CN106327194A - Password generation method and electronic equipment - Google Patents
Password generation method and electronic equipment Download PDFInfo
- Publication number
- CN106327194A CN106327194A CN201610720157.0A CN201610720157A CN106327194A CN 106327194 A CN106327194 A CN 106327194A CN 201610720157 A CN201610720157 A CN 201610720157A CN 106327194 A CN106327194 A CN 106327194A
- Authority
- CN
- China
- Prior art keywords
- password
- electronic equipment
- seed file
- time
- standard time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a password generation method and electronic equipment. The method is applied to the electronic equipment. The method comprises the steps that operation used for generating passwords is acquired through detection; the operation is responded, a seed file is acquired and standard time is acquired from another set of electronic equipment connected with the electronic equipment; and the passwords are generated based on the seed file and the standard time. The technical problems in the prior art that the time-based password generation method cannot guarantee the effectiveness of the passwords can be solved so that the technical effect of enhancing the effectiveness of the passwords generated by tokens can be realized.
Description
Technical field
The present invention relates to electronic technology field, particularly to a kind of method for generating cipher code and electronic equipment.
Background technology
Along with the continuous progress of science and technology, the Internet and finance informationalizing technology have also been obtained fast development, on the net
The advantages such as bank is convenient with it, efficient rapidly be the generally high praise of user and bank's industry.Bank and various electronic business
Business website, in order to overcome the safety defect of authentication mode based on static password, have employed dynamic password token or dynamic mouth mostly
Order card carrys out the safety of Strengthens network authentication.
Dynamic-password technique is also called one-time password (One Time Password is called for short OTP) technology, is characterized in
The display digit of the dynamic password token that user provides according to service provider inputs electronic cipher, and dynamic-password technique is according to close
The difference of code generating mode, can be divided into time-based dynamic-password technique, dynamic-password technique based on event and base
Dynamic-password technique in challenge/response.
When using time-based dynamic-password technique to generate password, first have to obtain seed file, then obtain behaviour
Make the local zone time of system, finally according to default password generating algorithm, generate password based on seed file and local zone time, and
The password transmission of generation is authenticated to server.
Due in the method generating password based on the time of the prior art, when the time of acquisition is operating system local
Between, and the time of system can arbitrarily change, as hacker attacks revises system time etc., thus, when basis based on operating system
The password that token time corresponding is not produced by the ground time with server time is the most invalid.
Visible, there is the technology of the effectiveness that cannot ensure password in method based on time generation password of the prior art
Problem.
Summary of the invention
The embodiment of the present invention provides a kind of method for generating cipher code and electronic equipment, be used for solving of the prior art based on time
Between generate the method for password and there is the technical problem of effectiveness that cannot ensure password, it is achieved improve having of the password that token produces
The technique effect of effect property.
On the one hand the embodiment of the present application provides a kind of method for generating cipher code, is applied in electronic equipment, and described method includes:
Detection obtains the operation for generating password;
Respond described operation, it is thus achieved that seed file and obtain standard from another electronic equipment being connected with described electronic equipment
Time;
Based on described seed file and described standard time, generate password.
Optionally, described detection obtains the operation for generating password, including:
Detection obtains the delivery operation for paying an incomplete transaction;Or
Detection acquisition performs operation for execution one autoexec.
Optionally, the described operation of described response, it is thus achieved that seed file, including:
Respond described operation, obtain seed file from other electronic equipments being connected with described electronic equipment;Or
Respond described operation, from the memory element of described electronic equipment, obtain seed file.
Optionally, described based on described seed file and standard time, generate password, including:
Based on described seed file and described standard time, utilize SM3 algorithm, generate password;Or
Based on described seed file and described standard time, utilize HMAC-SHA1 algorithm, generate password.
Optionally, the described standard time is that the time obtained from country time service center or described standard time are for awarding from having
The time obtained on the server of Shi Gongneng.
On the other hand the embodiment of the present application provides a kind of electronic equipment, including:
First obtains unit, for detecting acquisition for the operation generating password;
Second obtains unit, is used for responding described operation, it is thus achieved that seed file and from another with what described electronic equipment was connected
One electronic equipment obtains the standard time;
Password generation unit, for based on described seed file and described standard time, generates password.
