted password to the order receiving program. Therefore, the mobile terminal is only used as a peripheral of the password keyboard, financial equipment level transformation of the mobile terminal is not needed, and the mobile terminal is not limited by the performance of the mobile equipment, so that a user does not need to input a password on public equipment, and the safety and the convenience of password input are improved.
Further, device interfacing with the mobile device comprises:
and transmitting the network connection information to the mobile equipment through wireless transmission, selecting a networking mode with the highest priority according to a preset priority determined by the mobile equipment through the transmission rate and the stability of networking connection, and establishing connection with the mobile equipment.
According to the description, the priority is determined according to the transmission rate and the networking connection stability, and the connection is established according to the networking mode with the highest priority, so that the equipment interconnection efficiency can be improved.
Further, receiving an encrypted password entered by a password keypad in the mobile device comprises:
negotiating a transmission key with the mobile equipment through a channel established by equipment interconnection, and sending the transmission key to the mobile equipment;
and receiving an encrypted password which is input by the mobile equipment through the disorder password keyboard by using the transmission key.
As can be seen from the above description, the mobile device inputs the password by using the out-of-order password keyboard, and encrypts the transmission key of the password, thereby further ensuring the security of the password.
Further, sending the encrypted password to a receiving procedure includes:
decrypting the encrypted password using the transmission key;
and encrypting the decrypted password by using a pre-stored data key, and sending the encrypted password of the data key to an order receiving program for decryption.
As can be seen from the above description, after the transmission key is decrypted for the encrypted password, the decrypted password is encrypted by using the data key, and the receiving procedure is input to decrypt the data key, so that the mobile device only participates in the input and encryption of the password, and does not involve the subsequent financial transaction processing, and is not limited by the performance of the mobile device, thereby improving the universality of the password input by the mobile device.
Further, encrypting the decrypted password using the pre-stored data key includes:
the data key comprises a local key, a device key and a working key;
and decrypting the equipment key through the local key, decrypting the working key according to the decrypted equipment key, and encrypting the decrypted password by using the decrypted working key.
As can be seen from the above description, the decrypted password can be encrypted using the decrypted working key by decrypting one by one according to the pre-stored local key, device key, and working key, so as to ensure the security of data.
The password input method and the terminal are suitable for a scene that a mobile device is required to serve as a POS or a cash register and an external PINPAD keyboard, and are described in the following through specific implementation modes:
example one
Referring to fig. 1, fig. 3 and fig. 4, a password input method, where an execution main body of the method is a terminal, in this embodiment, the execution main body terminal is a merchant terminal a, and a mobile device is a user terminal B, includes the steps of:
and S1, initiating a password input request, judging whether the password input request needs to be input through the mobile equipment, and if so, performing equipment interconnection with the mobile equipment.
Step S1 includes:
and transmitting the network connection information to the mobile equipment through wireless transmission, selecting a networking mode with the highest priority according to a preset priority determined by the mobile equipment through the transmission rate and the stability of networking connection, and establishing connection with the mobile equipment.
Specifically, when a user needs to use a mobile phone of the user to input passwords such as bank cards, a password input request of the user is initiated in a receiving flow by the terminal a. The terminal B needs to discover the equipment in a mode of touching the two-dimensional code applied by the merchant through NFC or scanning the two-dimensional code applied by the merchant.
If the user selects to touch the mobile phone NFC with the mobile phone touch the merchant terminal, the specific flow is as follows:
1. the method comprises the steps that an ad hoc network service of a terminal A receives a call request of a receipt application of the terminal A, an Android native NFC interface is used, an NFC card reading function is started, and card reading of a terminal B is waited;
2, the ad hoc network service of the terminal B simulates the terminal B equipment into an NFC card by using the Android native NFC simulation card function;
3. when the terminal A reads the device B which is simulated as the NFC card and the AID is the appointed AID, the information such as the IP, the port and the Bluetooth address of the terminal A is sent to the terminal B through the NFC channel;
4. and after the terminal B receives the NFC information sent by the terminal A, verifying the designated AID, and if the verification is passed, receiving the terminal information, the IP address and other information sent by the terminal A through the NFC channel.
If the user selects to scan the two-dimensional code of the merchant terminal by using the mobile phone, the specific flow is as follows:
1. the self-networking service of the terminal A generates a two-dimensional code according to the information read before, such as the IP and the port of the terminal A, including the IP and the port of a WiFi local area network, a Bluetooth address and the port and the like, displays a two-dimensional code interface on the terminal A, and waits for a mobile phone of a user to scan the two-dimensional code;
