CN106327194A - Password generation method and electronic equipment - Google Patents

Password generation method and electronic equipment Download PDF

Info

Publication number
CN106327194A
CN106327194A CN201610720157.0A CN201610720157A CN106327194A CN 106327194 A CN106327194 A CN 106327194A CN 201610720157 A CN201610720157 A CN 201610720157A CN 106327194 A CN106327194 A CN 106327194A
Authority
CN
China
Prior art keywords
password
electronic equipment
seed file
time
standard time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610720157.0A
Other languages
Chinese (zh)
Inventor
赵剑竹
张庆勇
岳向前
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Infosec Technologies Co Ltd
Original Assignee
Beijing Infosec Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Infosec Technologies Co Ltd filed Critical Beijing Infosec Technologies Co Ltd
Priority to CN201610720157.0A priority Critical patent/CN106327194A/en
Publication of CN106327194A publication Critical patent/CN106327194A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a password generation method and electronic equipment. The method is applied to the electronic equipment. The method comprises the steps that operation used for generating passwords is acquired through detection; the operation is responded, a seed file is acquired and standard time is acquired from another set of electronic equipment connected with the electronic equipment; and the passwords are generated based on the seed file and the standard time. The technical problems in the prior art that the time-based password generation method cannot guarantee the effectiveness of the passwords can be solved so that the technical effect of enhancing the effectiveness of the passwords generated by tokens can be realized.