Optionally, described first acquisition unit is used for:
Detection obtains the delivery operation for paying an incomplete transaction;Or
Detection acquisition performs operation for execution one autoexec.
Optionally, described second acquisition unit is used for:
Respond described operation, obtain seed file from other electronic equipments being connected with described electronic equipment;Or
Respond described operation, from the memory element of described electronic equipment, obtain seed file.
Optionally, described password generation unit is used for:
Based on described seed file and described standard time, utilize SM3 algorithm, generate password;Or
Based on described seed file and described standard time, utilize HMAC-SHA1 algorithm, generate password.
Optionally, the described standard time is that the time obtained from country time service center or described standard time are for awarding from having
The time obtained on the server of Shi Gongneng.
Said one in the embodiment of the present application or multiple technical scheme, at least have following one or more technology effect
Really:
Due to the technical scheme in the embodiment of the present application, detection is used to obtain the operation for generating password;Response is described
Operation, it is thus achieved that seed file and obtain the standard time from another electronic equipment being connected with described electronic equipment;Based on described kind
Subfile and described standard time, generate the technological means of password, so, be other electronics owing to being used for generating the time of password
Standard time in equipment, as the standard time in server or country time service center standard time, even if thus electronics
System time in equipment is modified, and its password generated also will not change with the change of system time, thus ensure that
The accuracy of the time during password generation, efficiently solves the method existence generating password based on the time of the prior art
The technical problem of the effectiveness of password cannot be ensured, it is achieved improve the technique effect of the effectiveness of the password that token produces.
Accompanying drawing explanation
The flow chart of the Fig. 1 a kind of method for generating cipher code for providing in the embodiment of the present application one;
The structured flowchart of the Fig. 2 a kind of electronic equipment for providing in the embodiment of the present application two.
Detailed description of the invention
The embodiment of the present invention provides a kind of method for generating cipher code and electronic equipment, be used for solving of the prior art based on time
Between generate the method for password and there is the technical problem of effectiveness that cannot ensure password, it is achieved improve having of the password that token produces
The technique effect of effect property.
Technical scheme in the embodiment of the present invention is to solve above-mentioned technical problem, and general thought is as follows:
A kind of method for generating cipher code, is applied in electronic equipment, and described method includes:
Detection obtains the operation for generating password;
Respond described operation, it is thus achieved that seed file and obtain standard from another electronic equipment being connected with described electronic equipment
Time;
Based on described seed file and described standard time, generate password.
In technique scheme, detection is used to obtain the operation for generating password;Respond described operation, it is thus achieved that seed
File and obtain the standard time from another electronic equipment being connected with described electronic equipment;Based on described seed file and described mark
Between Zhun Shi, generate the technological means of password, so, due to for generate time of password be the standard in other electronic equipments time
Between, such as the standard time in server or the standard time at country time service center, even if thus during system in electronic equipment
Between be modified, its generate password also will not change with the change of system time, thus ensure that password generate during
The accuracy of time, efficiently solve and of the prior art generate the method for password based on the time and exist and cannot ensure password
The technical problem of effectiveness, it is achieved improve the technique effect of the effectiveness of the password that token produces.
Below in conjunction with the accompanying drawings the main of the embodiment of the present application technical scheme is realized principle, detailed description of the invention and correspondence thereof
The beneficial effect that can reach is explained in detail.
Embodiment one
Refer to Fig. 1, the flow chart of a kind of method for generating cipher code for providing in the embodiment of the present application one, described method bag
Include:
S101: detection obtains the operation for generating password;
S102: respond described operation, it is thus achieved that seed file and obtaining from another electronic equipment being connected with described electronic equipment
Obtain the standard time;
S103: based on described seed file and described standard time, generates password.
In the prior art, dynamic password token mainly has a two ways: hardware token or software token.Both are giving birth to
Become principle during password identical, but, in terms of the adjustment of time factor required when to generation password, both are entirely different:
In hardware token, itself is configured with clock, once clock setting well after, the time of hardware token just will not change.
When needing the time of synchronous token time and server, it is the time utilizing the time in hardware token to remove to adjust server,
So that the time of the time of server and token is close;And the process of its time of software token adjustment is complete with hardware token
On the contrary, i.e. be to utilize local system time or server time to go to adjust the time in software token, in software token time
Between can change, when not having extraneous the intervention, local system time or server time are constant.