2. the terminal B calls a code scanning connection interface of the ad hoc network service;
3. popping up a code scanning interface by the ad hoc network service of the terminal B;
4. and the terminal B scans the two-dimensional code of the terminal A, and the ad hoc network service of the terminal B analyzes network connection information such as terminal information, WiFi information and Bluetooth information contained in the two-dimensional code.
The ad hoc network service of the terminal B decides an optimal connection channel according to the WiFi information, the Bluetooth information, the USB port information, the Ethernet information, the NFC information and other network connection information sent by the terminal A, the networking mode is according to the current available networking mode of the terminal A and the terminal B, and the priority is as follows: USB communication-bluetooth networking-WiFi P2P networking-WiFi AP networking-NFC networking. And when the networking mode is not reachable, the information of the terminal A is acquired again, and the optimal connection channel is established by re-decision.
And the terminal A and the terminal B establish an equipment interconnection channel after networking is successful, and service interaction data required by subsequent application can be transmitted through the established channel.
And S2, receiving the encrypted password input by the password keyboard in the mobile equipment, and sending the encrypted password to an order receiving program.
S21, negotiating a transmission key with the mobile equipment through a channel established by equipment interconnection, and sending the transmission key to the mobile equipment; and receiving an encrypted password which is input by the mobile equipment through the disorder password keyboard by using the transmission key.
In this embodiment, after performing point-to-point trust binding, the two terminals need to negotiate the transmission key of terminal a and terminal B.
In order to ensure that the password input by the user cannot be intercepted by an Android system or other applications, the password interface popped up by the user mobile phone interface needs to be randomly arranged and cannot be intercepted by clicking coordinates or messages.
Specifically, a request for acquiring a random password keyboard is sent to the SE by a device interconnection module of the terminal B, and the SE module randomly generates a set of vector diagrams with randomly distributed password numbers and records real numbers corresponding to coordinates; and forwarding the random sequencing vector diagram generated by the SE through the equipment interconnection module, and displaying the out-of-order password keyboard UI by the application of the terminal B. When the user terminal B inputs the password, recording the clicked coordinate point, and displaying a number instead of a specific number; after the user clicks the password determining button, the coordinate point clicked this time is forwarded to the SE module, and the SE module calculates the real password according to the corresponding relation of the coordinates and the vector diagram stored before.
The password is encrypted by using a PINLock and 3DES encryption algorithm, and the encrypted password is subjected to double encryption by using a transmission key negotiated by the interconnection of the previous devices.
S22, decrypting the encrypted password by using the transmission key, encrypting the decrypted password by using a pre-stored data key, and sending the encrypted password of the data key to an order receiving program for decryption.
Specifically, the data key is a key at the POS terminal, and the data key includes a local key, a device key, and a working key. The local secret key is an SE chip written into the POS equipment when the POS equipment leaves a factory and is used for decrypting the equipment secret key; the equipment key is pushed and written into the terminal through a mother POS or a server by a bank, and is used for decrypting the working key; the working key is dynamically generated, pushed and written into the POS machine by the banking business background and is used for encrypting data transmitted by the POS terminal and the banking business background; the data keys are written into the SE chip of the POS respectively in the mode.
And decrypting the encrypted password by using a transmission key preset in an SE module of the terminal A to obtain a password PINBlock, encrypting the PINBlock by using a data key, forwarding the PINBlock encrypted by the data key to a receipt program, and verifying the password input by the user by the bank according to the data key of the background of the bank.
Example two
Referring to fig. 2, a password input terminal includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor executes the computer program to implement the steps of a password input method according to an embodiment.
In summary, according to the password input method and the terminal provided by the present invention, if the initiated password input request requires the mobile device to perform password input, the device is interconnected with the mobile device; the mobile equipment inputs the password through the disorder password keyboard, encrypts the password by using the transmission key, decrypts the password by using the transmission key after receiving the encrypted password, encrypts the decrypted password by using the data key, and transmits the data encrypted by the data key to the receiving process to decrypt the data key, so that the password input safety is further improved. Therefore, the mobile terminal is only used as a peripheral of the password keyboard, financial equipment level transformation of the mobile terminal is not needed, and the mobile terminal is not limited by the performance of the mobile equipment, so that a user does not need to input a password on public equipment, and the safety and the convenience of password input are improved.
The above description is only an embodiment of the present invention, and is not intended to limit the scope of the present invention, and all equivalent modifications made by the present invention and the contents of the accompanying drawings, which are directly or indirectly applied to the related technical fields, are included in the scope of the present invention.

