WO2021042808A1 - Security information input method, information security device and storage medium - Google Patents

Security information input method, information security device and storage medium Download PDF

Info

Publication number
WO2021042808A1
WO2021042808A1 PCT/CN2020/096585 CN2020096585W WO2021042808A1 WO 2021042808 A1 WO2021042808 A1 WO 2021042808A1 CN 2020096585 W CN2020096585 W CN 2020096585W WO 2021042808 A1 WO2021042808 A1 WO 2021042808A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
security
information input
terminal
security information
Prior art date
Application number
PCT/CN2020/096585
Other languages
French (fr)
Chinese (zh)
Inventor
陈柳章
Original Assignee
深圳市文鼎创数据科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市文鼎创数据科技有限公司 filed Critical 深圳市文鼎创数据科技有限公司
Publication of WO2021042808A1 publication Critical patent/WO2021042808A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Definitions

  • This application relates to the technical field of identity authentication, and specifically relates to a secure information input method, an information security device, and a storage medium.
  • One of the objectives of the embodiments of the present application is to provide a secure information input method, an information security device, and a storage medium, which can automatically input a password without manually inputting a password.
  • a security information input method which is applied to an information security device, and the method includes:
  • the information security device is a keyboard, generating security information
  • the security information is input into the terminal through a keyboard protocol.
  • the "generating security information” includes:
  • the security information is generated.
  • the security information input method includes:
  • the security information is allowed to be sent.
  • the identity recognition request process includes a fingerprint recognition process and/or a password recognition process.
  • the security information input method further includes:
  • the enter confirmation instruction is input into the terminal through a keyboard protocol.
  • the security information input method before the "sending keyboard device type description information to the terminal according to the information acquisition instruction", the security information input method includes:
  • the current application mode is switched to the safety information input mode.
  • an information security device in a second aspect, is provided, the information security device further includes a processor and a memory, the memory stores a security information input program, and the security information input program is configured to be executed by the processor to achieve The security information input method described in any one of the above.
  • the information security device further includes at least one of a USB module or a Bluetooth module.
  • the information security device includes FIDO (Fast Identity Online, a fast online identity authentication mode) module, the FIDO module can switch the current application mode to the safe information input mode through mode switching.
  • FIDO Fast Identity Online, a fast online identity authentication mode
  • a storage medium is provided, the storage medium is a computer-readable storage medium, and a safe information input program is stored on the storage medium, and the safe information input program can be executed by one or more processors to Realize the security information input method as described in any one of the above.
  • the security information input method and device provided by the embodiments of the present application have the beneficial effect of simulating a user's key press through an information security device to input security information into the terminal without manual input by the user, thereby improving user experience.
  • FIG. 1 is a schematic structural diagram of an information security device provided by an embodiment of this application.
  • FIG. 2 is a schematic flowchart of a security information input method provided by an embodiment of the application
  • Figure 3 is a schematic diagram of a display interface of an input box of a terminal
  • FIG. 4 is a schematic flowchart of another security information input method provided by an embodiment of the application.
  • the information security device includes a processor 300, a memory 400, a USB module 600, a Bluetooth module 700, and FIDO (Fast Identity Online) Module 800.
  • the information security device also includes a network interface (not shown) and a communication bus 700.
  • the processor 300, the mode switching module 500, and the FIDO module 600 are connected through a communication bus 500.
  • the memory 400 stores a safety information input program, the safety information input program is configured to be executed by the processor 300, and the processor 300 executes the safety information input program to implement the safety information input method.
  • the information security device further includes at least one of a USB module 600 or a Bluetooth module 700.
  • the information security device can send security information to the terminal through a wired transmission method via USB; or enter the security information into the terminal by establishing Bluetooth communication with the terminal.
  • the information security device includes a FIDO module 800, and the FIDO module 800 can switch the current application mode to the security information input mode through mode switching. You can directly enter the FIDO verification mode through mode switching. When establishing a connection with a terminal that uses FIDO for identity authentication, you can directly perform FIDO authentication.
  • an embodiment of the present application also provides a security information input method, which is applied to an information security device, and the security information input method includes:
  • Step S101 Receive an information acquisition instruction sent by a terminal
  • Step S103 Send the keyboard device type description information to the terminal according to the information acquisition instruction
  • Step S105 After the terminal recognizes that the information security device is a keyboard, generate security information;
  • Step S107 Input the security information into the terminal through a keyboard protocol.
  • the terminal needs to confirm the type of the information security device, and the information security device sends the keyboard device type description information to the terminal in preparation for simulating the keyboard to input security information.
  • the input keyboard device type description can be a keyboard descriptor or a keyboard descriptor based on the Bluetooth protocol. Specifically, after the information security device establishes a data connection with the terminal through the USB module 600 or the Bluetooth module 700, the input keyboard device type description is sent to the terminal, so that the terminal device recognizes the information security device as a keyboard.
