CN202978979U - Password security keypad device and password security pad system - Google Patents

Password security keypad device and password security pad system Download PDF

Info

Publication number
CN202978979U
CN202978979U CN 201220688994 CN201220688994U CN202978979U CN 202978979 U CN202978979 U CN 202978979U CN 201220688994 CN201220688994 CN 201220688994 CN 201220688994 U CN201220688994 U CN 201220688994U CN 202978979 U CN202978979 U CN 202978979U
Authority
CN
China
Prior art keywords
transaction processing
identifying code
user
cryptosecurity
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN 201220688994
Other languages
Chinese (zh)
Inventor
耿玉波
石玉军
赵宇
赵于凡
朱江
张颖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN 201220688994 priority Critical patent/CN202978979U/en
Application granted granted Critical
Publication of CN202978979U publication Critical patent/CN202978979U/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The utility model relates to a password security keypad device and a password security keypad system. The device comprises a central processing unit, a communication encryption/decryption chip, a liquid crystal display, a key set, a loudspeaker, a memory and an encoding chip, wherein the communication encryption/decryption chip, the liquid crystal display, the key set, the loudspeaker, the memory and the encoding chip are connected with the central processing unit. The communication encryption/decryption chip is used for receiving password input request information and encrypted online transaction processing verification codes and decrypting the encrypted online transaction processing verification codes. The liquid crystal display is used for displaying prompt information and information inputted by a user. The key set is used for receiving information including user passwords and password confirmation information and inputted by the user. The loudspeaker is used for playing voice information. The memory is used for saving the password input request information, the online transaction processing verification codes, the prompt information and the information including the user passwords and inputted by the user. The encoding chip is used for splicing or merging the user passwords and the verification codes to generate a password string. Therefore, password and cipher text secure transmission between a password keypad and a background processing system is achieved.