Description

A kind of method for generating cipher code and electronic equipment
Technical field
The present invention relates to electronic technology field, particularly to a kind of method for generating cipher code and electronic equipment.
Background technology
Along with the continuous progress of science and technology, the Internet and finance informationalizing technology have also been obtained fast development, on the net The advantages such as bank is convenient with it, efficient rapidly be the generally high praise of user and bank's industry.Bank and various electronic business Business website, in order to overcome the safety defect of authentication mode based on static password, have employed dynamic password token or dynamic mouth mostly Order card carrys out the safety of Strengthens network authentication.
Dynamic-password technique is also called one-time password (One Time Password is called for short OTP) technology, is characterized in The display digit of the dynamic password token that user provides according to service provider inputs electronic cipher, and dynamic-password technique is according to close The difference of code generating mode, can be divided into time-based dynamic-password technique, dynamic-password technique based on event and base Dynamic-password technique in challenge/response.
When using time-based dynamic-password technique to generate password, first have to obtain seed file, then obtain behaviour Make the local zone time of system, finally according to default password generating algorithm, generate password based on seed file and local zone time, and The password transmission of generation is authenticated to server.
Due in the method generating password based on the time of the prior art, when the time of acquisition is operating system local Between, and the time of system can arbitrarily change, as hacker attacks revises system time etc., thus, when basis based on operating system The password that token time corresponding is not produced by the ground time with server time is the most invalid.
Visible, there is the technology of the effectiveness that cannot ensure password in method based on time generation password of the prior art Problem.
Summary of the invention
The embodiment of the present invention provides a kind of method for generating cipher code and electronic equipment, be used for solving of the prior art based on time Between generate the method for password and there is the technical problem of effectiveness that cannot ensure password, it is achieved improve having of the password that token produces The technique effect of effect property.
On the one hand the embodiment of the present application provides a kind of method for generating cipher code, is applied in electronic equipment, and described method includes:
Detection obtains the operation for generating password;
Respond described operation, it is thus achieved that seed file and obtain standard from another electronic equipment being connected with described electronic equipment Time;
Based on described seed file and described standard time, generate password.
Optionally, described detection obtains the operation for generating password, including:
Detection obtains the delivery operation for paying an incomplete transaction;Or
Detection acquisition performs operation for execution one autoexec.
Optionally, the described operation of described response, it is thus achieved that seed file, including:
Respond described operation, obtain seed file from other electronic equipments being connected with described electronic equipment;Or
Respond described operation, from the memory element of described electronic equipment, obtain seed file.
Optionally, described based on described seed file and standard time, generate password, including:
Based on described seed file and described standard time, utilize SM3 algorithm, generate password;Or
Based on described seed file and described standard time, utilize HMAC-SHA1 algorithm, generate password.
Optionally, the described standard time is that the time obtained from country time service center or described standard time are for awarding from having The time obtained on the server of Shi Gongneng.
On the other hand the embodiment of the present application provides a kind of electronic equipment, including:
First obtains unit, for detecting acquisition for the operation generating password;
Second obtains unit, is used for responding described operation, it is thus achieved that seed file and from another with what described electronic equipment was connected One electronic equipment obtains the standard time;
Password generation unit, for based on described seed file and described standard time, generates password.
Optionally, described first acquisition unit is used for:
Detection obtains the delivery operation for paying an incomplete transaction;Or
Detection acquisition performs operation for execution one autoexec.
Optionally, described second acquisition unit is used for:
Respond described operation, obtain seed file from other electronic equipments being connected with described electronic equipment;Or
Respond described operation, from the memory element of described electronic equipment, obtain seed file.
Optionally, described password generation unit is used for:
Based on described seed file and described standard time, utilize SM3 algorithm, generate password;Or
Based on described seed file and described standard time, utilize HMAC-SHA1 algorithm, generate password.
Optionally, the described standard time is that the time obtained from country time service center or described standard time are for awarding from having The time obtained on the server of Shi Gongneng.
Said one in the embodiment of the present application or multiple technical scheme, at least have following one or more technology effect Really:
Due to the technical scheme in the embodiment of the present application, detection is used to obtain the operation for generating password;Response is described Operation, it is thus achieved that seed file and obtain the standard time from another electronic equipment being connected with described electronic equipment;Based on described kind Subfile and described standard time, generate the technological means of password, so, be other electronics owing to being used for generating the time of password Standard time in equipment, as the standard time in server or country time service center standard time, even if thus electronics System time in equipment is modified, and its password generated also will not change with the change of system time, thus ensure that The accuracy of the time during password generation, efficiently solves the method existence generating password based on the time of the prior art The technical problem of the effectiveness of password cannot be ensured, it is achieved improve the technique effect of the effectiveness of the password that token produces.
Accompanying drawing explanation
The flow chart of the Fig. 1 a kind of method for generating cipher code for providing in the embodiment of the present application one;
The structured flowchart of the Fig. 2 a kind of electronic equipment for providing in the embodiment of the present application two.
Detailed description of the invention
The embodiment of the present invention provides a kind of method for generating cipher code and electronic equipment, be used for solving of the prior art based on time Between generate the method for password and there is the technical problem of effectiveness that cannot ensure password, it is achieved improve having of the password that token produces The technique effect of effect property.
Technical scheme in the embodiment of the present invention is to solve above-mentioned technical problem, and general thought is as follows:
A kind of method for generating cipher code, is applied in electronic equipment, and described method includes:
Detection obtains the operation for generating password;
Respond described operation, it is thus achieved that seed file and obtain standard from another electronic equipment being connected with described electronic equipment Time;
Based on described seed file and described standard time, generate password.
In technique scheme, detection is used to obtain the operation for generating password;Respond described operation, it is thus achieved that seed File and obtain the standard time from another electronic equipment being connected with described electronic equipment;Based on described seed file and described mark Between Zhun Shi, generate the technological means of password, so, due to for generate time of password be the standard in other electronic equipments time Between, such as the standard time in server or the standard time at country time service center, even if thus during system in electronic equipment Between be modified, its generate password also will not change with the change of system time, thus ensure that password generate during The accuracy of time, efficiently solve and of the prior art generate the method for password based on the time and exist and cannot ensure password The technical problem of effectiveness, it is achieved improve the technique effect of the effectiveness of the password that token produces.
Below in conjunction with the accompanying drawings the main of the embodiment of the present application technical scheme is realized principle, detailed description of the invention and correspondence thereof The beneficial effect that can reach is explained in detail.
Embodiment one
Refer to Fig. 1, the flow chart of a kind of method for generating cipher code for providing in the embodiment of the present application one, described method bag Include:
S101: detection obtains the operation for generating password;
S102: respond described operation, it is thus achieved that seed file and obtaining from another electronic equipment being connected with described electronic equipment Obtain the standard time;
S103: based on described seed file and described standard time, generates password.
In the prior art, dynamic password token mainly has a two ways: hardware token or software token.Both are giving birth to Become principle during password identical, but, in terms of the adjustment of time factor required when to generation password, both are entirely different: In hardware token, itself is configured with clock, once clock setting well after, the time of hardware token just will not change. When needing the time of synchronous token time and server, it is the time utilizing the time in hardware token to remove to adjust server, So that the time of the time of server and token is close;And the process of its time of software token adjustment is complete with hardware token On the contrary, i.e. be to utilize local system time or server time to go to adjust the time in software token, in software token time Between can change, when not having extraneous the intervention, local system time or server time are constant.
In specific implementation process, described method for generating cipher code is applied in the software token of electronic equipment, described electronics Equipment can be specifically smart mobile phone, notebook computer or other be provided with the electronic equipment of software token, here, just Differ and one schematically illustrate.Software token may operate in general operating system, it is also possible to is integrated in telnet client end Together, convenient use.In the embodiment of the present application, the software leaves will applied in notebook computer with described method for generating cipher code As a example by board, the method in the embodiment of the present application is described in detail.
When method in using the embodiment of the present application carries out password generation, step S101 is first carried out, it may be assumed that detection obtains For generating the operation of password.
In the embodiment of the present application, the specific implementation of step S101 is as follows:
Detection obtains the delivery operation for paying an incomplete transaction;Or
Detection acquisition performs operation for execution one autoexec.
In specific implementation process, apply in the software token in notebook computer with described method for generating cipher code and be Example, software token can one of in the following way obtain delivery operation or perform operation:
First kind of way:
Notebook computer is provided with operation button, as paid button or historical transaction record etc. being deleted Button, confirms to pay transaction when user presses payment button, or user presses delete button and confirms historical trading When record is deleted, the software token in notebook computer will obtain aforesaid operations instruction.Memorizer at notebook computer In can prestore that some relate to the operation of private information of user, such as transactional operation, the operation etc. of deleting history transaction record, when After notebook computer detects aforesaid operations by button, just mate with the operation prestored in memorizer, it is judged that currently use Whether the operation at family is predetermined registration operation, if, it is determined that current operation is the operation needing to generate password, is just sent out by current operation Deliver in software token, so that software token obtains the operation for generating password.Obtained by button be used for generating close The operation of code, has isolated the threat of trojan horse program etc. from hardware, has improve safety.
The second way:
Being provided with reception device on notebook computer, this reception device can pass through wired or wirelessly receive The operational order of user, such as, can be received with audible by audio interface, be received by USB interface, by NFC mode Receive, received by bluetooth approach, receive operational order by arbitrary forms such as optical transport mode receptions.When detecting user's Voice, such as " Pay Bill ", then current speech operation is then sent to software token, so that software token obtains by notebook computer Take the operation for generating password.
After having performed step S101, the method in the embodiment of the present application just performs step S102, it may be assumed that response is described Operation, it is thus achieved that seed file and obtain the standard time from another electronic equipment being connected with described electronic equipment.
In the embodiment of the present application, the specific implementation of step S102 includes:
Respond described operation, obtain seed file from other electronic equipments being connected with described electronic equipment;Or
Respond described operation, from the memory element of described electronic equipment, obtain seed file.
In specific implementation process, continue to use above-mentioned example, after software token obtains the operation being used for generating password, software Token just from other electronic equipments described, such as server, the official website database of bank of bank, obtains for generating password Seed file;Or in the memory element of software token, storage has pre-set seed file, then software token is direct From memory element, obtain described seed file, it is of course also possible to there are other methods obtaining seed file, implement in the application Example is not restricted.