  • the terminal when the terminal sends the keyboard descriptor to the terminal through the USB module 600 or the Bluetooth module 700, the terminal recognizes that the information security device is a keyboard, and waits for the information security device to input characters. Generate security information, and input the security information into the input box of the terminal according to the keyboard protocol.
  • the terminal If it is currently in the security information input mode, after the terminal recognizes that the information security device is a keyboard, it will determine whether the command to switch to FIDO mode is accepted, if it is received, switch to FIDO mode, otherwise, continue to input security information mode.
  • the terminal when the user uses the terminal for login and transaction, the terminal displays a security information input box waiting for the user to input security information, and enters security information through the corresponding input keyboard device type description to complete the input of identity information .
  • the method further includes: judging whether an operation of confirming input of safety information by the user is received;
  • the security information is generated.
  • the information security device cyclically waits for the user's confirmation to input security information, and by pressing the key, the user confirms the operation of inputting security information, and then generates security information and inputs it to the terminal .
  • a single-click button can be used as an operation for the user to confirm the input of security information
  • a double-click button can be used as a command to switch to the FIDO mode or a command to switch to the security information input mode.
  • the security information input method may further include:
  • Step S301 Enter the identity recognition request process
  • Step S303 Detect whether the identification information is received; if the identification information is received, perform step S305; otherwise, perform step S301;
  • Step S305 Determine whether the identity information matches the preset identity verification information; if the identity information matches the preset identity verification information, perform step S307; otherwise, perform step S301;
  • Step S307 Allow sending of security information.
  • the identity recognition request process includes at least one of a fingerprint recognition process or an identity verification password recognition process.
  • the user identity can be further confirmed before the security information is input to the terminal.
  • the information security device is a dynamic token, and the security information is a dynamic password.
  • the information security device is a cipher, the security information is an account password, and after the terminal recognizes the cipher as a keyboard, the cipher further includes: displaying a list of accounts. After the user selects the account, the account password corresponding to the selected account is entered into the terminal through the keyboard protocol (specifically, the account number is entered into the terminal first, and the password is entered into the terminal again when the user confirmation instruction is received again).
  • the information security device in the foregoing embodiment uses the information security device to simulate user keystrokes and input security information into the terminal without manual input by the user, thereby improving user experience.
  • the memory 400 includes at least one type of readable storage medium.
  • the readable storage medium includes flash memory, hard disk, multimedia card, card-type memory (such as SD or DX memory, etc.), magnetic memory, magnetic disk, and optical disk. Wait.
  • the memory 400 may be an internal storage unit of an information security device, such as a hard disk of the information security device.
  • the memory 400 may also be an external storage device of the information security device, such as a plug-in hard disk equipped on the information security device, a smart memory card (Smart Media Card, SMC), and a secure digital (Secure Digital, SD). Card, Flash Card, etc.
  • the memory 400 may also include both an internal storage unit of an information security device and an external storage device.
  • the memory 400 can be used not only to store application software and various data installed in the information security device, such as codes of the information security device, etc., but also to temporarily store data that has been output or will be output.
  • the processor 300 may be a central processing unit (Central Processing Unit) in some embodiments.
  • Central Processing Unit CPU
  • controller a controller
  • microcontroller a microprocessor
  • other data processing chips are used to run program codes or process data stored in the memory 400, for example, execute a security information input program.
  • the network interface may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface), which is usually used to establish a communication connection between the information security device and other electronic devices.
  • a standard wired interface such as a WI-FI interface
  • WI-FI interface wireless interface
  • the network interface is used to realize the connection and communication between these components.
  • the communication bus 500 is used to implement connection and communication between these components.
  • an embodiment of the present application also proposes a storage medium that stores a security information input program, and the security information input program can be executed by one or more processors to implement the following operations:
  • Step S101 Receive an information acquisition instruction sent by a terminal
  • Step S103 Send the keyboard device type description information to the terminal according to the information acquisition instruction
  • Step S105 After the terminal recognizes that the information security device is a keyboard, generate security information;
  • Step S107 Input the security information into the terminal through a keyboard protocol.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center. Transmission to another website site, computer, server or data center via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • wired such as coaxial cable, optical fiber, digital subscriber line (DSL)
  • wireless such as infrared, wireless, microwave, etc.
  • the computer-readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state hard disk (SSD)), etc.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be transmitted from a website, computer, server, or data center. Transmission to another website site, computer, server or data center via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • wired such as coaxial cable, optical fiber, digital subscriber line (DSL)
  • wireless such as infrared, wireless, microwave, etc.
  • the computer-readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a server or a data center integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state hard disk (SSD)), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Input From Keyboards Or The Like (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