In specific implementation process, described method for generating cipher code is applied in the software token of electronic equipment, described electronics
Equipment can be specifically smart mobile phone, notebook computer or other be provided with the electronic equipment of software token, here, just
Differ and one schematically illustrate.Software token may operate in general operating system, it is also possible to is integrated in telnet client end
Together, convenient use.In the embodiment of the present application, the software leaves will applied in notebook computer with described method for generating cipher code
As a example by board, the method in the embodiment of the present application is described in detail.
When method in using the embodiment of the present application carries out password generation, step S101 is first carried out, it may be assumed that detection obtains
For generating the operation of password.
In the embodiment of the present application, the specific implementation of step S101 is as follows:
Detection obtains the delivery operation for paying an incomplete transaction;Or
Detection acquisition performs operation for execution one autoexec.
In specific implementation process, apply in the software token in notebook computer with described method for generating cipher code and be
Example, software token can one of in the following way obtain delivery operation or perform operation:
First kind of way:
Notebook computer is provided with operation button, as paid button or historical transaction record etc. being deleted
Button, confirms to pay transaction when user presses payment button, or user presses delete button and confirms historical trading
When record is deleted, the software token in notebook computer will obtain aforesaid operations instruction.Memorizer at notebook computer
In can prestore that some relate to the operation of private information of user, such as transactional operation, the operation etc. of deleting history transaction record, when
After notebook computer detects aforesaid operations by button, just mate with the operation prestored in memorizer, it is judged that currently use
Whether the operation at family is predetermined registration operation, if, it is determined that current operation is the operation needing to generate password, is just sent out by current operation
Deliver in software token, so that software token obtains the operation for generating password.Obtained by button be used for generating close
The operation of code, has isolated the threat of trojan horse program etc. from hardware, has improve safety.
The second way:
Being provided with reception device on notebook computer, this reception device can pass through wired or wirelessly receive
The operational order of user, such as, can be received with audible by audio interface, be received by USB interface, by NFC mode
Receive, received by bluetooth approach, receive operational order by arbitrary forms such as optical transport mode receptions.When detecting user's
Voice, such as " Pay Bill ", then current speech operation is then sent to software token, so that software token obtains by notebook computer
Take the operation for generating password.
After having performed step S101, the method in the embodiment of the present application just performs step S102, it may be assumed that response is described
Operation, it is thus achieved that seed file and obtain the standard time from another electronic equipment being connected with described electronic equipment.
In the embodiment of the present application, the specific implementation of step S102 includes:
Respond described operation, obtain seed file from other electronic equipments being connected with described electronic equipment;Or
Respond described operation, from the memory element of described electronic equipment, obtain seed file.
In specific implementation process, continue to use above-mentioned example, after software token obtains the operation being used for generating password, software
Token just from other electronic equipments described, such as server, the official website database of bank of bank, obtains for generating password
Seed file;Or in the memory element of software token, storage has pre-set seed file, then software token is direct
From memory element, obtain described seed file, it is of course also possible to there are other methods obtaining seed file, implement in the application
Example is not restricted.
Described seed file is specially PRNG (PRNG) seed, and described seed is exactly the initial of PRNG
Value.Same seed each run in the PRNG of same structure all can generate identical random number sequence.If it is not known that
Seed, then the random number of generation can be described as being difficult to prediction.In general the seed length of software token 32 with
On, issuing token when, server can generate a random seed, this seed can be simultaneously written server and
In token software, it is also possible to only preserve in the server, then obtain from server when software token needs to generate password.When
So, the generation of seed file can also be to be calculated, in the embodiment of the present application by default algorithm, such as AES-128 algorithm
In be not restricted.
In the embodiment of the present application, in order to ensure the effectiveness of password, the described standard time is specially and sets with described electronics
Standby another electronic equipment connected obtains, and e.g., the server with time service function relevant to software token obtains the time, or
The time obtained from the equipment at country time service center.So, unconnected with system time for generating the time of password, from
Change due to which kind of reason regardless of the notebook system time, for generate time of password all can with server in or
The time at country time service center is consistent, thus ensure that the password every time generated in software token is all effective.