Described seed file is specially PRNG (PRNG) seed, and described seed is exactly the initial of PRNG Value.Same seed each run in the PRNG of same structure all can generate identical random number sequence.If it is not known that Seed, then the random number of generation can be described as being difficult to prediction.In general the seed length of software token 32 with On, issuing token when, server can generate a random seed, this seed can be simultaneously written server and In token software, it is also possible to only preserve in the server, then obtain from server when software token needs to generate password.When So, the generation of seed file can also be to be calculated, in the embodiment of the present application by default algorithm, such as AES-128 algorithm In be not restricted.
In the embodiment of the present application, in order to ensure the effectiveness of password, the described standard time is specially and sets with described electronics Standby another electronic equipment connected obtains, and e.g., the server with time service function relevant to software token obtains the time, or The time obtained from the equipment at country time service center.So, unconnected with system time for generating the time of password, from Change due to which kind of reason regardless of the notebook system time, for generate time of password all can with server in or The time at country time service center is consistent, thus ensure that the password every time generated in software token is all effective.
After having performed step S102, the method in the embodiment of the present application just performs step S103, it may be assumed that based on described Seed file and standard time, generate password.
In the embodiment of the present application, the specific implementation of step S103 includes:
Based on described seed file and described standard time, utilize SM3 algorithm, generate password;Or
Based on described seed file and described standard time, utilize HMAC-SHA1 algorithm, generate password.
In specific implementation process, continue to use above-mentioned example, after software token obtains standard time and seed file, software Token just carries out the computing of password generation based on the algorithm prestored, such as SM3 algorithm or HMAC-SHA1 algorithm.SM3 algorithm is to length Degree, less than the message for 2^64 position, through filling and Iteration Contraction, generates the Hash Value of a length of 256 bits, is password. HMAC-SHA1 algorithm utilizes hash algorithm, with seed file and standard time for input, generates a summary info as defeated Going out, described summary info is password, is not described in detail above-mentioned algorithm.Certainly, this area Technical staff can also use other algorithms to generate password, is not restricted.
In the embodiment of the present application, in order to improve safety, prevent other people to be traded by ripping software token, work as software leaves Before the server of the password of generation Yu bank is authenticated by board, software token can also obtain default prompting strategy, root According to prompting strategy prompting dynamic password.Concrete, software token can point out dynamic password in the following way:
The first: is at the display screen display dynamic password of notebook computer, to point out user dynamic password;Display is dynamically Password only has software token holder can check dynamic password, improves safety.
The second: utilize the instantaneous speech power in notebook computer, such as speaker or earphone, pass through speech play Mode point out user dynamic password.Speech play dynamic password makes to check that the people of dynamic password could be aware that dynamic mouth Order, convenient use.
It addition, in order to ensure that user may determine that whether this transaction is the true sale of user, generate dynamic in software token After state password, Transaction Information can also be sent to notebook computer by software token, so that notebook computer output transaction letter Breath.Only when user confirm Transaction Information correct or for user needed for true sale after, send and confirm that instruction is to software Token, otherwise sends and cancels instruction to software token.Thus, prevent user in the case of unwitting by other people in any way Obtain dynamic password, cause damage.
Such as, when software token obtains after dynamic password, this Transaction Information will be exported: trading object: Taobao, the amount of money For;99.Prompting Transaction Information can also use the arbitrary form such as display reminding or speech play prompting.When software token obtains After the confirmation of Transaction Information is operated by user, just the password transmission of generation is verified to server, thus complete this time to hand over Easily.
Embodiment two
Based on the inventive concept identical with the embodiment of the present application one, refer to Fig. 2, for what the embodiment of the present application two provided A kind of structured flowchart of electronic equipment, including:
First obtains unit 101, for detecting acquisition for the operation generating password;
Second obtains unit 102, is used for responding described operation, it is thus achieved that seed file and from being connected with described electronic equipment Another electronic equipment obtains the standard time;
Password generation unit 103, for based on described seed file and described standard time, generates password.
In specific implementation process, described electronic equipment can be specifically that other are provided with the electronic equipment of software token, As there is the smart mobile phone of software token or there is the notebook of software token, one schematically illustrate here, just differ.In the application In embodiment, will be to be described in detail as a example by the notebook with software token by described electronic equipment.
In the embodiment of the present application two, first obtains unit 101 is used for:
Detection obtains the delivery operation for paying an incomplete transaction;Or
Detection acquisition performs operation for execution one autoexec.
In specific implementation process, being as a example by the notebook with software token by described electronic equipment, first obtains list Unit 101 can be specifically the operation button arranged on notebook computer, and user confirms to pay transaction by operation button, Or user confirms historical transaction record is carried out deletion action by operation button, it is of course also possible to be other operations, at this Application embodiment is not restricted.
First acquisition unit 101 can also be the reception device arranged on notebook computer, and this reception device can pass through Wired or wirelessly receive the operational order of user, such as can be received with audible by audio interface, pass through USB interface receives, and is received by NFC mode, is received by bluetooth approach, is received by arbitrary forms such as optical transport mode receptions Operational order.Receive operational order by receiving device, and described operational order is sent to software token.
In the embodiment of the present application two, second obtains unit 102 is used for:
Respond described operation, obtain seed file from other electronic equipments being connected with described electronic equipment;Or
Respond described operation, from the memory element of described electronic equipment, obtain seed file.
In specific implementation process, continue to use above-mentioned example, second obtain unit 102 be specifically as follows in notebook computer with The data acquisition module that software token connects, for from other electronic equipments described, such as server, the official website number of bank of bank According to storehouse etc., obtain the seed file for generating password;Or directly from the storage list that the software token of notebook computer is corresponding Unit obtains the seed file prestored.Certainly, the second acquisition unit 102 can also be other independent modules, at this Application embodiment is not restricted.