A security information input method and apparatus and a storage medium. The method comprises: receiving an information obtaining instruction sent by a terminal (S101); sending keyboard device type description information to the terminal according to the information obtaining instruction (S103); generating security information after the terminal identifies that the information security device is a keyboard (S105); and inputting the security information to the terminal by means of a keypad protocol (S107). The information security device simulates user keys and inputs security information into the terminal without manual input by the user, which improves user experience.

Description

安全信息输入方法、信息安全设备以及存储介质Safety information input method, information safety equipment and storage medium
本申请要求于2019年09月06日在中国专利局提交的、申请号为201910841601.8、发明名称为“安全信息输入方法、信息安全设备以及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application filed at the Chinese Patent Office on September 6, 2019, with the application number 201910841601.8 and the title of the invention "security information input method, information security equipment, and storage medium". The entire content of the application is approved The reference is incorporated in this application.
技术领域Technical field
本申请涉及身份认证技术领域,具体涉及一种安全信息输入方法、信息安全设备以及存储介质。This application relates to the technical field of identity authentication, and specifically relates to a secure information input method, an information security device, and a storage medium.
背景技术Background technique
现如今,随着计算机网络的发展,网上交易越来越普及,但同时,网上交易涉及银行账号和密码等安全性问题也随之而来,并受到越来越多的关注。现有的,常见的保护方式有固定密码、静态密码和动态密码等。但上述的密码需要通过手动输入到终端中,提交到服务端进行身份认证,操作繁琐,用户体验差,且有在输入过程中密码被偷窥的风险。Nowadays, with the development of computer networks, online transactions have become more and more popular, but at the same time, security issues such as bank account numbers and passwords involved in online transactions have also followed and received more and more attention. Existing, common protection methods include fixed passwords, static passwords, and dynamic passwords. However, the above-mentioned password needs to be manually entered into the terminal and submitted to the server for identity authentication, which is cumbersome to operate, has a poor user experience, and risks the password being peeped during the input process.
技术问题technical problem
本申请实施例的目的之一在于:提供一种安全信息输入方法、信息安全设备以及存储介质,可以不通过手动输入密码就能实现自动输入密码。One of the objectives of the embodiments of the present application is to provide a secure information input method, an information security device, and a storage medium, which can automatically input a password without manually inputting a password.
技术解决方案Technical solutions
为解决上述技术问题,本申请实施例采用的技术方案是:In order to solve the above technical problems, the technical solutions adopted in the embodiments of this application are:
第一方面,提供了一种安全信息输入方法,应用于信息安全设备,所述方法包括:In a first aspect, a security information input method is provided, which is applied to an information security device, and the method includes:
接收终端发送的获取信息指令;Receive an information acquisition instruction sent by the terminal;
根据所述获取信息指令,发送键盘设备类型描述信息至终端;Sending the keyboard device type description information to the terminal according to the information acquisition instruction;
在所述终端识别所述信息安全设备为键盘之后,生成安全信息;After the terminal recognizes that the information security device is a keyboard, generating security information;
将所述安全信息通过键盘协议输入所述终端。The security information is input into the terminal through a keyboard protocol.
在一个实施例中,所述“生成安全信息”包括:In one embodiment, the "generating security information" includes:
判断是否接收到用户确认输入安全信息的操作;Determine whether the user confirms the input of the security information operation is received;
若接收到用户确认输入安全信息的操作,则生成安全信息。If the user confirms the input of the security information operation, the security information is generated.
在一个实施例中,所述安全信息输入方法包括:In an embodiment, the security information input method includes:
进入身份识别请求流程;Enter the identification request process;
检测是否接收到身份识别信息;Detect whether identification information is received;
若接收到身份识别信息,则判断所述身份识别信息是否与预设的身份验证信息相匹配;If the identification information is received, it is determined whether the identification information matches the preset identity verification information;
若所述身份识别信息与预设的身份验证信息相匹配,则允许发送安全信息。If the identity identification information matches the preset identity verification information, the security information is allowed to be sent.
在一个实施例中,所述身份识别请求流程包括指纹识别流程和/或密码识别流程。In an embodiment, the identity recognition request process includes a fingerprint recognition process and/or a password recognition process.
在一个实施例中,在所述“将所述安全信息通过键盘协议输入所述终端”之后,所述安全信息输入方法还包括:In an embodiment, after the "inputting the security information into the terminal through a keyboard protocol", the security information input method further includes:
生成回车确认指令;Generate a carriage return confirmation instruction;
将所述回车确认指令通过键盘协议输入所述终端。The enter confirmation instruction is input into the terminal through a keyboard protocol.
在一个实施例中,所述“根据所述获取信息指令,发送键盘设备类型描述信息至终端”之前,所述安全信息输入方法包括:In one embodiment, before the "sending keyboard device type description information to the terminal according to the information acquisition instruction", the security information input method includes:
判断是否接收到切换到安全信息输入模式的命令;Determine whether a command to switch to the safety information input mode is received;
若接收到切换到安全信息输入模式的命令,则将当前应用模式切换到安全信息输入模式。If a command to switch to the safety information input mode is received, the current application mode is switched to the safety information input mode.
第二方面,提供了一种信息安全设备,所述信息安全设备还包括处理器和存储器,所述存储器存储有安全信息输入程序,所述安全信息输入程序被配置成有处理器执行,以实现上述中任意一项所述的安全信息输入方法。In a second aspect, an information security device is provided, the information security device further includes a processor and a memory, the memory stores a security information input program, and the security information input program is configured to be executed by the processor to achieve The security information input method described in any one of the above.
在一个实施例中,所述信息安全设备还包括USB模块或蓝牙模块至少一种。In an embodiment, the information security device further includes at least one of a USB module or a Bluetooth module.
在一个实施例中,所述信息安全设备包括FIDO(Fast Identity Online,快速在线身份认证模式)模块,所述FIDO模块通过模式切换可将当前应用模式切换到安全信息输入模式。In one embodiment, the information security device includes FIDO (Fast Identity Online, a fast online identity authentication mode) module, the FIDO module can switch the current application mode to the safe information input mode through mode switching.
第三方面,提供一种存储介质,所述存储介质为计算机可读存储介质,所述存储介质上存储有安全信息输入程序,所述安全信息输入程序可被一个或者多个处理器执行,以实现如上述中任意一项所述安全信息输入方法。In a third aspect, a storage medium is provided, the storage medium is a computer-readable storage medium, and a safe information input program is stored on the storage medium, and the safe information input program can be executed by one or more processors to Realize the security information input method as described in any one of the above.