Description

A kind of cryptosecurity key board unit and system
Technical field
The utility model relates to the Security Data Transmission technical field, and particularly code keypad and utilize code keypad to carry out the technology of Transaction Processing, be a kind of cryptosecurity key board unit and system specifically.
Background technology
In daily life, often need the identifying user identities such as user's password, so that according to this user identity and authority, carry out subsequent transaction.For example, in gate control system, may need the user to input user cipher by code keypad, be used for the online validation user identity, and carry out subsequent treatment according to the result.In addition, increasing people selects bankcard consumption, in the bankcard consumption process, also needs the user to input user cipher by code keypad, thus identifying user identity, and carry out accordingly follow-up Transaction Processing.
In the prior art, use cipher mode to carry out the user cipher transmission between code keypad and background processing system.Yet the cryptographic attack person might intercept the user cipher message transmission in whole transmission channel.For example, when the user uses gate control system, according to the normal running flow process, input user cipher by code keypad, and be committed to background processing system, background processing system is identified user identity according to user cipher, judge this user right, allow accordingly the user to enter or refusing user's enters.In code keypad and background processing system communication process, the assailant may intercept the cipher text that the user inputs, and meanwhile, user this time transaction still can normally carry out, in the unwitting situation of user, the assailant has kept a user cipher message like this.Although the user cipher message is ciphertext, the assailant possibly can't be known user cipher expressly, but still can be after the user leaves, by retransmitting the mode of user cipher message, the forgery user's business is processed, and this forgery user profile of backstage treatment system None-identified, this will threaten to system safety.
Therefore, although user cipher is the ciphertext transmission between code keypad and background processing system, the assailant can't effectively identify the original user password, but still can directly utilize the user cipher ciphertext, retransmit this user cipher ciphertext under improper authorization conditions, the forgery user's business is processed, and threatens whole system safety.
The utility model content
The utility model provides a kind of cryptosecurity key board unit and system, to solve the safe transmission problem of password ciphertext between code keypad and background processing system.
One of the purpose of this utility model is, a kind of cryptosecurity key board unit is provided, this cryptosecurity key board unit comprises: central processing unit, and be connected with central processing unit, communication enciphering/deciphering chip, be used for receiving the outside Password Input solicited message of sending and the Transaction Processing identifying code of encryption, the Transaction Processing identifying code of encrypting is decrypted; Liquid crystal display screen is used for showing the information of Transaction Processing process and the information of user's input; Key groups, what be used for to receive user's input comprises user cipher and password confirming information in interior information; Loud speaker is for the voice messaging of playing the Transaction Processing process; Memory, what be used for storage Password Input solicited message, Transaction Processing identifying code, information and user's input comprises user cipher in interior information; Coding chip is used for user cipher and Transaction Processing identifying code are spliced or merge processing generating cipher string; Communication enciphering/deciphering chip also is used for password string is encrypted processing, generates the encrypted result ciphertext, and sends encrypted result ciphertext and password confirming information to the outside.
Coding chip also is used for user cipher and the local Transaction Processing identifying code that generates are spliced or merge processing generating cipher string.
The cryptosecurity key board unit also comprises: USB interface, USB interface are connected with communication enciphering/deciphering chip with central processing unit respectively.
One of the purpose of this utility model is, a kind of cryptosecurity keyboard system is provided, and this cryptosecurity keyboard system comprises: core business processing server, front station terminal and cryptosecurity key board unit; The core business processing server is connected with front station terminal by internal network, and front station terminal is connected with the cryptosecurity key board unit by serial ports; The core business processing server is used for generating the Transaction Processing identifying code, and station terminal sends the Transaction Processing identifying code of encrypting forward, and receives the encrypted result ciphertext of foreground terminal feedback; Front station terminal, the Transaction Processing identifying code that is used for the encryption that will receive is transmitted to the cryptosecurity key board unit, and the encrypted result ciphertext that the cryptosecurity key board unit is sent is transmitted to described core business processing server; The cryptosecurity key board unit comprises: central processing unit, and be connected with central processing unit, communication enciphering/deciphering chip, the Password Input solicited message that before being used for receiving, station terminal is sent and the Transaction Processing identifying code of encryption are decrypted the Transaction Processing identifying code of encrypting; Liquid crystal display screen is used for showing the information of Transaction Processing process and the information of user's input; Key groups, what be used for to receive user's input comprises user cipher and password confirming information in interior information; Loud speaker is for the voice messaging of playing the Transaction Processing process; Memory, what be used for storage Password Input solicited message, Transaction Processing identifying code, information and user's input comprises user cipher in interior information; Coding chip is used for user cipher and Transaction Processing identifying code are spliced or merge processing generating cipher string; Communication enciphering/deciphering chip also is used for password string is encrypted processing, generate the encrypted result ciphertext, and station terminal sends encrypted result ciphertext and password confirming information forward.
The beneficial effects of the utility model are: by code keypad and system's Transaction Processing flow process; the any user cipher input of unique identification; user cipher and this time Transaction Processing identifying code are bound and encrypted; guarantee that the user inputs password and only is used for this time Transaction Processing; prevent that effectively the assailant from intercepting user cipher and forging user's Transaction Processing, protection user cipher and user identity safety.
Description of drawings
In order to be illustrated more clearly in the utility model embodiment or technical scheme of the prior art, the below will do to introduce simply to the accompanying drawing of required use in embodiment or description of the Prior Art, apparently, accompanying drawing in the following describes is only embodiment more of the present utility model, for those skilled in the art, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the circuit theory diagrams of the cryptosecurity key board unit of the utility model embodiment;