In the embodiment of the present application two, password generation unit 103 is used for:
Based on described seed file and described standard time, utilize SM3 algorithm, generate password;Or
Based on described seed file and described standard time, utilize HMAC-SHA1 algorithm, generate password.
In specific implementation process, continuing to use above-mentioned example, described password generation unit 103 can be specifically software token Processor.When processor obtains seed file and after the standard time, just based on the algorithm prestored in processor, generate password.? In the embodiment of the present application, in order to ensure the effectiveness of password, the described standard time is to obtain from the equipment at country time service center Time.The algorithm prestored in processor can be specifically SM3 algorithm, HMAC-SHA1 algorithm, it is of course also possible to be that other are calculated Method, is not restricted.
In order to improve safety, prevent other people to be traded by ripping software token, when software token by generate password with Before the server of bank is authenticated, the processor of software token can also be concluded the business in the display screen display of notebook computer Information, as trading object and dealing money are exported in display screen, when user's confirmation is errorless, and confirmed by button or After person's voice mode or other wireless modes confirm, software token and bank server just can complete this process of exchange.
By the one or more technical schemes in the embodiment of the present application, it is possible to achieve following one or more technology are imitated Really:
Due to the technical scheme in the embodiment of the present application, detection is used to obtain the operation for generating password;Response is described Operation, it is thus achieved that seed file and obtain the standard time from another electronic equipment being connected with described electronic equipment;Based on described kind Subfile and described standard time, generate the technological means of password, so, be other electronics owing to being used for generating the time of password Standard time in equipment, as the standard time in server or country time service center standard time, even if thus electronics System time in equipment is modified, and its password generated also will not change with the change of system time, thus ensure that The accuracy of the time during password generation, efficiently solves the method existence generating password based on the time of the prior art The technical problem of the effectiveness of password cannot be ensured, it is achieved improve the technique effect of the effectiveness of the password that token produces.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or computer program Product.Therefore, the reality in terms of the present invention can use complete hardware embodiment, complete software implementation or combine software and hardware Execute the form of example.And, the present invention can use at one or more computers wherein including computer usable program code The upper computer program product implemented of usable storage medium (including but not limited to disk memory, CD-ROM, optical memory etc.) The form of product.
The present invention is with reference to method, equipment (system) and the flow process of computer program according to embodiments of the present invention Figure and/or block diagram describe.It should be understood that can the most first-class by computer program instructions flowchart and/or block diagram Flow process in journey and/or square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided Instruction arrives the processor of general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce A raw machine so that the instruction performed by the processor of computer or other programmable data processing device is produced for real The device of the function specified in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame now.
These computer program instructions may be alternatively stored in and computer or other programmable data processing device can be guided with spy Determine in the computer-readable memory that mode works so that the instruction being stored in this computer-readable memory produces and includes referring to Make the manufacture of device, this command device realize at one flow process of flow chart or multiple flow process and/or one square frame of block diagram or The function specified in multiple square frames.
These computer program instructions also can be loaded in computer or other programmable data processing device so that at meter Perform sequence of operations step on calculation machine or other programmable devices to produce computer implemented process, thus at computer or The instruction performed on other programmable devices provides for realizing at one flow process of flow chart or multiple flow process and/or block diagram one The step of the function specified in individual square frame or multiple square frame.
Specifically, the computer program instructions that the method for generating cipher code in the embodiment of the present application is corresponding can be stored in CD, hard disk, on the storage medium such as USB flash disk, when the computer program instructions quilt corresponding with method for generating cipher code in storage medium When one electronic equipment reads or is performed, comprise the steps:
Detection obtains the operation for generating password;
Respond described operation, it is thus achieved that seed file and obtain standard from another electronic equipment being connected with described electronic equipment Time;
Based on described seed file and described standard time, generate password.
Optionally, store in described storage medium and step: detection obtains the operation for generating password, corresponding meter Calculation machine programmed instruction when executed, including:
Detection obtains the delivery operation for paying an incomplete transaction;Or
Detection acquisition performs operation for execution one autoexec.
Optionally, in described storage medium storage and step: respond described operation, it is thus achieved that seed file, corresponding meter Calculation machine programmed instruction when executed, including:
Respond described operation, obtain seed file from other electronic equipments being connected with described electronic equipment;Or
Respond described operation, from the memory element of described electronic equipment, obtain seed file.
Optionally, in described storage medium storage and step: based on described seed file and standard time, generate close Code, corresponding computer program instructions when executed, including:
Based on described seed file and described standard time, utilize SM3 algorithm, generate password;Or
Based on described seed file and described standard time, utilize HMAC-SHA1 algorithm, generate password.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation Property concept, then can make other change and amendment to these embodiments.So, claims are intended to be construed to include excellent Select embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and the modification essence without deviating from the present invention to the present invention God and scope.So, if these amendments of the present invention and modification belong to the scope of the claims in the present invention and equivalent technologies thereof Within, then the present invention is also intended to comprise these change and modification.