有益效果Beneficial effect
本申请实施例提供的安全信息输入方法及装置的有益效果在于,通过信息安全设备模拟用户按键,将安全信息输入终端,无需用户手动输入,提高用户体验。The security information input method and device provided by the embodiments of the present application have the beneficial effect of simulating a user's key press through an information security device to input security information into the terminal without manual input by the user, thereby improving user experience.
附图说明Description of the drawings
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例或示范性技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。In order to more clearly describe the technical solutions in the embodiments of the present application, the following will briefly introduce the accompanying drawings that need to be used in the embodiments or exemplary technical descriptions. Obviously, the accompanying drawings in the following description are only of the present application. For some embodiments, those of ordinary skill in the art can obtain other drawings based on these drawings without creative work.
图1为本申请实施例提供的信息安全设备的结构示意图;FIG. 1 is a schematic structural diagram of an information security device provided by an embodiment of this application;
图2为本申请实施例提供的安全信息输入方法的流程示意图;2 is a schematic flowchart of a security information input method provided by an embodiment of the application;
图3为终端的输入框的显示界面的示意图;Figure 3 is a schematic diagram of a display interface of an input box of a terminal;
图4为本申请实施例提供的另一安全信息输入方法的流程示意图;4 is a schematic flowchart of another security information input method provided by an embodiment of the application;
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The realization, functional characteristics, and advantages of the purpose of this application will be further described in conjunction with the embodiments and with reference to the accompanying drawings.
本发明的实施方式Embodiments of the present invention
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅用以解释本发明,并不用于限定本申请。In order to make the purpose, technical solutions, and advantages of this application clearer, the following further describes this application in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not used to limit the present application.
需说明的是,当部件被称为“固定于”或“设置于”另一个部件,它可以直接在另一个部件上或者间接在该另一个部件上。当一个部件被称为是“连接于”另一个部件,它可以是直接或者间接连接至该另一个部件上。术语“上”、“下”、“左”、“右”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本申请的限制,对于本领域的普通技术人员而言,可以根据具体情况理解上述术语的具体含义。术语“第一”、“第二”仅用于便于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明技术特征的数量。“多个”的含义是两个或两个以上,除非另有明确具体的限定。It should be noted that when a component is referred to as being "fixed to" or "installed on" another component, it can be directly on the other component or indirectly on the other component. When a component is said to be "connected" to another component, it can be directly or indirectly connected to the other component. The terms "upper", "lower", "left", "right", etc. indicate the orientation or positional relationship based on the orientation or positional relationship shown in the drawings, and are only for ease of description, and do not indicate or imply the device referred to. Or the element must have a specific orientation, be constructed and operated in a specific orientation, and therefore cannot be construed as a limitation of the present application. For those of ordinary skill in the art, the specific meaning of the above terms can be understood according to specific conditions. The terms "first" and "second" are only used for ease of description, and cannot be understood as indicating or implying relative importance or implicitly indicating the number of technical features. The meaning of "plurality" means two or more than two, unless otherwise specifically defined.
为了说明本申请所述的技术方案,以下结合具体附图及实施例进行详细说明。In order to illustrate the technical solutions described in this application, detailed descriptions are given below in conjunction with specific drawings and embodiments.
请参阅图1,本申请实施例体用一种信息安全设备,所述信息安全设备包括处理器300、存储器400、USB模块600、蓝牙模块700以及FIDO(Fast Identity Online,快速在线身份认证模式)模块800。所述信息安全设备还包括网络接口(图未示)和通信总线700。所述处理器300、模式切换模块500以及FIDO模块600通过通信总线500连接。所述存储器400存储有安全信息输入程序,所述安全信息输入程序被配置成由处理器300执行,处理器300执行安全信息输入程序以实现安全信息输入方法。Please refer to FIG. 1, an embodiment of the present application uses an information security device. The information security device includes a processor 300, a memory 400, a USB module 600, a Bluetooth module 700, and FIDO (Fast Identity Online) Module 800. The information security device also includes a network interface (not shown) and a communication bus 700. The processor 300, the mode switching module 500, and the FIDO module 600 are connected through a communication bus 500. The memory 400 stores a safety information input program, the safety information input program is configured to be executed by the processor 300, and the processor 300 executes the safety information input program to implement the safety information input method.
具体的,信息安全设备还包括USB模块600或蓝牙模块700至少一种。信息安全设备可通过USB将安全信息通过有线传输方式发送至终端;或通过与终端建立蓝牙通讯,将安全信息输入终端。信息安全设备包括FIDO模块800,所述FIDO模块800通过模式切换可将当前应用模式切换到安全信息输入模式。可通过模式切换直接进入FIDO验证模式,在与使用FIDO进行身份认证的终端建立连接时,可直接进行FIDO认证。Specifically, the information security device further includes at least one of a USB module 600 or a Bluetooth module 700. The information security device can send security information to the terminal through a wired transmission method via USB; or enter the security information into the terminal by establishing Bluetooth communication with the terminal. The information security device includes a FIDO module 800, and the FIDO module 800 can switch the current application mode to the security information input mode through mode switching. You can directly enter the FIDO verification mode through mode switching. When establishing a connection with a terminal that uses FIDO for identity authentication, you can directly perform FIDO authentication.
请参看图2,本申请实施例还提供一种安全信息输入方法,该方法应用于信息安全设备中,所述安全信息输入方法包括:Please refer to FIG. 2, an embodiment of the present application also provides a security information input method, which is applied to an information security device, and the security information input method includes:
步骤S101:接收终端发送的获取信息指令;Step S101: Receive an information acquisition instruction sent by a terminal;
步骤S103:根据所述获取信息指令,发送键盘设备类型描述信息至终端;Step S103: Send the keyboard device type description information to the terminal according to the information acquisition instruction;
步骤S105:在所述终端识别所述信息安全设备为键盘之后,生成安全信息;Step S105: After the terminal recognizes that the information security device is a keyboard, generate security information;
步骤S107:将所述安全信息通过键盘协议输入所述终端。Step S107: Input the security information into the terminal through a keyboard protocol.