Fig. 2 is the annexation schematic diagram of the cryptosecurity keyboard system of the utility model embodiment;
Fig. 3 is the business processing flow figure of the cryptosecurity keyboard system of the utility model embodiment;
Fig. 4 is that flow chart is confirmed in the cryptosecurity keyboard system Transaction Processing request of the utility model embodiment;
Fig. 5 is the cryptosecurity keyboard system code keypad process chart of the utility model embodiment;
Fig. 6 is the cryptosecurity keyboard Transaction Processing flow chart of the utility model embodiment;
Fig. 7 is the cryptosecurity keyboard process chart of the utility model embodiment.
Embodiment
Below in conjunction with the accompanying drawing in the utility model embodiment, the technical scheme in the utility model embodiment is clearly and completely described, obviously, described embodiment is only the utility model part embodiment, rather than whole embodiment.Based on the embodiment in the utility model, those of ordinary skills are not making the every other embodiment that obtains under the creative work prerequisite, all belong to the scope of the utility model protection.
As shown in Figure 1, the cryptosecurity key board unit of the present embodiment comprises: central processing unit 101, and be connected with central processing unit 101, communication enciphering/deciphering chip 102, be used for receiving the outside Password Input solicited message of sending and the Transaction Processing identifying code of encryption, the Transaction Processing identifying code of encrypting is decrypted; Liquid crystal display screen 103 is used for showing the information of Transaction Processing process and the information of user's input; Key groups 104, what be used for to receive user's input comprises user cipher and password confirming information in interior information, and key groups 104 is connected with central processing unit 101 by key scanning circuit 109; Loud speaker 105 is for the voice messaging of playing the Transaction Processing process; Memory 106, what be used for storage Password Input solicited message, Transaction Processing identifying code, information and user's input comprises user cipher in interior information; Coding chip 107 is used for user cipher and Transaction Processing identifying code are spliced or merge processing generating cipher string; Communication enciphering/deciphering chip 102 also is used for password string is encrypted processing, generates the encrypted result ciphertext, and sends encrypted result ciphertext and password confirming information to the outside; Power supply 110 is used for providing working power.
Coding chip 107 also is used for user cipher and the local Transaction Processing identifying code that generates are spliced or merge processing generating cipher string.
The cryptosecurity key board unit also comprises: usb 1 08, usb 1 08 are connected with communication enciphering/deciphering chip 102 with central processing unit 101 respectively.
Liquid crystal display screen is connected with CPU by data/address bus, and key groups is carried out serial ports by key scanning circuit with CPU and is connected.Backlight and the interface of liquid crystal display screen all adopts the liquid crystal circuit design of industrywide standard to obtain light source.Liquid crystal display screen is completed the function that information shows.
CPU is used for receiving the instruction from host computer, receives the key command that scans from key scanning circuit and then by the liquid crystal display screen circuit that is attached thereto, input is presented in the input frame of liquid crystal display screen.CPU adopts the 89c52 chip of industrywide standard, the serial ports of its middle port [RXD, TXD] for supporting.
Key scanning circuit also adopts the industry circuit of standard, is connected with CPU by 2 road serial ports, and the connectivity port is the 32nd, 33 road port RXD, TXD.Key groups is by [KEYIN0:KEYIN3], [KEYOUT0:KEYOUT2] is connected with the corresponding ports of key scanning circuit, 12 circuit form 12 nodes and represent 12 buttons, when any one button is pressed, key scanning circuit all can be recorded to this button, and it is shown on liquid crystal display screen by CPU.Key groups and key scanning circuit are completed the function of Password Input.
Loud speaker is play voice suggestion, memory stores information, coding chip carry out that data encoding, communication deciphering chip carry out that data encryption, USB interface are connected with host computer and power supply for working power is provided.
As shown in Figure 2, this cryptosecurity keyboard system of the cryptosecurity keyboard system of the present embodiment comprises: core business processing server 300, front station terminal 200 and cryptosecurity key board unit 100; Core business processing server 300 is connected with front station terminal 200 by internal network, and front station terminal 200 is connected with cryptosecurity key board unit 100 by serial ports; Core business processing server 300 is used for generation Transaction Processing identifying code, and station terminal 200 sends the Transaction Processing identifying code of encrypting forward, and the encrypted result ciphertext that before receiving, station terminal 200 feeds back; Front station terminal 200, the Transaction Processing identifying code that is used for the encryption that will receive is transmitted to cryptosecurity key board unit 100, and the encrypted result ciphertext that cryptosecurity key board unit 100 is sent is transmitted to core business processing server 300; Cryptosecurity key board unit 100 comprises: data receiver unit, the Password Input solicited message that before being used for receiving, station terminal 200 is sent and the Transaction Processing identifying code of encryption; Decrypting device is used for the Transaction Processing identifying code of encrypting is decrypted; Information display unit is used for showing the information of Transaction Processing process and the information of user's input; The Password Input unit, what be used for to receive user's input comprises user cipher and password confirming information in interior information; The speech play unit is for the voice messaging of playing the Transaction Processing process; Data storage cell, what be used for storing described Password Input solicited message, Transaction Processing identifying code, information and user's input comprises user cipher in interior information; Coding unit is used for user cipher and Transaction Processing identifying code are spliced or merge processing generating cipher string; Ciphering unit is used for password string is encrypted processing, generates the encrypted result ciphertext; Data transmission unit, being used for forward, station terminal 200 sends encrypted result ciphertext and password confirming information.
core business processing server 300 is responsible for receiving the system's Transaction Processing request that is sent by front station terminal 200, generate the Transaction Processing identifying code, use and existing this Transaction Processing identifying code of secret key encryption of cryptosecurity key board unit 100, return to Transaction Processing confirmation and Transaction Processing identifying code ciphertext, use and the existing secret key decryption user cipher of cryptosecurity key board unit 100 and Transaction Processing identifying code, verification Transaction Processing identifying code, the verified users password, carry out system's Transaction Processing and account operation, and return to the Transaction Processing object information.
Wherein the Transaction Processing identifying code has uniqueness in whole system, and any one Transaction Processing identifying code only uses once, this Transaction Processing of unique sign, not reproducible use.The Transaction Processing identifying code can be the random number that is generated by core business processing server 300; The timestamp that is perhaps generated by core business processing server 300; Perhaps use Unified Algorithm, synchronous generation respectively in core business processing server 300 and cryptosecurity key board unit 100, but be not limited only to this.
Front station terminal 200 is foreground PCs that system business is processed, and is operated by the operator.Front station terminal 200 is initiated the Transaction Processing request to core business processing server 300, the Transaction Processing that receives core business processing server 300 is confirmed, station terminal 200 sends user cipher input request and Transaction Processing identifying code forward, the user password information that before receiving, station terminal 200 sends, send user password information to core business processing server 300, receive the Transaction Processing object information that core business processing server 300 returns.
Code keypad 3 is user cipher input terminals, user cipher input request and Transaction Processing identifying code that before being responsible for receiving, station terminal 200 sends, use and the existing secret key decryption Transaction Processing of core business processing server 300 identifying code, the prompting user inputs user cipher, receive the user cipher of user's input, use and the existing secret key encryption user cipher of core business processing server 300 and Transaction Processing identifying code, station terminal 200 returns to user cipher and Transaction Processing identifying code ciphertext forward.Further, cryptosecurity key board unit 100 can use the verification code generation method same with core business processing server 300, generates identifying code in this locality.
Cryptosecurity key board unit 100 is user cipher input terminals, user cipher input request and Transaction Processing identifying code that before being responsible for receiving, station terminal 200 sends, use and the existing secret key decryption Transaction Processing of core business processing server 300 identifying code, the prompting user inputs user cipher, receive the user cipher of user's input, use and the existing secret key encryption user cipher of core business processing server 300 and Transaction Processing identifying code, station terminal 200 returns to user cipher and Transaction Processing identifying code ciphertext forward.Further, cryptosecurity key board unit 100 can use the verification code generation method same with core business processing server 300, generates identifying code in this locality.
Liquid crystal display is used for showing the prompting of Transaction Processing process, checks that for the user also assisted user is completed Transaction Processing.Liquid crystal display can show text prompt information such as comprising " please input password ", shows that the user inputs password (showing with asterisk " * "), shows the information such as the Transaction Processing amount of money.
Voice alerting unit is used for carrying out the prompting of Transaction Processing process by voice to the user, each operating procedure of prompting user.Voice alerting unit can be with the voice suggestion voice suggestion such as " please input password ".
Memory cell is used for the information of storage Transaction Processing process.Can store the Transaction Processing identifying code that comprises in the Password Input request that front station terminal 200 sends, the user cipher of storage user input, the information such as the relevant amount of money of storage Transaction Processing.
Coding unit is used for user cipher and Transaction Processing identifying code are spliced or merge processing.Coding unit can directly be connected user cipher and Transaction Processing identifying code as password string to be encrypted, perhaps user cipher and Transaction Processing identifying code are carried out the Hash processing as password string to be encrypted, carry out accordingly Transaction Processing and password authentification for core business processing server 300.
Encryption/decryption element is used for the encryption and decryption message transmission.Encryption/decryption element uses DES or 3-DES cryptographic algorithm.Encryption/decryption element uses the Transaction Processing identifying code in the Password Input request message that existing key sends front station terminal 200 to be decrypted, obtain the Transaction Processing identifying code expressly, expressly be kept in memory cell the Transaction Processing identifying code stand-by.Encryption/decryption element uses existing key that the password string to be encrypted that user cipher and Transaction Processing identifying code combine is encrypted, this encrypted result ciphertext replying as the Password Input request, return to front station terminal 200, treat that core business processing server 300 carries out Transaction Processing and user cipher checking according to this encrypted result ciphertext.
As shown in Figure 3, the step of the Transaction Processing flow process of the present embodiment is as follows:
Step 301, the Transaction Processing Data Enter is to front station terminal 200.The operator is by front station terminal 200 typing Transaction Processing information.
Step 302 is submitted the Transaction Processing request to core business processing server 300.Front station terminal 200 sends the Transaction Processing request to core business processing server 300, and Transaction Processing information is sent to core business processing server 300.
Step 303, core business processing server 300 is confirmed the Transaction Processing request.Core business processing server 300 is confirmed whether to continue to process this Transaction Processing according to the Transaction Processing information that receives.If continue execution in step 304; If not, the refusal Transaction Processing, station terminal 200 returns to refusal Transaction Processing information forward.
Step 304, core business processing server 300 returns to the Transaction Processing confirmation.Core business processing server 300 station terminal 200 forward returns to the Transaction Processing confirmation.Wherein the Transaction Processing confirmation comprises this Transaction Processing unique verification code that core business processing server 300 generates, and use and the existing secret key encryption Transaction Processing of cryptosecurity key board unit 100 identifying code.
Step 305, the interface, foreground receives the Transaction Processing confirmation, sends the user cipher input request.Front station terminal 200 receives the Transaction Processing confirmation, continues to process this online transaction.Front station terminal 200 sends the user cipher input request to cryptosecurity key board unit 100, and wherein the user cipher input request comprises the Transaction Processing identifying code ciphertext that Transaction Processing relevant information and core business processing server 300 return.
Step 306, the user inputs user cipher and confirms by code keypad.The user cipher input request that before cryptosecurity key board unit 100 receives, station terminal 200 sends is preserved the Transaction Processing identifying code in the user cipher input request.The prompting user inputs user cipher by keyboard.The user is by cryptosecurity key board unit 100 input user ciphers and confirmation.
Step 307, code keypad is submitted user cipher and Transaction Processing identifying code ciphertext to.Cryptosecurity key board unit 100 receives the user cipher of user's input, and user cipher and Transaction Processing identifying code password string ciphertext are back to front station terminal 200.
Step 308, core business processing server 300 authentication of users passwords and Transaction Processing identifying code.Front station terminal 200 receives user cipher and the Transaction Processing identifying code password string ciphertext that cryptosecurity key board unit 100 sends, and user cipher and Transaction Processing identifying code password string ciphertext are sent to core business processing server 300.Core business processing server 300 clear crytpographic key strings also decomposite corresponding user cipher and Transaction Processing identifying code, whether checking Transaction Processing identifying code used, whether verification Transaction Processing identifying code is effective, whether consistent with the Transaction Processing identifying code that generates in step 304, whether user cipher is correct, if continue execution in step 309; Refuse if not Transaction Processing.
Step 309, core business processing server 300 is completed Transaction Processing.Core business processing server 3001 operates according to the Transaction Processing details, completes this Transaction Processing.
Step 310, core business processing server 300 returns to the Transaction Processing object information.Core business processing server 300 is according to the Transaction Processing result, and station terminal 200 returns to the Transaction Processing object information forward, and front station terminal 200 is completed Transaction Processing according to the Transaction Processing object information.
So far, Transaction Processing finishes.
As shown in Figure 4, flow process is confirmed in the Transaction Processing request of above-mentioned steps 303, mainly comprises the following steps:
Step 401, core business processing server 300 receives the Transaction Processing request.The Transaction Processing solicited message that core business processing server 3001 receives from front station terminal 200.
Step 402, core business processing server 300 generates the Transaction Processing identifying code.Core business processing server 300 is according to cryptosecurity key board unit 100 relevant informations and current time information in the Transaction Processing solicited message, and Transaction Processing generates unique Transaction Processing identifying code for this reason.This Transaction Processing identifying code can be the random number that core business processing server 300 generates, the perhaps timestamp that generates of core business processing server 300, but be not limited only to this.
Step 403, core business processing server 300 uses existing secret key encryption Transaction Processing identifying code.Core business processing server 300 uses with the existing key of cryptosecurity key board unit 100 and just encrypts the Transaction Processing identifying code according to the Transaction Processing solicited message.And will preserve this Transaction Processing identifying code so that subsequent authentication is used.
Step 404, core business processing server 300 are returned to Transaction Processing request confirmation and Transaction Processing identifying code ciphertext.Core business processing server 300 returns to the Transaction Processing request to be confirmed, and returns to the Transaction Processing identifying code ciphertext that generates.
As shown in Figure 5, the code keypad handling process of above-mentioned steps 307 mainly comprises the following steps:
Step 501, code keypad receive the user cipher input request from the interface, foreground.Cryptosecurity key board unit 100 station terminal 200 in the past receives the user cipher input request, and wherein the user cipher input request comprises this Transaction Processing unique verification code ciphertext that core business processing server 300 returns.
Step 502, code keypad are used existing secret key decryption Transaction Processing identifying code.Cryptosecurity key board unit 100 uses existing secret key decryption Transaction Processing identifying code by encryption/decryption element, and preserves the Transaction Processing identifying code to memory cell.
Step 503, code keypad prompting user inputs user cipher.Cryptosecurity key board unit 100 is inputted user cipher by liquid crystal display and voice alerting unit prompting user, and shows user cipher input state information at liquid crystal display.
Step 504, code keypad receives user cipher.Cryptosecurity key board unit 100 receives user cipher and the confirmation of user's input.
Step 505, code keypad is with the processing of encoding of user cipher and Transaction Processing identifying code.Cryptosecurity key board unit 100 makes up user cipher and Transaction Processing identifying code by coding unit, user cipher and Transaction Processing identifying code can be connected to form password string to be encrypted, or user cipher and Transaction Processing identifying code are carried out Hash process, with result as password string to be encrypted.
Step 506, code keypad are used existing secret key encryption user cipher and Transaction Processing identifying code.Cryptosecurity key board unit 100 uses existing key, by the user cipher of encryption/decryption element encrypting user input and the password string to be encrypted of Transaction Processing identifying code.
Step 507, code keypad is submitted user cipher and Transaction Processing identifying code ciphertext to.Cryptosecurity key board unit 100 is back to front station terminal 200 with user cipher and Transaction Processing identifying code password string ciphertext.
In core business processing server 300, be provided with the identifying code generation unit, be used for generating the Transaction Processing identifying code, for core business processing server 300 these Transaction Processing of checking.The identifying code generation unit is according to default create-rule, synchronize with core business processing server 300 and generate the Transaction Processing identifying code, this time of unique identification Transaction Processing when this Transaction Processing identifying code can be used for cryptosecurity key board unit 100 with core business processing server 300 online transaction, and do not need to issue this Transaction Processing identifying code by core business processing server 300, so the Transaction Processing process between cryptosecurity key board unit 100 and core business processing server 300 can be completed by an online transaction.The identifying code generting machanism of identifying code generation unit and the identifying code generting machanism of core business processing server 300 are identical, and synchronously generate the online transaction identifying code, guarantee that the identifying code generation unit is consistent with the Transaction Processing identifying code that core business processing server 300 generates.The identifying code generation unit can generate random number as the Transaction Processing identifying code according to default create-rule, or according to relevant information generating code strings such as current exchange hour, online transaction information, code keypad information as the Transaction Processing identifying code.For example, the identifying code generation unit can with current Transaction Processing time, online transaction operation specifying information (as Transaction Processing account account, the Transaction Processing amount of money), code keypad sign, Transaction Processing type number as input message, generate the Transaction Processing identifying code by hash algorithm.Core business processing server 300 is after receiving the Transaction Processing request, can be according to the Transaction Processing time that comprises in the Transaction Processing request, online transaction operation specifying information (as Transaction Processing account account, the Transaction Processing amount of money etc.), code keypad sign, Transaction Processing type number, generate the mutual processing identifying code identical with the identifying code generation unit by identical hash algorithm, with legitimacy and the authenticity of verifying this Transaction Processing.
As shown in Figure 6, the Transaction Processing flow process of cryptosecurity key board unit 100 embodiment comprises the following steps:
Step 701, the Transaction Processing Data Enter is to the interface, foreground.The operator is by front station terminal 200 typing Transaction Processing information.
Step 702, the interface, foreground sends the user cipher input request to code keypad.Front station terminal 200 sends the user cipher input request to cryptosecurity key board unit 100, and wherein the user cipher input request comprises the Transaction Processing relevant information.
Step 703, the user inputs user cipher and confirms by code keypad.The user cipher input request that before cryptosecurity key board unit 100 receives, station terminal 200 sends, the prompting user inputs user cipher by keyboard.The user is by cryptosecurity key board unit 100 input user ciphers and confirmation.
Step 704, code keypad is submitted user cipher and Transaction Processing identifying code ciphertext to.Cryptosecurity key board unit 100 receives the user cipher of user's input, and user cipher and Transaction Processing identifying code password string ciphertext are back to front station terminal 200.
Step 705, core business processing server 300 receives the Transaction Processing request.The Transaction Processing request that before core business processing server 300 receives, station terminal 200 sends.Wherein the Transaction Processing request comprises Transaction Processing relevant information and user cipher and Transaction Processing identifying code cyphertext strings.
Step 706, core business processing server 300 authentication of users passwords and Transaction Processing identifying code.Core business processing server 300 uses existing secret key decryption user cipher and the Transaction Processing identifying code cyphertext strings with cryptosecurity key board unit 100, and decomposites corresponding user cipher and Transaction Processing identifying code.Core business processing server 300 expressly compares the Transaction Processing identifying code with the Transaction Processing identifying code that local Transaction Processing identifying code generation unit generates, if inconsistent Transaction Processing identifying code authentication failed is refused this Transaction Processing; If unanimously the Transaction Processing identifying code is verified, further authentication of users password is if the user cipher authentication failed is refused this Transaction Processing; If user cipher is verified, continue execution in step 707.
Step 707, core business processing server 300 is completed Transaction Processing.Core business processing server 300 operates according to the Transaction Processing details, completes this Transaction Processing.
Step 708, core business processing server 300 returns to the Transaction Processing object information.Core business processing server 300 is according to the Transaction Processing result, and station terminal 200 returns to the Transaction Processing object information forward, and front station terminal 200 is completed Transaction Processing according to the Transaction Processing object information.
So far, Transaction Processing finishes.
Flow chart is as shown in Figure 7 described the code keypad handling process of above-mentioned steps 704 in detail, mainly comprises the following steps:
Step 801, code keypad receive the user cipher input request from the interface, foreground.Cryptosecurity key board unit 100 receives the user cipher input requests by 201 the past of communication unit station terminal 200.
Step 802, code keypad prompting user inputs user cipher.Cryptosecurity key board unit 100 is inputted user cipher by liquid crystal display and voice alerting unit prompting user, and shows user cipher input state information at liquid crystal display.
Step 803, code keypad receives user cipher.Cryptosecurity key board unit 100 receives user cipher and the confirmation of user's input by the keyboard input unit.
Step 804 also can arrange the identifying code generation unit in cryptosecurity key board unit 100, generates the Transaction Processing identifying code with the generating cipher keyboard.Cryptosecurity key board unit 100 is used for this Transaction Processing of unique identification by self identifying code generation unit generation Transaction Processing identifying code.
Step 805, code keypad is with the processing of encoding of user cipher and Transaction Processing identifying code.Cryptosecurity key board unit 100 makes up user cipher and Transaction Processing identifying code by coding unit, user cipher and Transaction Processing identifying code can be connected to form password string to be encrypted, or user cipher and Transaction Processing identifying code are carried out Hash process, with result as password string to be encrypted.
Step 806, code keypad are used existing secret key encryption user cipher and Transaction Processing identifying code.Cryptosecurity key board unit 100 uses existing key, by the user cipher of encryption/decryption element encrypting user input and the password string to be encrypted of Transaction Processing identifying code.
Step 807, code keypad is submitted user cipher and Transaction Processing identifying code ciphertext to.Cryptosecurity key board unit 100 is back to front station terminal 200 with user cipher and Transaction Processing identifying code password string ciphertext.
The beneficial effects of the utility model are: by code keypad and system's Transaction Processing flow process; the any user cipher input of unique identification; user cipher and this time Transaction Processing identifying code are bound and encrypted; guarantee that the user inputs password and only is used for this time Transaction Processing; prevent that effectively the assailant from intercepting user cipher and forging user's Transaction Processing, protection user cipher and user identity safety.
Used specific embodiment in the utility model principle of the present utility model and execution mode are set forth, the explanation of above embodiment just is used for helping to understand method of the present utility model and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present utility model, all will change in specific embodiments and applications, in sum, this description should not be construed as restriction of the present utility model.

Claims (6)

1. a cryptosecurity key board unit, is characterized in that, described cryptosecurity key board unit comprises: central processing unit, and be connected with described central processing unit,
Communication enciphering/deciphering chip is used for receiving the outside Password Input solicited message of sending and the Transaction Processing identifying code of encryption, and the Transaction Processing identifying code of described encryption is decrypted;
Liquid crystal display screen is used for showing the information of Transaction Processing process and the information of user's input;
Key groups, what be used for to receive user's input comprises user cipher and password confirming information in interior information;
Loud speaker is for the voice messaging of playing the Transaction Processing process;
Memory, what be used for storing described Password Input solicited message, Transaction Processing identifying code, information and user's input comprises user cipher in interior information;
Coding chip is used for described user cipher and Transaction Processing identifying code are spliced or merge processing generating cipher string;
Described communication enciphering/deciphering chip also is used for described password string is encrypted processing, generates the encrypted result ciphertext, and sends described encrypted result ciphertext and password confirming information to the outside.
2. cryptosecurity key board unit as claimed in claim 1, is characterized in that, described coding chip is used for described user cipher and the local Transaction Processing identifying code that generates are spliced or merge processing generating cipher string.
3. cryptosecurity key board unit as claimed in claim 1, is characterized in that, described cryptosecurity key board unit also comprises: USB interface, described USB interface are connected with described communication enciphering/deciphering chip with described central processing unit respectively.
4. a cryptosecurity keyboard system, is characterized in that, described cryptosecurity keyboard system comprises: core business processing server, front station terminal and cryptosecurity key board unit;
Described core business processing server is connected with described front station terminal by internal network, and described front station terminal is connected with described cryptosecurity key board unit by serial ports;
Described core business processing server is used for generating the Transaction Processing identifying code, sends to described front station terminal the Transaction Processing identifying code of encrypting, and receives the encrypted result ciphertext of described foreground terminal feedback;
Described front station terminal, the Transaction Processing identifying code that is used for the encryption that will receive is transmitted to described cryptosecurity key board unit, and the described encrypted result ciphertext that described cryptosecurity key board unit is sent is transmitted to described core business processing server;
Described cryptosecurity key board unit comprises: central processing unit, and be connected with described central processing unit, communication enciphering/deciphering chip, be used for receiving Password Input solicited message that described front station terminal sends and the Transaction Processing identifying code of encryption, the Transaction Processing identifying code of described encryption is decrypted; Liquid crystal display screen is used for showing the information of Transaction Processing process and the information of user's input; Key groups, what be used for to receive user's input comprises user cipher and password confirming information in interior information; Loud speaker is for the voice messaging of playing the Transaction Processing process; Memory, what be used for storing described Password Input solicited message, Transaction Processing identifying code, information and user's input comprises user cipher in interior information; Coding chip is used for described user cipher and Transaction Processing identifying code are spliced or merge processing generating cipher string; Described communication enciphering/deciphering chip also is used for described password string is encrypted processing, generates the encrypted result ciphertext, and sends described encrypted result ciphertext and password confirming information to described front station terminal.
5. cryptosecurity keyboard system as claimed in claim 4, is characterized in that, described coding chip is used for described user cipher and the local Transaction Processing identifying code that generates are spliced or merge processing generating cipher string.
6. cryptosecurity keyboard system as claimed in claim 4, is characterized in that, described cryptosecurity key board unit also comprises: USB interface, described USB interface are connected with described communication enciphering/deciphering chip with described central processing unit respectively.
CN 201220688994 2012-12-13 2012-12-13 Password security keypad device and password security pad system Expired - Lifetime CN202978979U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201220688994 CN202978979U (en) 2012-12-13 2012-12-13 Password security keypad device and password security pad system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201220688994 CN202978979U (en) 2012-12-13 2012-12-13 Password security keypad device and password security pad system

Publications (1)

Publication Number Publication Date
CN202978979U true CN202978979U (en) 2013-06-05

Family

ID=48519995

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201220688994 Expired - Lifetime CN202978979U (en) 2012-12-13 2012-12-13 Password security keypad device and password security pad system

Country Status (1)

Country Link
CN (1) CN202978979U (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108334794A (en) * 2017-12-28 2018-07-27 天地融科技股份有限公司 A kind of information input encryption method and system for information input equipment
CN108932441A (en) * 2017-05-26 2018-12-04 三星Sds株式会社 The operation method and computing device of safety keyboard system, safety keyboard
CN109508566A (en) * 2018-12-29 2019-03-22 上海哈诚电子科技有限公司 A kind of safety device of code keyboard

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108932441A (en) * 2017-05-26 2018-12-04 三星Sds株式会社 The operation method and computing device of safety keyboard system, safety keyboard
CN108334794A (en) * 2017-12-28 2018-07-27 天地融科技股份有限公司 A kind of information input encryption method and system for information input equipment
CN108334794B (en) * 2017-12-28 2021-10-22 天地融科技股份有限公司 Information input encryption method and system for information input equipment
CN109508566A (en) * 2018-12-29 2019-03-22 上海哈诚电子科技有限公司 A kind of safety device of code keyboard

Similar Documents

Publication Publication Date Title
CN103036681B (en) A kind of password safety keyboard device and system
US9760721B2 (en) Secure transaction method from a non-secure terminal
CN108566381A (en) A kind of security upgrading method, device, server, equipment and medium
CN108924147B (en) Communication terminal digital certificate issuing method, server and communication terminal
US10089627B2 (en) Cryptographic authentication and identification method using real-time encryption
CN101262349A (en) SMS-based identity authentication method and device
CN103067160A (en) Method and system of generation of dynamic encrypt key of encryption secure digital memory card (SD)
CN103095456A (en) Method and system for processing transaction messages
CN109412812A (en) Data safe processing system, method, apparatus and storage medium
KR20220117211A (en) Contactless Card Personal Identification System
CN101409621B (en) Multipart identification authentication method and system base on equipment
CN101393628A (en) Novel network safe transaction system and method
CN111178884A (en) Information processing method, device, equipment and readable storage medium
CN101335754B (en) Method for information verification using remote server
CN112232814A (en) Encryption and decryption method of payment key, payment authentication method and terminal equipment
CN104125064B (en) A kind of dynamic cipher authentication method, client and Verification System
CN102404337A (en) Data encryption method and device
CN106533677B (en) A kind of user login method, user terminal and server
CA2869810A1 (en) Electronic cipher generation method, apparatus and device, and electronic cipher authentication system
CN112765626A (en) Authorization signature method, device and system based on escrow key and storage medium
CN102468962A (en) Method for personal identity authentication utilizing a personal cryptographic device
CN112636916A (en) Data processing method, data processing device, storage medium and electronic equipment
CN113763621A (en) Access control authorization method, management client and system based on block chain
CN202978979U (en) Password security keypad device and password security pad system
CN111435389A (en) Power distribution terminal operation and maintenance tool safety protection system

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20130605