After having performed step S102, the method in the embodiment of the present application just performs step S103, it may be assumed that based on described
Seed file and standard time, generate password.
In the embodiment of the present application, the specific implementation of step S103 includes:
Based on described seed file and described standard time, utilize SM3 algorithm, generate password;Or
Based on described seed file and described standard time, utilize HMAC-SHA1 algorithm, generate password.
In specific implementation process, continue to use above-mentioned example, after software token obtains standard time and seed file, software
Token just carries out the computing of password generation based on the algorithm prestored, such as SM3 algorithm or HMAC-SHA1 algorithm.SM3 algorithm is to length
Degree, less than the message for 2^64 position, through filling and Iteration Contraction, generates the Hash Value of a length of 256 bits, is password.
HMAC-SHA1 algorithm utilizes hash algorithm, with seed file and standard time for input, generates a summary info as defeated
Going out, described summary info is password, is not described in detail above-mentioned algorithm.Certainly, this area
Technical staff can also use other algorithms to generate password, is not restricted.
In the embodiment of the present application, in order to improve safety, prevent other people to be traded by ripping software token, work as software leaves
Before the server of the password of generation Yu bank is authenticated by board, software token can also obtain default prompting strategy, root
According to prompting strategy prompting dynamic password.Concrete, software token can point out dynamic password in the following way:
The first: is at the display screen display dynamic password of notebook computer, to point out user dynamic password;Display is dynamically
Password only has software token holder can check dynamic password, improves safety.
The second: utilize the instantaneous speech power in notebook computer, such as speaker or earphone, pass through speech play
Mode point out user dynamic password.Speech play dynamic password makes to check that the people of dynamic password could be aware that dynamic mouth
Order, convenient use.
It addition, in order to ensure that user may determine that whether this transaction is the true sale of user, generate dynamic in software token
After state password, Transaction Information can also be sent to notebook computer by software token, so that notebook computer output transaction letter
Breath.Only when user confirm Transaction Information correct or for user needed for true sale after, send and confirm that instruction is to software
Token, otherwise sends and cancels instruction to software token.Thus, prevent user in the case of unwitting by other people in any way
Obtain dynamic password, cause damage.
Such as, when software token obtains after dynamic password, this Transaction Information will be exported: trading object: Taobao, the amount of money
For;99.Prompting Transaction Information can also use the arbitrary form such as display reminding or speech play prompting.When software token obtains
After the confirmation of Transaction Information is operated by user, just the password transmission of generation is verified to server, thus complete this time to hand over
Easily.
Embodiment two
Based on the inventive concept identical with the embodiment of the present application one, refer to Fig. 2, for what the embodiment of the present application two provided
A kind of structured flowchart of electronic equipment, including:
First obtains unit 101, for detecting acquisition for the operation generating password;
Second obtains unit 102, is used for responding described operation, it is thus achieved that seed file and from being connected with described electronic equipment
Another electronic equipment obtains the standard time;
Password generation unit 103, for based on described seed file and described standard time, generates password.
In specific implementation process, described electronic equipment can be specifically that other are provided with the electronic equipment of software token,
As there is the smart mobile phone of software token or there is the notebook of software token, one schematically illustrate here, just differ.In the application
In embodiment, will be to be described in detail as a example by the notebook with software token by described electronic equipment.
In the embodiment of the present application two, first obtains unit 101 is used for:
Detection obtains the delivery operation for paying an incomplete transaction;Or
Detection acquisition performs operation for execution one autoexec.
In specific implementation process, being as a example by the notebook with software token by described electronic equipment, first obtains list
Unit 101 can be specifically the operation button arranged on notebook computer, and user confirms to pay transaction by operation button,
Or user confirms historical transaction record is carried out deletion action by operation button, it is of course also possible to be other operations, at this
Application embodiment is not restricted.
First acquisition unit 101 can also be the reception device arranged on notebook computer, and this reception device can pass through
Wired or wirelessly receive the operational order of user, such as can be received with audible by audio interface, pass through
USB interface receives, and is received by NFC mode, is received by bluetooth approach, is received by arbitrary forms such as optical transport mode receptions
Operational order.Receive operational order by receiving device, and described operational order is sent to software token.
