Dynamic password acquisition method and device, terminal and storage medium

A technology of dynamic password and acquisition method, which is applied to secure communication devices and key distribution, can solve the problems of user loss and easy acquisition of dynamic passwords by others, and achieve the effect of ensuring security.

Inactive Publication Date: 2018-07-27
SHANGHAI PEOPLENET SECURITY TECH
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the "encryption key" is unique, the "encryption key" and "encryption algorithm" have been in a common carrier such as a mobile terminal for a long time. Once the user's mobile terminal is lost or stolen, the dynamic password generated by the mobile phone token is extremely difficult. Easy to be obtained by others, causing losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic password acquisition method and device, terminal and storage medium
  • Dynamic password acquisition method and device, terminal and storage medium
  • Dynamic password acquisition method and device, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] figure 1 It is a flowchart of a method for obtaining a dynamic password provided by Embodiment 1 of the present invention. This embodiment is applicable to the case where a terminal generates a dynamic password. The method can be executed by a device for obtaining a dynamic password, which can be configured in a terminal, for example. Such as figure 1 As shown, the method specifically includes:

[0026] S110. Initiate an encryption key acquisition request to the NFC encryption card.

[0027] Among them, the NFC encryption card is an NFC medium independent of the terminal, which is equivalent to an IC card using RFID technology, which can replace a large number of IC cards (including credit cards) in shopping malls, bus cards, access control, tickets, tickets, etc. Wait. The unique encryption key of its corresponding terminal is stored in the NFC encryption card.

[0028] Further, when the user initiates an identity authentication or a transaction operation, an encry...

Embodiment 2

[0037] figure 2 It is a schematic structural diagram of a device for obtaining a dynamic password provided by Embodiment 2 of the present invention. Such as figure 2 As shown, the device includes: a key request module 210 , a key extraction module 220 and a dynamic password generation module 230 .

[0038] Among them, the key request module 210 is used to initiate an encryption key acquisition request to the NFC encryption card; the key extraction module 220 is used to send the encryption key extraction password input by the user to the NFC encryption card, and extract all The encryption key; the dynamic password generation module 230, configured to generate a dynamic password by using the encryption key, a preset encryption algorithm and extracting the encryption key time stamp.

[0039] In the technical solution of this embodiment, by storing the encryption key in the NFC encryption card, the encryption algorithm stored in the mobile terminal is stored in a different med...

Embodiment 3

[0045] image 3 is a schematic structural diagram of a terminal in Embodiment 3 of the present invention. image 3 A block diagram of an exemplary terminal 312 suitable for use in implementing embodiments of the invention is shown. image 3 The displayed terminal 312 is only an example, and should not limit the functions and scope of use of this embodiment of the present invention.

[0046] Such as image 3 As shown, terminal 312 takes the form of a general purpose computing device. Components of terminal 312 may include, but are not limited to: one or more processors or processing units 316, system memory 328, NFC module 317, bus 318 connecting different system components (including system memory 328 and processing unit 316).

[0047] Bus 318 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus structures. These archi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a dynamic password acquisition method and device, a terminal and a storage medium. The method comprises the following steps: initiating an encryption key acquisition request to an NFC (near field communication) encryption card; transmitting an encryption key extraction password input by a user to the NFC encryption card, and extracting the encryption key;generating the dynamic password by utilizing the encryption key, a preset encryption algorithm and the extracted encryption key timestamp. According to the embodiment of the invention, the problem that the encryption key and the encryption algorithm stored in the same medium are easily stolen and unsafe is solved, key and algorithm separation is realized, and the safety of a mobile token of the user is ensured.

Description

technical field [0001] The embodiment of the present invention relates to a dynamic password technology, in particular to a dynamic password acquisition method, device, terminal and storage medium. Background technique [0002] The mobile phone token is a mobile terminal software used to generate a dynamic password. The dynamic password generated by its operation is bound to the mobile terminal for identity authentication. It is the mainstream form of dynamic password and identity authentication token in the mobile Internet era. The dynamic password generation mode of the mobile phone token is to use the encryption key, encryption algorithm and time to generate a dynamic password, wherein the "encryption key" and "encryption algorithm" are provided by the mobile terminal program, and the "time" is provided by the network timing service of the mobile terminal . [0003] Although the "encryption key" is unique, the "encryption key" and "encryption algorithm" have been in a co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04W4/80
CPCH04L9/0897H04W4/80
Inventor 谈剑锋翁庆武丁震宇童勇
Owner SHANGHAI PEOPLENET SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products