Claims (10)

1. a method for generating cipher code, is applied in electronic equipment, it is characterised in that described method includes:
Detection obtains the operation for generating password;
Respond described operation, it is thus achieved that seed file and when another electronic equipment being connected with described electronic equipment obtains standard Between;
Based on described seed file and described standard time, generate password.
2. the method for claim 1, it is characterised in that described detection obtains the operation for generating password, including:
Detection obtains the delivery operation for paying an incomplete transaction;Or
Detection acquisition performs operation for execution one autoexec.
3. method as claimed in claim 2, it is characterised in that the described operation of described response, it is thus achieved that seed file, including:
Respond described operation, obtain seed file from other electronic equipments being connected with described electronic equipment;Or
Respond described operation, from the memory element of described electronic equipment, obtain seed file.
4. method as claimed in claim 3, it is characterised in that described based on described seed file and standard time, generates close Code, including:
Based on described seed file and described standard time, utilize SM3 algorithm, generate password;Or
Based on described seed file and described standard time, utilize HMAC-SHA1 algorithm, generate password.
5. the method as according to any one of claim 1-4, it is characterised in that the described standard time is from country time service center The time obtained or described standard time are the time obtained from the server with time service function.
6. an electronic equipment, it is characterised in that including:
First obtains unit, for detecting acquisition for the operation generating password;
Second obtain unit, be used for responding described operation, it is thus achieved that seed file and from be connected with described electronic equipment another electricity Subset obtains the standard time;
Password generation unit, for based on described seed file and described standard time, generates password.
7. electronic equipment as claimed in claim 6, it is characterised in that described first obtains unit is used for:
Detection obtains the delivery operation for paying an incomplete transaction;Or
Detection acquisition performs operation for execution one autoexec.
8. electronic equipment as claimed in claim 7, it is characterised in that described second obtains unit is used for:
Respond described operation, obtain seed file from other electronic equipments being connected with described electronic equipment;Or
Respond described operation, from the memory element of described electronic equipment, obtain seed file.
9. electronic equipment as claimed in claim 8, it is characterised in that described password generation unit is used for:
Based on described seed file and described standard time, utilize SM3 algorithm, generate password;Or
Based on described seed file and described standard time, utilize HMAC-SHA1 algorithm, generate password.
10. the electronic equipment as according to any one of claim 6-9, it is characterised in that the described standard time is for award from country Time or described standard time that Shi Zhongxin obtains are the time obtained from the server with time service function.
CN201610720157.0A 2016-08-24 2016-08-24 Password generation method and electronic equipment Pending CN106327194A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610720157.0A CN106327194A (en) 2016-08-24 2016-08-24 Password generation method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610720157.0A CN106327194A (en) 2016-08-24 2016-08-24 Password generation method and electronic equipment