In the embodiment of the present application two, second obtains unit 102 is used for:
Respond described operation, obtain seed file from other electronic equipments being connected with described electronic equipment;Or
Respond described operation, from the memory element of described electronic equipment, obtain seed file.
In specific implementation process, continue to use above-mentioned example, second obtain unit 102 be specifically as follows in notebook computer with
The data acquisition module that software token connects, for from other electronic equipments described, such as server, the official website number of bank of bank
According to storehouse etc., obtain the seed file for generating password;Or directly from the storage list that the software token of notebook computer is corresponding
Unit obtains the seed file prestored.Certainly, the second acquisition unit 102 can also be other independent modules, at this
Application embodiment is not restricted.
In the embodiment of the present application two, password generation unit 103 is used for:
Based on described seed file and described standard time, utilize SM3 algorithm, generate password;Or
Based on described seed file and described standard time, utilize HMAC-SHA1 algorithm, generate password.
In specific implementation process, continuing to use above-mentioned example, described password generation unit 103 can be specifically software token
Processor.When processor obtains seed file and after the standard time, just based on the algorithm prestored in processor, generate password.?
In the embodiment of the present application, in order to ensure the effectiveness of password, the described standard time is to obtain from the equipment at country time service center
Time.The algorithm prestored in processor can be specifically SM3 algorithm, HMAC-SHA1 algorithm, it is of course also possible to be that other are calculated
Method, is not restricted.
In order to improve safety, prevent other people to be traded by ripping software token, when software token by generate password with
Before the server of bank is authenticated, the processor of software token can also be concluded the business in the display screen display of notebook computer
Information, as trading object and dealing money are exported in display screen, when user's confirmation is errorless, and confirmed by button or
After person's voice mode or other wireless modes confirm, software token and bank server just can complete this process of exchange.
By the one or more technical schemes in the embodiment of the present application, it is possible to achieve following one or more technology are imitated
Really:
Due to the technical scheme in the embodiment of the present application, detection is used to obtain the operation for generating password;Response is described
Operation, it is thus achieved that seed file and obtain the standard time from another electronic equipment being connected with described electronic equipment;Based on described kind
Subfile and described standard time, generate the technological means of password, so, be other electronics owing to being used for generating the time of password
Standard time in equipment, as the standard time in server or country time service center standard time, even if thus electronics
System time in equipment is modified, and its password generated also will not change with the change of system time, thus ensure that
The accuracy of the time during password generation, efficiently solves the method existence generating password based on the time of the prior art
The technical problem of the effectiveness of password cannot be ensured, it is achieved improve the technique effect of the effectiveness of the password that token produces.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the reality in terms of the present invention can use complete hardware embodiment, complete software implementation or combine software and hardware
Execute the form of example.And, the present invention can use at one or more computers wherein including computer usable program code
The upper computer program product implemented of usable storage medium (including but not limited to disk memory, CD-ROM, optical memory etc.)
The form of product.
The present invention is with reference to method, equipment (system) and the flow process of computer program according to embodiments of the present invention
Figure and/or block diagram describe.It should be understood that can the most first-class by computer program instructions flowchart and/or block diagram
Flow process in journey and/or square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
Instruction arrives the processor of general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce
A raw machine so that the instruction performed by the processor of computer or other programmable data processing device is produced for real
The device of the function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame now.
These computer program instructions may be alternatively stored in and computer or other programmable data processing device can be guided with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in this computer-readable memory produces and includes referring to
Make the manufacture of device, this command device realize at one flow process of flow chart or multiple flow process and/or one square frame of block diagram or
The function specified in multiple square frames.
These computer program instructions also can be loaded in computer or other programmable data processing device so that at meter
Perform sequence of operations step on calculation machine or other programmable devices to produce computer implemented process, thus at computer or
The instruction performed on other programmable devices provides for realizing at one flow process of flow chart or multiple flow process and/or block diagram one
The step of the function specified in individual square frame or multiple square frame.
Specifically, the computer program instructions that the method for generating cipher code in the embodiment of the present application is corresponding can be stored in
CD, hard disk, on the storage medium such as USB flash disk, when the computer program instructions quilt corresponding with method for generating cipher code in storage medium
When one electronic equipment reads or is performed, comprise the steps:
Detection obtains the operation for generating password;
Respond described operation, it is thus achieved that seed file and obtain standard from another electronic equipment being connected with described electronic equipment
Time;
Based on described seed file and described standard time, generate password.