在本实施例中,信息安全设备与所述终端建立通信连接后,由终端需要确认信息安全设备的类型,信息安全设备发送键盘设备类型描述信息至终端,以为模拟键盘输入安全信息做准备。输入键盘设备类型描述可以是键盘描述符或基于蓝牙协议的键盘描述符。具体的,信息安全设备与终端通过USB模块600或蓝牙模块700建立数据连接后,发送输入键盘设备类型描述至终端,以使终端设备识别信息安全设备为键盘。具体的,当终端通过USB模块600或蓝牙模块700将键盘描述符发送至终端,所述终端识别所述信息安全设备为键盘,等待信息安全设备输入字符。生成安全信息,并根据键盘协议输入所述安全信息至终端的输入框。在一些实施例中,在发送键盘设备类型描述信息至终端之前,会判断是否接收到切换到安全信息输入模式的命令;若接收到切换到安全信息输入模式的命令,则将当前的FIDO模式切换到安全信息输入模式。若当前为安全信息输入模式,在所述终端识别所述信息安全设备为键盘之后,会判断是否接受到切换到FIDO模式的命令,若接收到则切换至FIDO模式,否则,则继续安全信息输入模式。In this embodiment, after the information security device establishes a communication connection with the terminal, the terminal needs to confirm the type of the information security device, and the information security device sends the keyboard device type description information to the terminal in preparation for simulating the keyboard to input security information. The input keyboard device type description can be a keyboard descriptor or a keyboard descriptor based on the Bluetooth protocol. Specifically, after the information security device establishes a data connection with the terminal through the USB module 600 or the Bluetooth module 700, the input keyboard device type description is sent to the terminal, so that the terminal device recognizes the information security device as a keyboard. Specifically, when the terminal sends the keyboard descriptor to the terminal through the USB module 600 or the Bluetooth module 700, the terminal recognizes that the information security device is a keyboard, and waits for the information security device to input characters. Generate security information, and input the security information into the input box of the terminal according to the keyboard protocol. In some embodiments, before sending the keyboard device type description information to the terminal, it is determined whether a command to switch to the safe information input mode is received; if the command to switch to the safe information input mode is received, the current FIDO mode is switched Go to the security information input mode. If it is currently in the security information input mode, after the terminal recognizes that the information security device is a keyboard, it will determine whether the command to switch to FIDO mode is accepted, if it is received, switch to FIDO mode, otherwise, continue to input security information mode.
具体的,如图3所示,在用户使用终端进行登录、交易过程中,终端显示安全信息输入框等待用户输入安全信息,并通过对应的输入键盘设备类型描述输入安全信息,完成身份信息的输入。Specifically, as shown in Figure 3, when the user uses the terminal for login and transaction, the terminal displays a security information input box waiting for the user to input security information, and enters security information through the corresponding input keyboard device type description to complete the input of identity information .
在一个实施例中,所述方法还包括:判断是否接收到用户确认输入安全信息的操作;In an embodiment, the method further includes: judging whether an operation of confirming input of safety information by the user is received;
若接收到用户确认输入安全信息的操作,则生成安全信息。If the user confirms the input of the security information operation, the security information is generated.
在本实施例中,若判断所述终端识别所述信息安全设备为键盘,信息安全设备循环等待用户的确认输入安全信息,通过按键,用户确认输入安全信息的操作,就生成安全信息输入到终端。具体地,可以以单击按键作为用户确认输入安全信息的操作,以双击按键作为切换到FIDO模式的命令或切换到安全信息输入模式的命令。In this embodiment, if it is determined that the terminal recognizes the information security device as a keyboard, the information security device cyclically waits for the user's confirmation to input security information, and by pressing the key, the user confirms the operation of inputting security information, and then generates security information and inputs it to the terminal . Specifically, a single-click button can be used as an operation for the user to confirm the input of security information, and a double-click button can be used as a command to switch to the FIDO mode or a command to switch to the security information input mode.
在一个实施例中,请参阅图4,所述安全信息输入方法还可以包括:In an embodiment, referring to FIG. 4, the security information input method may further include:
步骤S301:进入身份识别请求流程;Step S301: Enter the identity recognition request process;
步骤S303:检测是否接收到身份识别信息;若接收到身份识别信息,则执行步骤S305;否则,则执行步骤S301;Step S303: Detect whether the identification information is received; if the identification information is received, perform step S305; otherwise, perform step S301;
步骤S305:判断所述身份识别信息是否与预设的身份验证信息相匹配;若所述身份识别信息与预设的身份验证信息相匹配,则执行步骤S307;否则,则执行步骤S301;Step S305: Determine whether the identity information matches the preset identity verification information; if the identity information matches the preset identity verification information, perform step S307; otherwise, perform step S301;
步骤S307:允许发送安全信息。Step S307: Allow sending of security information.
具体的,为避免信息安全设备被人盗用,需要进一步对用户的身份进行验证。在本实施例中,身份识别请求流程包括指纹识别流程或身份验证密码识别流程至少一种。通过在信息安全设备中预先保存指纹信息或身份验证密码,以在输入安全信息至终端之前再进一步确认用户身份。Specifically, in order to prevent the information security equipment from being stolen by others, it is necessary to further verify the identity of the user. In this embodiment, the identity recognition request process includes at least one of a fingerprint recognition process or an identity verification password recognition process. By pre-saving the fingerprint information or identity verification password in the information security device, the user identity can be further confirmed before the security information is input to the terminal.
在一个实施例中,所述信息安全设备为动态令牌,所述安全信息为动态口令。在另一个实施例中,所述信息安全设备为密码器,所述安全信息为账号密码,所述密码器在所述终端识别所述密码器为键盘之后,还包括:显示账户列表。在用户选择账户之后,将所选择的账户对应的账号密码通过键盘协议输入所述终端(具体可以是先将账号输入终端,再次接收到用户确认指令时,再将密码输入所述终端)。In one embodiment, the information security device is a dynamic token, and the security information is a dynamic password. In another embodiment, the information security device is a cipher, the security information is an account password, and after the terminal recognizes the cipher as a keyboard, the cipher further includes: displaying a list of accounts. After the user selects the account, the account password corresponding to the selected account is entered into the terminal through the keyboard protocol (specifically, the account number is entered into the terminal first, and the password is entered into the terminal again when the user confirmation instruction is received again).
上述实施例中的信息安全设备,通过信息安全设备模拟用户按键,将安全信息输入终端,无需用户手动输入,提高用户体验。The information security device in the foregoing embodiment uses the information security device to simulate user keystrokes and input security information into the terminal without manual input by the user, thereby improving user experience.
本实施例中,存储器400至少包括一种类型的可读存储介质,所述可读存储介质包括闪存、硬盘、多媒体卡、卡型存储器(例如SD或DX存储器等)、磁性存储器、磁盘、光盘等。存储器400在一些实施例中可以是信息安全设备的内部存储单元,例如该信息安全设备的硬盘。存储器400在另一些实施例中也可以是信息安全设备的外部存储设备,例如信息安全设备上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。进一步地,存储器400还可以既包括信息安全设备的内部存储单元也包括外部存储设备。存储器400不仅可以用于存储安装于信息安全设备的应用软件及各类数据,例如信息安全设备的代码等,还可以用于暂时地存储已经输出或者将要输出的数据。In this embodiment, the memory 400 includes at least one type of readable storage medium. The readable storage medium includes flash memory, hard disk, multimedia card, card-type memory (such as SD or DX memory, etc.), magnetic memory, magnetic disk, and optical disk. Wait. In some embodiments, the memory 400 may be an internal storage unit of an information security device, such as a hard disk of the information security device. In other embodiments, the memory 400 may also be an external storage device of the information security device, such as a plug-in hard disk equipped on the information security device, a smart memory card (Smart Media Card, SMC), and a secure digital (Secure Digital, SD). Card, Flash Card, etc. Further, the memory 400 may also include both an internal storage unit of an information security device and an external storage device. The memory 400 can be used not only to store application software and various data installed in the information security device, such as codes of the information security device, etc., but also to temporarily store data that has been output or will be output.
处理器300在一些实施例中可以是一中央处理器(Central Processing Unit,CPU)、控制器、微控制器、微处理器或其他数据处理芯片,用于运行存储器400中存储的程序代码或处理数据,例如执行安全信息输入程序等。The processor 300 may be a central processing unit (Central Processing Unit) in some embodiments. Processing Unit (CPU), a controller, a microcontroller, a microprocessor, or other data processing chips are used to run program codes or process data stored in the memory 400, for example, execute a security information input program.
网络接口可选的可以包括标准的有线接口、无线接口(如WI-FI接口),通常用于在该信息安全设备与其他电子设备之间建立通信连接。The network interface may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface), which is usually used to establish a communication connection between the information security device and other electronic devices.
网络接口用于实现这些组件之间的连接通信。The network interface is used to realize the connection and communication between these components.
通信总线500用于实现这些组件之间的连接通信。The communication bus 500 is used to implement connection and communication between these components.
此外,本申请实施例还提出一种存储介质,所述存储介质上存储有安全信息输入程序,所述安全信息输入程序可被一个或者多个处理器执行,以实现如下操作:In addition, an embodiment of the present application also proposes a storage medium that stores a security information input program, and the security information input program can be executed by one or more processors to implement the following operations:
步骤S101:接收终端发送的获取信息指令;Step S101: Receive an information acquisition instruction sent by a terminal;
步骤S103:根据所述获取信息指令,发送键盘设备类型描述信息至终端;Step S103: Send the keyboard device type description information to the terminal according to the information acquisition instruction;
步骤S105:在所述终端识别所述信息安全设备为键盘之后,生成安全信息;Step S105: After the terminal recognizes that the information security device is a keyboard, generate security information;
步骤S107:将所述安全信息通过键盘协议输入所述终端。Step S107: Input the security information into the terminal through a keyboard protocol.
本申请存储介质具体实施方式与上述安全信息输入方法和信息安全设备各实施例基本相同,在此不作累述。The specific implementation of the storage medium of the present application is basically the same as the foregoing embodiments of the security information input method and the information security device, and will not be repeated here.
需要说明的是,上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。并且本文中的术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、装置、物品或者方法不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、装置、物品或者方法所固有的要素。在没有更多限制的情况下,由语句“包括一……”限定的要素,并不排除在包括该要素的过程、装置、物品或者方法中还存在另外的相同要素。It should be noted that the serial numbers of the foregoing embodiments of the present application are only for description, and do not represent the advantages and disadvantages of the embodiments. And the terms "include", "include" or any other variants thereof in this article are intended to cover non-exclusive inclusion, so that a process, device, article or method including a series of elements not only includes those elements, but also includes those elements that are not explicitly included. The other elements listed may also include elements inherent to the process, device, article, or method. If there are no more restrictions, the element defined by the sentence "including one..." does not exclude the existence of other identical elements in the process, device, article, or method that includes the element.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在如上所述的一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台信息安全设备执行本申请各个实施例所述的方法。Through the description of the above implementation manners, those skilled in the art can clearly understand that the above-mentioned embodiment method can be implemented by means of software plus the necessary general hardware platform, of course, it can also be implemented by hardware, but in many cases the former is better.的实施方式。 Based on this understanding, the technical solution of this application essentially or the part that contributes to the existing technology can be embodied in the form of a software product, and the computer software product is stored in a storage medium (such as ROM/RAM) as described above. , Magnetic disk, optical disk), including a number of instructions to make an information security device execute the method described in each embodiment of this application.
所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present application are generated in whole or in part. The computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices. The computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center. Transmission to another website site, computer, server or data center via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a server or a data center integrated with one or more available media. The usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state hard disk (SSD)), etc.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and conciseness of the description, the specific working process of the above-described system, device, and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions described in the embodiments of the present application are generated in whole or in part. The computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices. The computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium. For example, the computer instructions may be transmitted from a website, computer, server, or data center. Transmission to another website site, computer, server or data center via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a server or a data center integrated with one or more available media. The usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, a solid state hard disk (SSD)), etc.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that, for the convenience and conciseness of the description, the specific working process of the above-described system, device, and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
以上仅为本申请的可选实施例而已,并不用于限制本申请。对于本领域的技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的权利要求范围之内。The above are only optional embodiments of the application, and are not used to limit the application. For those skilled in the art, this application can have various modifications and changes. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of this application shall be included in the scope of the claims of this application.

Claims (12)

  1. 一种安全信息输入方法,应用于信息安全设备,其特征在于,所述方法包括,A security information input method applied to information security equipment, characterized in that the method includes:
    接收终端发送的获取信息指令;Receive an information acquisition instruction sent by the terminal;
    根据所述获取信息指令,发送键盘设备类型描述信息至终端;Sending the keyboard device type description information to the terminal according to the information acquisition instruction;
    在所述终端识别所述信息安全设备为键盘之后,生成安全信息;After the terminal recognizes that the information security device is a keyboard, generating security information;
    将所述安全信息通过键盘协议输入所述终端。The security information is input into the terminal through a keyboard protocol.
  2. 根据权利要求1所述的安全信息输入方法,其特征在于,所述“生成安全信息”包括:The security information input method according to claim 1, wherein said "generating security information" comprises:
    判断是否接收到用户确认输入安全信息的操作;Determine whether the user confirms the input of the security information operation is received;
    若接收到用户确认输入安全信息的操作,则生成安全信息。 If the user confirms the input of the security information operation, the security information is generated.
  3. 根据权利要求1所述的安全信息输入方法,其特征在于,所述安全信息输入方法包括:The safety information input method according to claim 1, wherein the safety information input method comprises:
    进入身份识别请求流程;Enter the identification request process;
    检测是否接收到身份识别信息;Detect whether identification information is received;
    若接收到身份识别信息,则判断所述身份识别信息是否与预设的身份验证信息相匹配;If the identification information is received, it is determined whether the identification information matches the preset identity verification information;
    若所述身份识别信息与预设的身份验证信息相匹配,则允许发送安全信息。If the identity identification information matches the preset identity verification information, the security information is allowed to be sent.
  4. 根据权利要求3所述的安全信息输入方法,其特征在于,所述身份识别请求流程包括指纹识别流程和/或密码识别流程。The security information input method according to claim 3, wherein the identity recognition request process includes a fingerprint recognition process and/or a password recognition process.
  5. 根据权利要求1所述的安全信息输入方法,其特征在于,在所述“将所述安全信息通过键盘协议输入所述终端”之后,所述安全信息输入方法还包括:The security information input method according to claim 1, wherein after the "input the security information into the terminal through a keyboard protocol", the security information input method further comprises:
    生成回车确认指令;Generate a carriage return confirmation instruction;
    将所述回车确认指令通过键盘协议输入所述终端。The enter confirmation instruction is input into the terminal through a keyboard protocol.
  6. 根据权利要求1所述的安全信息输入方法,其特征在于,所述“根据所述获取信息指令,发送键盘设备类型描述信息至终端”之前,所述安全信息输入方法包括:The security information input method according to claim 1, characterized in that, before the "sending keyboard device type description information to the terminal according to the information acquisition instruction", the security information input method comprises:
    判断是否接收到切换到安全信息输入模式的命令;Determine whether a command to switch to the safety information input mode is received;
    若接收到切换到安全信息输入模式的命令,则将当前应用模式切换到安全信息输入模式。If a command to switch to the safety information input mode is received, the current application mode is switched to the safety information input mode.
  7. 根据权利要求1-6任一项所述的安全信息输入方法,其特征在于,所述信息安全设备为动态令牌,所述安全信息为动态口令。 The security information input method according to any one of claims 1-6, wherein the information security device is a dynamic token, and the security information is a dynamic password.
  8. 根据权利要求1-6任一项所述的安全信息输入方法,其特征在于,所述信息安全设备为密码器,所述安全信息为账号密码。 The security information input method according to any one of claims 1 to 6, wherein the information security device is a cipher, and the security information is an account password.
  9. 一种信息安全设备,其特征在于,所述信息安全设备还包括处理器和存储器,所述存储器存储有安全信息输入程序,所述安全信息输入程序被配置成有处理器执行,以实现权利要求1-8中任意一项所述的安全信息输入方法。An information security device, characterized in that the information security device further includes a processor and a memory, the memory stores a security information input program, and the security information input program is configured to be executed by the processor to implement the claims The security information input method described in any one of 1-8.
  10. 根据权利要求9所述的信息安全设备,其特征在于,所述信息安全设备还包括USB模块或蓝牙模块至少一种。The information security device according to claim 9, wherein the information security device further comprises at least one of a USB module or a Bluetooth module.
  11. 根据权利要求10所述的信息安全设备,其特征在于,所述信息安全设备包括FIDO(Fast Identity Online,快速在线身份认证模式)模块,所述FIDO模块通过模式切换可将当前应用模式切换到安全信息输入模式。The information security device according to claim 10, wherein the information security device comprises a FIDO (Fast Identity Online, fast online identity authentication mode) module, and the FIDO module can switch the current application mode to security through mode switching. Information input mode.
  12. 一种存储介质,其特征在于:所述存储介质为计算机可读存储介质,所述存储介质上存储有安全信息输入程序,所述安全信息输入程序可被一个或者多个处理器执行,以实现如权利要求1-8中任意一项所述安全信息输入方法。A storage medium, characterized in that: the storage medium is a computer-readable storage medium, and a safety information input program is stored on the storage medium, and the safety information input program can be executed by one or more processors to realize The security information input method according to any one of claims 1-8.
PCT/CN2020/096585 2019-09-06 2020-06-17 Security information input method, information security device and storage medium WO2021042808A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910841601.8 2019-09-06
CN201910841601.8A CN112464183A (en) 2019-09-06 2019-09-06 Security information input method, information security device, and storage medium

Publications (1)

Publication Number Publication Date
WO2021042808A1 true WO2021042808A1 (en) 2021-03-11

Family

ID=74807738

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/096585 WO2021042808A1 (en) 2019-09-06 2020-06-17 Security information input method, information security device and storage medium

Country Status (2)

Country Link
CN (1) CN112464183A (en)
WO (1) WO2021042808A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030226016A1 (en) * 2002-05-31 2003-12-04 International Business Machines Corporation Assurance of authentication in a computer system apparatus and method
CN102902903A (en) * 2012-10-10 2013-01-30 山东中孚信息产业股份有限公司 Electronic commerce intelligent password key with button and implementation method for electronic commerce intelligent password key
CN103425944A (en) * 2013-07-16 2013-12-04 深圳市文鼎创数据科技有限公司 Information safety input method and information safety device
CN105072114A (en) * 2015-08-11 2015-11-18 深圳市文鼎创数据科技有限公司 Automatic form filling method, password manager, upper computer and system
CN107315933A (en) * 2017-05-16 2017-11-03 武汉普利商用机器有限公司 A kind of fingerprint cipher keyboard

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030226016A1 (en) * 2002-05-31 2003-12-04 International Business Machines Corporation Assurance of authentication in a computer system apparatus and method
CN102902903A (en) * 2012-10-10 2013-01-30 山东中孚信息产业股份有限公司 Electronic commerce intelligent password key with button and implementation method for electronic commerce intelligent password key
CN103425944A (en) * 2013-07-16 2013-12-04 深圳市文鼎创数据科技有限公司 Information safety input method and information safety device
CN105072114A (en) * 2015-08-11 2015-11-18 深圳市文鼎创数据科技有限公司 Automatic form filling method, password manager, upper computer and system
CN107315933A (en) * 2017-05-16 2017-11-03 武汉普利商用机器有限公司 A kind of fingerprint cipher keyboard

Also Published As

Publication number Publication date
CN112464183A (en) 2021-03-09

Similar Documents

Publication Publication Date Title
TWI728261B (en) Query system, method and non-transitory machine-readable medium to determine authentication capabilities
EP3188105B1 (en) Verification information transmission method and terminal
US9667626B2 (en) Network authentication method and device for implementing the same
US20150186875A1 (en) Information Configuration Method, Device, System, Client And Server
CN101221641B (en) On-line trading method and its safety affirmation equipment
TW201525748A (en) Password resetting method, device having password resetting function, system having password resetting function
CN105656850B (en) Data processing method, related device and system
CN106161475B (en) Method and device for realizing user authentication
CN102983973A (en) Trading system and trading method
CN103731273A (en) Data transmission method and system
CN110351672A (en) Information-pushing method, device and electronic equipment
TWI590172B (en) Authorizing server,authorizing method and computer program product
TW201906484A (en) Communication method and device
JP7286770B2 (en) Authentication for third-party digital wallet provisioning
CN104079527A (en) Information processing method and electronic equipment
KR101211900B1 (en) System for Electronic Signature based on Wireless Terminal
US20180075230A1 (en) Identity authentication method and apparatus
CN111586074B (en) Communication method, server, Internet of things system and readable storage medium
CN110602679B (en) Display and transmission method, identity authentication and data transmission device and terminal
WO2021042808A1 (en) Security information input method, information security device and storage medium
KR101459283B1 (en) 2 Channel authentication device and method
US20230063417A1 (en) System and method for forwarding authentication requests to a nearby authenticator
EP3410332A1 (en) A system and method for transferring data to an authentication device
US11245698B2 (en) Registration system and registration method
CN114697956B (en) Secure communication method and device based on double links

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20861430

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20861430

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 23/08/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 20861430

Country of ref document: EP

Kind code of ref document: A1