Publications (1)

Publication Number Publication Date
CN106327194A true CN106327194A (en) 2017-01-11

Family

ID=57790247

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610720157.0A Pending CN106327194A (en) 2016-08-24 2016-08-24 Password generation method and electronic equipment

Country Status (1)

Country Link
CN (1) CN106327194A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733643A (en) * 2017-10-16 2018-02-23 中国银行股份有限公司 A kind of method and terminal of password generation

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101432980A (en) * 2006-05-01 2009-05-13 未来科技株式会社 Time sync-type otp generation device and method for mobile phones
CN102202300A (en) * 2011-06-14 2011-09-28 上海众人网络安全技术有限公司 System and method for dynamic password authentication based on dual channels
CN103152172A (en) * 2011-12-07 2013-06-12 中国电信股份有限公司 Method and client side and server and system for mobile token dynamic password generation
CN104869124A (en) * 2015-06-05 2015-08-26 飞天诚信科技股份有限公司 Authentication method based on geographic position information
CN105656635A (en) * 2016-03-04 2016-06-08 赫季芬 Dynamic password generation method and device and authentication method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101432980A (en) * 2006-05-01 2009-05-13 未来科技株式会社 Time sync-type otp generation device and method for mobile phones
CN102202300A (en) * 2011-06-14 2011-09-28 上海众人网络安全技术有限公司 System and method for dynamic password authentication based on dual channels
CN103152172A (en) * 2011-12-07 2013-06-12 中国电信股份有限公司 Method and client side and server and system for mobile token dynamic password generation
CN104869124A (en) * 2015-06-05 2015-08-26 飞天诚信科技股份有限公司 Authentication method based on geographic position information
CN105656635A (en) * 2016-03-04 2016-06-08 赫季芬 Dynamic password generation method and device and authentication method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733643A (en) * 2017-10-16 2018-02-23 中国银行股份有限公司 A kind of method and terminal of password generation

Similar Documents

Publication Publication Date Title
KR102242218B1 (en) User authentication method and apparatus, and wearable device registration method and apparatus
CN204948095U (en) Authenticate device and the mutual system guaranteeing between application program and user
US10045210B2 (en) Method, server and system for authentication of a person
EP3230917B1 (en) System and method for enabling secure authentication
KR20160042865A (en) System and method for initially establishing and periodically confirming trust in a software application
JP2018507586A (en) Method and apparatus for securing mobile applications
US20160127134A1 (en) User authentication system and method
CN106533687A (en) Identity authentication method and device
CN103929307A (en) Password input method, intelligent secret key device and client device
CN106716957A (en) Efficient and reliable attestation
KR101070727B1 (en) System and method for performing user authentication using coordinate region and password
KR101416542B1 (en) Method for Apparatus for managing passcode
US20150067799A1 (en) Electronic password generating method, electronic password generating apparatus and electronic password authentication system
US20170076285A1 (en) Payment Method and Apparatus and Payment Factor Processing Method and Apparatus
CN103905188A (en) Method for generating dynamic password through intelligent secret key device, and intelligent secret key device
CN106656993B (en) Dynamic verification code verification method and device
TWI715833B (en) Air card issuing method, device, computing equipment, computer readable storage medium and computer program product
CN105591746B (en) A kind of processing method and processing system of online binding accepting terminal
EP2908262B1 (en) Security Token, Transaction Execution Method, and Computer Program Product
US8910260B2 (en) System and method for real time secure image based key generation using partial polygons assembled into a master composite image
JP6059788B2 (en) Network authentication method using card device
KR20180001455A (en) Mobile device of authenticating a purchase transaction and method there-of
US20160350753A1 (en) Unpredictable number generation
KR101459283B1 (en) 2 Channel authentication device and method
EP2916509B1 (en) Network authentication method for secure user identity verification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100093 Haidian District, Haidian District, Beijing, No. 23, No. 2, No. 1001

Applicant after: Beijing Xin'an century Polytron Technologies Inc

Address before: 100052 Beijing city Haidian District Bei wa Lu Xi Li No. 21 block A No. 8246

Applicant before: Beijing Infosec Technologies Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170111