Claims (10)

1. A password input method, comprising the steps of:
initiating a password input request, judging whether the password input request needs to be input through mobile equipment or not, and if so, performing equipment interconnection with the mobile equipment;
and receiving an encrypted password input by a password keyboard in the mobile equipment, and sending the encrypted password to an order receiving program.
2. The method of claim 1, wherein interfacing with the mobile device comprises:
and transmitting the network connection information to the mobile equipment through wireless transmission, selecting a networking mode with the highest priority according to a preset priority determined by the mobile equipment through the transmission rate and the stability of networking connection, and establishing connection with the mobile equipment.
3. The method of claim 1, wherein receiving the encrypted password from the mobile device via the password keypad comprises:
negotiating a transmission key with the mobile equipment through a channel established by equipment interconnection, and sending the transmission key to the mobile equipment;
and receiving an encrypted password which is input by the mobile equipment through the disorder password keyboard by using the transmission key.
4. A password input method according to claim 3, wherein sending the encrypted password to a receiving procedure comprises:
decrypting the encrypted password using the transmission key;
and encrypting the decrypted password by using a pre-stored data key, and sending the encrypted password of the data key to the order receiving program for decryption.
5. The method of claim 4, wherein encrypting the decrypted password using the pre-stored data key comprises:
the data key comprises a local key, a device key and a working key;
and decrypting the equipment key through the local key, decrypting the working key according to the decrypted equipment key, and encrypting the decrypted password by using the decrypted working key.
6. A password input terminal comprising a memory, a processor and a computer program stored on said memory and executable on said processor, wherein said processor when executing said computer program implements the steps of:
initiating a password input request, judging whether the password input request needs to be input through mobile equipment or not, and if so, performing equipment interconnection with the mobile equipment;
and receiving an encrypted password input by a password keyboard in the mobile equipment, and sending the encrypted password to a receipt program.
7. The password entry terminal of claim 6, wherein device interfacing with the mobile device comprises:
and transmitting the network connection information to the mobile equipment through wireless transmission, selecting a networking mode with the highest priority according to a preset priority determined by the mobile equipment through the transmission rate and the stability of networking connection, and establishing connection with the mobile equipment.
8. The password input terminal of claim 6, wherein receiving the encrypted password input by the password keypad in the mobile device comprises:
negotiating a transmission key with the mobile equipment through a channel established by equipment interconnection, and sending the transmission key to the mobile equipment;
and receiving an encrypted password which is input by the mobile equipment through the disorder password keyboard by using the transmission key.
9. The password input terminal of claim 8, wherein sending the encrypted password to the receiving process comprises:
decrypting the encrypted password using the transmission key;
and encrypting the decrypted password by using a pre-stored data key, and sending the encrypted password of the data key to the order receiving program for decryption.
10. The password input terminal of claim 9, wherein encrypting the decrypted password using the pre-stored data key comprises:
the data key comprises a local key, a device key and a working key;
and decrypting the equipment key through the local key, decrypting the working key according to the decrypted equipment key, and encrypting the decrypted password by using the decrypted working key.
CN202210261552.2A 2022-03-16 2022-03-16 Password input method and terminal Active CN114650143B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210261552.2A CN114650143B (en) 2022-03-16 2022-03-16 Password input method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210261552.2A CN114650143B (en) 2022-03-16 2022-03-16 Password input method and terminal

Publications (2)

Publication Number Publication Date
CN114650143A true CN114650143A (en) 2022-06-21
CN114650143B CN114650143B (en) 2023-11-24

Family

ID=81993255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210261552.2A Active CN114650143B (en) 2022-03-16 2022-03-16 Password input method and terminal

Country Status (1)