Optionally, store in described storage medium and step: detection obtains the operation for generating password, corresponding meter
Calculation machine programmed instruction when executed, including:
Detection obtains the delivery operation for paying an incomplete transaction;Or
Detection acquisition performs operation for execution one autoexec.
Optionally, in described storage medium storage and step: respond described operation, it is thus achieved that seed file, corresponding meter
Calculation machine programmed instruction when executed, including:
Respond described operation, obtain seed file from other electronic equipments being connected with described electronic equipment;Or
Respond described operation, from the memory element of described electronic equipment, obtain seed file.
Optionally, in described storage medium storage and step: based on described seed file and standard time, generate close
Code, corresponding computer program instructions when executed, including:
Based on described seed file and described standard time, utilize SM3 algorithm, generate password;Or
Based on described seed file and described standard time, utilize HMAC-SHA1 algorithm, generate password.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation
Property concept, then can make other change and amendment to these embodiments.So, claims are intended to be construed to include excellent
Select embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and the modification essence without deviating from the present invention to the present invention
God and scope.So, if these amendments of the present invention and modification belong to the scope of the claims in the present invention and equivalent technologies thereof
Within, then the present invention is also intended to comprise these change and modification.
Claims (10)
1. a method for generating cipher code, is applied in electronic equipment, it is characterised in that described method includes:
Detection obtains the operation for generating password;
Respond described operation, it is thus achieved that seed file and when another electronic equipment being connected with described electronic equipment obtains standard
Between;
Based on described seed file and described standard time, generate password.
2. the method for claim 1, it is characterised in that described detection obtains the operation for generating password, including:
Detection obtains the delivery operation for paying an incomplete transaction;Or
Detection acquisition performs operation for execution one autoexec.
3. method as claimed in claim 2, it is characterised in that the described operation of described response, it is thus achieved that seed file, including:
Respond described operation, obtain seed file from other electronic equipments being connected with described electronic equipment;Or
Respond described operation, from the memory element of described electronic equipment, obtain seed file.
4. method as claimed in claim 3, it is characterised in that described based on described seed file and standard time, generates close
Code, including:
Based on described seed file and described standard time, utilize SM3 algorithm, generate password;Or
Based on described seed file and described standard time, utilize HMAC-SHA1 algorithm, generate password.
5. the method as according to any one of claim 1-4, it is characterised in that the described standard time is from country time service center
The time obtained or described standard time are the time obtained from the server with time service function.
6. an electronic equipment, it is characterised in that including:
First obtains unit, for detecting acquisition for the operation generating password;
Second obtain unit, be used for responding described operation, it is thus achieved that seed file and from be connected with described electronic equipment another electricity
Subset obtains the standard time;
Password generation unit, for based on described seed file and described standard time, generates password.
7. electronic equipment as claimed in claim 6, it is characterised in that described first obtains unit is used for:
Detection obtains the delivery operation for paying an incomplete transaction;Or
Detection acquisition performs operation for execution one autoexec.
8. electronic equipment as claimed in claim 7, it is characterised in that described second obtains unit is used for:
Respond described operation, obtain seed file from other electronic equipments being connected with described electronic equipment;Or
Respond described operation, from the memory element of described electronic equipment, obtain seed file.
9. electronic equipment as claimed in claim 8, it is characterised in that described password generation unit is used for:
Based on described seed file and described standard time, utilize SM3 algorithm, generate password;Or
Based on described seed file and described standard time, utilize HMAC-SHA1 algorithm, generate password.
10. the electronic equipment as according to any one of claim 6-9, it is characterised in that the described standard time is for award from country
Time or described standard time that Shi Zhongxin obtains are the time obtained from the server with time service function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610720157.0A CN106327194A (en) | 2016-08-24 | 2016-08-24 | Password generation method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610720157.0A CN106327194A (en) | 2016-08-24 | 2016-08-24 | Password generation method and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106327194A true CN106327194A (en) | 2017-01-11 |
Family
ID=57790247
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610720157.0A Pending CN106327194A (en) | 2016-08-24 | 2016-08-24 | Password generation method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106327194A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107733643A (en) * | 2017-10-16 | 2018-02-23 | 中国银行股份有限公司 | A kind of method and terminal of password generation |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101432980A (en) * | 2006-05-01 | 2009-05-13 | 未来科技株式会社 | Time sync-type otp generation device and method for mobile phones |
CN102202300A (en) * | 2011-06-14 | 2011-09-28 | 上海众人网络安全技术有限公司 | System and method for dynamic password authentication based on dual channels |
CN103152172A (en) * | 2011-12-07 | 2013-06-12 | 中国电信股份有限公司 | Method and client side and server and system for mobile token dynamic password generation |
CN104869124A (en) * | 2015-06-05 | 2015-08-26 | 飞天诚信科技股份有限公司 | Authentication method based on geographic position information |
CN105656635A (en) * | 2016-03-04 | 2016-06-08 | 赫季芬 | Dynamic password generation method and device and authentication method and system |
-
2016
- 2016-08-24 CN CN201610720157.0A patent/CN106327194A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101432980A (en) * | 2006-05-01 | 2009-05-13 | 未来科技株式会社 | Time sync-type otp generation device and method for mobile phones |
CN102202300A (en) * | 2011-06-14 | 2011-09-28 | 上海众人网络安全技术有限公司 | System and method for dynamic password authentication based on dual channels |
CN103152172A (en) * | 2011-12-07 | 2013-06-12 | 中国电信股份有限公司 | Method and client side and server and system for mobile token dynamic password generation |
CN104869124A (en) * | 2015-06-05 | 2015-08-26 | 飞天诚信科技股份有限公司 | Authentication method based on geographic position information |
CN105656635A (en) * | 2016-03-04 | 2016-06-08 | 赫季芬 | Dynamic password generation method and device and authentication method and system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107733643A (en) * | 2017-10-16 | 2018-02-23 | 中国银行股份有限公司 | A kind of method and terminal of password generation |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102242218B1 (en) | User authentication method and apparatus, and wearable device registration method and apparatus | |
CN204948095U (en) | Authenticate device and the mutual system guaranteeing between application program and user | |
US10045210B2 (en) | Method, server and system for authentication of a person | |
EP3230917B1 (en) | System and method for enabling secure authentication | |
KR20160042865A (en) | System and method for initially establishing and periodically confirming trust in a software application | |
JP2018507586A (en) | Method and apparatus for securing mobile applications | |
US20160127134A1 (en) | User authentication system and method | |
CN106533687A (en) | Identity authentication method and device | |
CN103929307A (en) | Password input method, intelligent secret key device and client device | |
CN106716957A (en) | Efficient and reliable attestation | |
KR101070727B1 (en) | System and method for performing user authentication using coordinate region and password | |
KR101416542B1 (en) | Method for Apparatus for managing passcode | |
US20150067799A1 (en) | Electronic password generating method, electronic password generating apparatus and electronic password authentication system | |
US20170076285A1 (en) | Payment Method and Apparatus and Payment Factor Processing Method and Apparatus | |
CN103905188A (en) | Method for generating dynamic password through intelligent secret key device, and intelligent secret key device | |
CN106656993B (en) | Dynamic verification code verification method and device | |
TWI715833B (en) | Air card issuing method, device, computing equipment, computer readable storage medium and computer program product | |
CN105591746B (en) | A kind of processing method and processing system of online binding accepting terminal | |
EP2908262B1 (en) | Security Token, Transaction Execution Method, and Computer Program Product | |
US8910260B2 (en) | System and method for real time secure image based key generation using partial polygons assembled into a master composite image | |
JP6059788B2 (en) | Network authentication method using card device | |
KR20180001455A (en) | Mobile device of authenticating a purchase transaction and method there-of | |
US20160350753A1 (en) | Unpredictable number generation | |
KR101459283B1 (en) | 2 Channel authentication device and method | |
EP2916509B1 (en) | Network authentication method for secure user identity verification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 100093 Haidian District, Haidian District, Beijing, No. 23, No. 2, No. 1001 Applicant after: Beijing Xin'an century Polytron Technologies Inc Address before: 100052 Beijing city Haidian District Bei wa Lu Xi Li No. 21 block A No. 8246 Applicant before: Beijing Infosec Technologies Co.,Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170111 |