Country Link
CN (1) CN114650143B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060058568A (en) * 2004-11-25 2006-05-30 엘지전자 주식회사 Method for setting password in wireless terminal
CN102013130A (en) * 2010-10-27 2011-04-13 江苏科技大学 Bank deposit terminal password input system and implementing method thereof
CN103679448A (en) * 2013-11-29 2014-03-26 天地融科技股份有限公司 Password inputting method and password inputting system
JP2014090286A (en) * 2012-10-30 2014-05-15 Mmguard Inc Mobile communication terminal and terminal control program
CN103825740A (en) * 2014-01-22 2014-05-28 武汉擎动网络科技有限公司 Mobile terminal payment password transmission system and method
CN104463040A (en) * 2014-12-18 2015-03-25 恒宝股份有限公司 Secure input method and system for password
CN105282738A (en) * 2015-11-24 2016-01-27 苏州铭冠软件科技有限公司 Security authentication method for mobile terminal
WO2018082237A1 (en) * 2016-11-07 2018-05-11 广州视源电子科技股份有限公司 Password input method and apparatus
CN108154055A (en) * 2018-01-10 2018-06-12 上海展扬通信技术有限公司 Cipher-code input method, mobile terminal and storage medium
CN113067697A (en) * 2019-12-31 2021-07-02 王建清 Remote password input method, storage medium, device and equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060058568A (en) * 2004-11-25 2006-05-30 엘지전자 주식회사 Method for setting password in wireless terminal
CN102013130A (en) * 2010-10-27 2011-04-13 江苏科技大学 Bank deposit terminal password input system and implementing method thereof
JP2014090286A (en) * 2012-10-30 2014-05-15 Mmguard Inc Mobile communication terminal and terminal control program
CN103679448A (en) * 2013-11-29 2014-03-26 天地融科技股份有限公司 Password inputting method and password inputting system
CN103825740A (en) * 2014-01-22 2014-05-28 武汉擎动网络科技有限公司 Mobile terminal payment password transmission system and method
CN104463040A (en) * 2014-12-18 2015-03-25 恒宝股份有限公司 Secure input method and system for password
CN105282738A (en) * 2015-11-24 2016-01-27 苏州铭冠软件科技有限公司 Security authentication method for mobile terminal
WO2018082237A1 (en) * 2016-11-07 2018-05-11 广州视源电子科技股份有限公司 Password input method and apparatus
CN108154055A (en) * 2018-01-10 2018-06-12 上海展扬通信技术有限公司 Cipher-code input method, mobile terminal and storage medium
CN113067697A (en) * 2019-12-31 2021-07-02 王建清 Remote password input method, storage medium, device and equipment

Also Published As

Publication number Publication date
CN114650143B (en) 2023-11-24

Similar Documents

Publication Publication Date Title
US9769127B2 (en) Smart card accessible over a personal area network
CN101442525B (en) System and method of performing electronic transactions
US8966096B2 (en) Device-pairing by reading an address provided in device-readable form
JP4736398B2 (en) Authentication method between secret terminals, secret information delivery method, apparatus, system, and program
KR100586654B1 (en) Wireless banking system and wireless banking method using mobile phone
EP2634703B1 (en) Removable storage device, and data processing system and method based on the device
US20070033136A1 (en) Secured financial transaction device
KR20110081966A (en) Authorization of server operations
US20180025332A1 (en) Transaction facilitation
WO2018205456A1 (en) Password input method, computer device, and storage medium
JP2016539605A (en) Method in network security and system in network security
KR100996955B1 (en) Security method using virtual keyboard
CN110740136A (en) Network security control method for open bank and open bank platform
CN101808077A (en) Information security input processing system and method and smart card
KR100447777B1 (en) Hacking prevention of key stroke data
CN114650143B (en) Password input method and terminal
JP5670001B1 (en) Transaction system, transaction method, and information recording medium
US11961064B2 (en) Information display method and apparatus, storage medium, and electronic device
CN114692120B (en) National password authentication method, virtual machine, terminal equipment, system and storage medium
CN111491064A (en) Voice service identity authentication method and system
JP6336383B2 (en) Trading system
CN113837744A (en) Transaction data processing method, transaction data processing system and terminal
JP2024513782A (en) Transaction card-based authentication system and method
CN115167765A (en) Data transfer method and device, storage medium and electronic equipment
KR20130139677A (en) Data communication method in electronic payment system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 201-9, Zone C, No. 18 Guanri Road, Phase II, Software Park, Torch High tech Zone, Xiamen City, Fujian Province, 361000

Applicant after: Fujian Huisibo Digital Technology Co.,Ltd.

Address before: No. 89 Software Avenue, Tongpan Road, Gulou District, Fuzhou City, Fujian Province, 350000. 510, Floor 5, 34 #, Zone C, Fuzhou Software Park

Applicant before: FUZHOU HUISIBO INFORMATION TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant