WO2017050152A1 - 用于移动设备的密码安全系统及其密码安全输入方法 - Google Patents
用于移动设备的密码安全系统及其密码安全输入方法 Download PDFInfo
- Publication number
- WO2017050152A1 WO2017050152A1 PCT/CN2016/098824 CN2016098824W WO2017050152A1 WO 2017050152 A1 WO2017050152 A1 WO 2017050152A1 CN 2016098824 W CN2016098824 W CN 2016098824W WO 2017050152 A1 WO2017050152 A1 WO 2017050152A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- password
- mobile device
- ciphertext
- security
- module
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Definitions
- the present invention relates to mobile communication technologies, and in particular to a cryptographic security system for a mobile device and a cryptographic security input method for the mobile device.
- the existing common technical means uses a password method, that is, the user sets a password.
- the user wants to protect the personal information
- the user is required to input the password, and the smart mobile device determines whether the password is correct. If correct, the personal information is correct. Encryption is performed; after that, if the user needs to view the personal information, the password is also input, and after the system determines that the password is correct, the personal information is decrypted for the user to view.
- the current password uses a character form and requires a certain complex combination, which gives the password enhanced security, reduces the risk of being cracked, and brings a real problem, that is, if the password has a period of time No, the user will easily forget, which may result in the inability of the personal information to be decrypted, which is inconvenient for the user.
- the present invention is directed to a password security system for a mobile device and a password security input method for a mobile device capable of solving the problem of difficulty in memory and easy to be stolen during password use and implementing secure input of a password. .
- the security device is configured to acquire a password according to the password and generate a password ciphertext according to the password, and then transmit the password to the first mobile device, where the password is used to verify the password sent from the first mobile device to be used.
- a first mobile device in a password generation phase, for receiving a generated password ciphertext from the security device and transmitting to a second mobile device for reading a password from a second mobile device to be described later in a password verification phase Ciphertext and sent to the security device;
- the second mobile device is configured to store a password ciphertext received from the first mobile device in a password generation phase, and to provide the stored password ciphertext to the first mobile device in a password verification phase.
- the security device is constructed as part of the first mobile device.
- the security device is a cloud device or a security unit.
- the first mobile device is a smart phone or a tablet
- the second mobile device is a wearable device.
- the security device is configured to acquire a password in the password generation phase and generate a password ciphertext according to the password, and then transmit the password to the second mobile device, where the password is used to verify the password ciphertext sent from the first mobile device described below. ;
- a first mobile device in the password verification phase, for reading a password ciphertext from the second mobile device described below and transmitting the ciphertext to the security device;
- the second mobile device is configured to store a password ciphertext received from the security device in a password generation phase, and to provide the stored password ciphertext to the first mobile device in a password verification phase.
- the security device is constructed as part of the first mobile device.
- the security device has:
- a trusted storage module configured to store the original password
- the encryption and decryption module is used to generate a password ciphertext according to the original password in the password generation phase, in the password verification phase. It is used to decrypt and verify the password ciphertext extracted from the following password data generating module;
- a password data generating module configured to generate password data according to the password ciphertext in a password generation phase, and to extract a password ciphertext from password data from a second mobile device:
- a first information receiving module configured to perform data interaction between the security device and the first mobile device, and/or between the security device and the second mobile device,
- the second mobile device is provided with:
- a storage module configured to store the password data sent from the security module in a password generation phase
- a password data display module for displaying the password data stored by the storage module in a password verification phase
- the first mobile device is provided with:
- a password data reading module configured to read password data displayed by the password data display module
- a second information receiving module configured to perform data interaction between the first mobile device and the security device and/or between the first mobile device and the second mobile device.
- the password data generating module is a two-dimensional code generating module.
- the two-dimensional code generating module is configured to generate a two-dimensional code according to the password ciphertext in a password generation phase, and to extract a two-dimensional code from the password data from the second mobile device in the password verification phase,
- the password data display module is a two-dimensional code display module.
- the two-dimensional code display module is configured to display a two-dimensional code as password data stored by the storage module in a password verification phase.
- the password data reading module is a camera, and the camera is configured to read a two-dimensional code displayed by the two-dimensional code display module.
- the password data generating module is a barcode generating module
- the barcode generating module is configured to generate a barcode according to the password ciphertext in a password generation phase, and to use the password data from the second mobile device in the password verification phase. Extract the barcode,
- the password data display module is a barcode display module.
- the barcode display module is configured to display a barcode as password data stored by the storage module in a password verification phase
- the password data reading module is a camera, and the camera is used to read a barcode displayed by the barcode display module.
- the first mobile device is a smart phone or a tablet
- the second mobile device is a wearable device
- the security device is disposed in a TEEI of the smart phone as part of the smart phone.
- data transmission between the security device and the second mobile device is implemented by non-contact communication.
- the cryptographic security input method for a mobile device of the present invention is implemented by using a security device, a first mobile device, and a second mobile device, and includes the following steps:
- the security device obtains a password and encrypts the password to generate a password ciphertext, and then transmits the data to the second mobile device through the first mobile device or directly to the second mobile device;
- the second mobile device stores the password ciphertext
- a password input step when the user needs to input a password, the second mobile device displays the password ciphertext to the first mobile device, and the first mobile device obtains the password ciphertext and sends the password to the security device;
- the security device decrypts the encrypted ciphertext sent from the first mobile device and verifies the decrypted password.
- data transmission between the security device and the second mobile device is implemented by non-contact communication.
- the password ciphertext uses a two-dimensional code or a barcode.
- the cryptographic security system for a mobile device of the present invention includes: a background system, a first mobile device, and a second mobile device,
- the background system has:
- a first counter for generating a count value and counting the count value comparison times
- a public-private key generating unit for generating a public key and a private key
- the encryption and decryption module is configured to acquire a user password in the password generation phase, and encrypt the user password, the count value generated by the first counter, and the public key generated by the public-private key generating unit, and generate a password ciphertext to be sent to the first mobile
- the device in the password verification phase, is configured to parse the count value from the second password ciphertext sent by the first mobile device, and compare the parsed count value with the count value stored by the first counter, The password verification of the second password ciphertext is performed only when the count value comparison is passed;
- a first network security channel for transmitting data between the background system and the first mobile device
- the first mobile device has:
- a cryptographic processing unit in a password generation phase, receiving a first ciphertext transmitted from the background system and transmitting the first ciphertext and the public key to the second mobile device, and in the password verification phase, the second The counter value stored by the counter is sent to the second mobile device and receives the following second password ciphertext returned from the second mobile device, and the second password ciphertext is sent to the background system;
- a second network security channel configured to perform data transmission between the background system and the first mobile device
- the second mobile device is provided with:
- a storage module for storing a password ciphertext and a public key sent from the first mobile device during the password generation phase
- the encryption and decryption module generates a second password ciphertext together with the password ciphertext public key that has been stored by the first mobile device during the password verification phase.
- the first mobile device is a smart phone or a tablet
- the second mobile device is a wearable device.
- the first mobile device and the second mobile device communicate in a non-connected manner.
- the cryptographic security system for a mobile device and the cryptographic security input method for the mobile device of the present invention use a mobile device such as a wearable device to store a password instead of a human brain, without using a memory password.
- a mobile device such as a wearable device to store a password instead of a human brain
- This makes it possible to set up a very complex combination of passwords, which increases the difficulty of password cracking and greatly enhances the user experience.
- the password ciphertext form is adopted, which can effectively prevent the malicious stealing, and can improve the security of the password use.
- FIG. 1 is a block diagram showing a cryptographic security system for a mobile device of the present invention.
- FIG. 2 is a flow chart showing the specific steps of the cryptographic security input method of the present invention.
- FIG. 3 is a configuration diagram of a cryptographic security system for a mobile device according to a first embodiment of the present invention.
- FIG. 4 is a configuration diagram of a cryptographic security system for a mobile device according to a second embodiment of the present invention.
- Fig. 5 is a configuration diagram of a cryptographic security system for a mobile device according to a second embodiment of the present invention.
- the invention utilizes the advantages of the user carrying a plurality of mobile devices with him, and provides a password security system and a password security input method capable of inputting the user password reliably and conveniently.
- FIG. 1 is a block diagram showing a cryptographic security system for a mobile device of the present invention.
- the cryptographic security system for a mobile device of the present invention includes: a security device 100, a first mobile device 200, and a second mobile device 300.
- the security device 100 is configured to encrypt a password set by the user in the password generation phase to generate a password ciphertext and transmit the generated password ciphertext to the first mobile device 200 for verification in the password verification phase from the first mobile device to be described below.
- the sent password is decrypted and verified.
- the first mobile device 200 is configured to receive the generated password ciphertext from the security device 100 and transmit to the second mobile device 300 during the password generation phase, and to read the password ciphertext from the second mobile device 300 during the password verification phase. Sent to the security device 100.
- the second mobile device 300 is configured to store the password ciphertext received from the first mobile device 200 during the password generation phase, and to provide the stored password ciphertext to the first mobile device 100 during the password verification phase.
- the security device 100 acquires a password that is required to be input by the first mobile device 200 (generally input by the user), generates an encrypted ciphertext according to the password, and transmits the first mobile device 200 through the communication channel.
- the first mobile device 200 And then transmitted to the second mobile device 300 through the communication channel, and the second mobile device 300 stores the password ciphertext.
- the password read by the first mobile device 200 and read from the second mobile device 300 is sent to the security device 100, and the security device 100 verifies the read password. And notifying the first mobile device 200 whether the password verification is passed according to the verification result.
- the second mobile device 300 is used instead of the human brain to memorize the password of the first mobile device 200, and the mobile device can improve the password input by using the powerful computing power and communication interface capability of the human brain. The security and convenience of the way.
- the security device 100 may exist independently as a separate device, for example, The security device 100 is a cloud device or a security unit. Of course, the security device 100 may also be part of the first mobile device 200.
- the first mobile device 100 may be a smart phone or a tablet computer, and the security device 100 may be a part of the smart phone or the tablet, as long as the password generation and verification functions can be completed.
- the second mobile device 300 can be a wearable device.
- Figure 2 is a flow chart showing a method of cryptographic security input of the present invention.
- the password security input method of the present invention includes the following steps:
- a password generating step S100 using the security device 100 to obtain a password and encrypting the password to generate a password ciphertext, then transmitting to the second mobile device 300 through the first mobile device 200 or directly to the second mobile device 300;
- Password storage step S200 the second mobile device 300 stores the password ciphertext
- Password input step S300 when the user needs to input a password, the second mobile device 300 displays the password ciphertext to the first mobile device 200, and the first mobile device 200 obtains the password ciphertext and sends it to the security device 100;
- Password verification step S400 The secure device 100 decrypts the encrypted ciphertext sent from the first mobile device 200 and verifies the decrypted password.
- FIG. 3 is a configuration diagram of a cryptographic security system for a mobile device according to a first embodiment of the present invention.
- the cryptographic security system for a mobile device of the first embodiment of the present invention includes a smart phone 400 and a wearable device 500.
- the smart phone 400 includes a TEEI area (Trusted Executive Environment Integration) 410 and an Android area 420.
- TEEI area 410 corresponds to the above-described security device
- the Android area 420 corresponds to the above-described first mobile device
- the wearable device 500 corresponds to the above-described second mobile device.
- TEEI Trusted Execution Environment Integration
- TEEI constructs a mobile intelligent terminal operating system (such as Android, iOS, WindowsPhone) A safe operating environment.
- the TEEI can be a secure area located in the main processor of the mobile intelligent terminal, which ensures the storage, processing and protection of sensitive data in a trusted environment.
- TEEI provides a secure execution environment for authorized security software (trusted software), enabling end-to-end security by performing protection, confidentiality, integrity and data access.
- the TEEI area 410 has:
- the trusted interaction interface module 411 is configured to obtain an original password input by the user
- a trusted storage module 412 configured to store the original password
- the encryption and decryption module 413 is configured to generate a password ciphertext according to the original password in the password generation phase, and to decrypt and verify the password ciphertext extracted from the two-dimensional code generation module 414 in the password verification phase;
- the two-dimensional code generating module 414 is configured to generate a two-dimensional code according to the password ciphertext in a password generation phase, and to extract a password ciphertext from the wearable device 500 in a password verification phase;
- the first information receiving module 415 is configured to perform data interaction between the TEEI area 410 and the Android area 420 and/or between the TEEI area 410 and the wearable device 500.
- the Android area 420 has:
- the camera 421 is configured to read the password ciphertext displayed by the two-dimensional code display module 512;
- the second information receiving module 422 is configured to perform data interaction between the Android area 420 and the TEEI area 410 and/or the wearable device 500.
- the wearable device 500 is provided with:
- the storage module 511 is configured to store the password ciphertext sent from the TEEI area 410 in the password generation phase;
- the two-dimensional code display module 512 is used to display the password ciphertext stored by the storage module 511 in the password verification phase.
- the data transmission between the TEEI area 410 and the wearable device 500 is implemented by non-contact communication, such as NFC or Bluetooth.
- the TEEI area 410 in the smart phone is used as a security platform for supporting password processing to ensure the security of the password generation process.
- the wearable device 500 stores the password to avoid the problem of the user remembering the password.
- the password generation process is:
- the trusted interaction interface module 411 provided by the TEEI area 410 obtains the password input by the user, and transmits it to the encryption and decryption module 413;
- the encryption and decryption module 413 uses the trusted storage module 412 to store the password, and uses the key to encrypt the password using a common encryption method such as 3DES, AES, etc., to generate a password ciphertext, which is transmitted to the two-dimensional code module 414;
- the two-dimensional code module 414 generates a two-dimensional code based on the ciphertext, and prompts the user to generate a prompt sound or the like.
- the user passes the wearable device 500 to the mobile phone, so that the password ciphertext, that is, the two-dimensional code is transmitted to the NFC through the NFC.
- the storage module 511 of the wearable device 500 stores.
- the encryption application prompts the user to input the password by opening the camera;
- the user displays the encrypted ciphertext two-dimensional code by operating the wearable device 500.
- the camera 421 transmits the data to the two-dimensional code module 414, and the two-dimensional code module 414 analyzes and extracts the password ciphertext. Then, it is sent to the encryption and decryption module 413 for decryption and verification, and the verification is passed to notify the system to encrypt the user's personal information.
- the user when the user wants to view the encrypted personal information, the user opens the camera 421 to read the two-dimensional code on the wearable device 500 and extracts the password and verifies in the same manner as described above, and the encryption/decryption module 413 notifies the system to decrypt the personal information. For users to view. In this process, whether or not the notification system needs to perform personal information encryption and decryption is issued by the encryption and decryption module 413 under TEEI, thereby greatly reducing the risk of personal information being illegally encrypted and decrypted by malicious programs.
- the password security input method of the present invention can be changed from the original password manual input to the camera shooting, and the operation is simple and easy to use, and the password can be input only once during setting.
- the user does not need to remember the password, and can set a very complicated combination of passwords, which improves the difficulty of being cracked and greatly improves the user experience.
- FIG. 4 is a configuration diagram of a cryptographic security system for a mobile device according to a second embodiment of the present invention.
- the cryptographic security system for a mobile device of the second embodiment of the present invention includes a smart phone 600 and a wearable device 700.
- the smart phone 600 includes a TEEI (Trusted Executive Environment Integration) 610 and an Android area 620.
- TEEI area 610 corresponds to the above-described security device
- the Android area 620 corresponds to the above-described first mobile device
- the wearable device 700 corresponds to the above-described second mobile device.
- TEEI District 610 has:
- the trusted interaction interface module 611 is configured to obtain an original password input by the user
- a trusted storage module 612 configured to store the original password
- the encryption and decryption module 613 is configured to generate a password ciphertext according to the original password in the password generation phase, and to decrypt and verify the password ciphertext extracted from the barcode generation module 414 in the password verification phase;
- the barcode generating module 614 is configured to generate a barcode according to the password ciphertext in a password generation phase, and to extract a password ciphertext from the wearable device 700 in the password verification phase;
- the first information receiving module 615 is configured to perform data interaction between the TEEI area 610 and the Android area 620 and/or between the TEEI area 610 and the wearable device 700.
- the Android area 620 has:
- a camera 621 configured to read a password ciphertext displayed by the barcode display module 712;
- the second information receiving module 622 is configured to perform data interaction between the Android area 620 and the TEEI area 610 and/or the wearable device 700.
- the wearable device 700 is provided with:
- the storage module 711 is configured to store the password ciphertext sent from the TEEI area 610 in the password generation phase;
- the barcode display module 712 is configured to display the password ciphertext stored by the storage module 711 in the password verification phase.
- the data transmission between the TEEI area 610 and the wearable device 700 is implemented by non-contact communication, such as NFC or Bluetooth.
- the TEEI area 610 in the smart phone is used as a security platform for supporting password processing to ensure the security of the password generation process.
- the wearable device 700 stores the password, which can avoid the problem of the user remembering the password.
- a two-dimensional code is adopted in the first embodiment, and a barcode is used in the second embodiment, where the two-dimensional code or the barcode is only a form of displaying the ciphertext, as long as the security device and the first mobile device It is ok to agree on this form of presentation. Therefore, from this point of view, as long as it can represent the text, numbers and other information, it is possible to directly display the password ciphertext number.
- the improvement of the password protection measure in the present invention mainly uses an additional mobile smart device to replace the human brain for password input, so that the password is freed from the human brain.
- the input styles that are not matched with the computing devices are too single and fixed.
- the inventor further found that if the encrypted password is dynamically changed, the encrypted ciphertext generated by each wearable device is dynamically generated once, which can better eliminate the risk of being copied.
- such a scheme is applied to the existing user login protection without card payment, which can solve the problem that the existing cardless payment is easily stolen when the user is logged in.
- the problem is to improve the security of the login process while improving the user experience.
- Fig. 5 is a configuration diagram of a cryptographic security system for a mobile device according to a third embodiment of the present invention.
- the password security system for a mobile device includes a background system 800, a smart phone 900, and a wearable device 920.
- the background system 800 has:
- the first counter 811 generates a count value and counts the number of times the count value compares the count value
- a public and private key generating unit 812 configured to generate a public key and a private key
- the encryption/decryption module 813 is configured to acquire a user password in the password generation phase, and encrypt the user password, the counter value generated by the counter, and the public key generated by the public-private key generating unit to generate a password for transmitting the password ciphertext to the smart phone 900.
- the processing unit 912 is configured to parse the count value from the second password ciphertext sent by the smart phone 900 in the password verification phase, and compare the parsed count value with the count value stored by the first counter 811. The password verification of the second password ciphertext is performed only when the count value comparison is passed;
- the first network security channel 814 is configured to perform data transmission between the background system 800 and the smart phone 900.
- the smartphone 900 has:
- a second counter 911 storing a count value from the background system 800
- the cryptographic processing unit 912 receives the first ciphertext transmitted from the cryptographic module of the background system 800 and transmits the first ciphertext and the public key to the wearable device 900 during the password generation phase. In the password verification phase, Transmitting the count value stored by the second counter 911 to the wearable device 900 and receiving the following second password ciphertext returned from the wearable device 920, and the second password ciphertext (which may also include the username) Together) sent to the background system 800;
- a second network security channel 913 configured to perform data transmission between the background system 800 and the smart phone 900 (actually, the second network security channel 913 and the first network security channel 814 are a two-way secure transmission channel);
- the wearable device 920 is provided with:
- the storage module 921 is configured to store the password ciphertext and the public key sent from the smart phone 900 in the password generation phase;
- the encryption and decryption module 922 generates a second password ciphertext together with the password ciphertext public key that has been stored by the cryptographic processing unit 921 of the smart phone 900 in the password verification phase.
- the secure password input method implemented by the cryptographic security system for a mobile device of the third embodiment is also similar to the above embodiment, and there are also two processes: a password setting process and a user login process.
- the password setting process is:
- the password is generated by the encryption/decryption module 813 of the background system 800 based on the key to generate the first password ciphertext, and is determined by the background system 800.
- a counter 811 randomly generates a count value, the counter value, the public key and the first password ciphertext combined data is transmitted to the cryptographic processing unit 912 of the smart phone 900 via the first network security channel 814 and the second network security channel 913;
- the cryptographic processing unit 912 After receiving the data, the cryptographic processing unit 912 stores the count value in the second counter 911, and prompts the user to bring the wearable device 920 closer to the smart phone 900 by means of a prompt tone or the like, and receives the received data from the background system 800.
- the public key and the first password ciphertext are transmitted to the storage module 921 of the wearable device 900 via a NFC or the like.
- the user login process flow is:
- the encryption and decryption module 912 of the wearable device 900 generates a new password ciphertext, that is, the second password ciphertext, based on the previously stored public key and the received count value, and then transmits the message through a non-contact method such as NFC.
- the password processing unit 912 of the smart phone 900 at this time, the cryptographic processing unit 912 increments the count value of the second counter 911 by 1, and prompts the password input to be completed in a prompt tone or the like;
- the login application obtains the second password ciphertext through the cryptographic processing unit 913, and transmits it to the background system 800 through the second network security channel 913 and the first network security channel 814 together with the user name;
- the background system 800 parses the second password ciphertext using the private key of the public-private key generation unit 812, and compares the extracted count value with the count value of the first counter of the background system 800, regardless of whether the comparison is successful or not.
- the background counter is incremented by 1. After the comparison is passed, the extracted second password ciphertext is decrypted to verify the password, the password verification is passed, and the user identity login process is completed.
- the user only needs to bring the wearable device 920 close to the smart phone 900 to complete the login, which is simple and easy to use.
- the password ciphertext generated by the wearable device 920 is dynamically generated every time, it is valid once and cannot be copied and used.
- the wearable device 920 is lost, the stolen person cannot obtain the actual password because the password is stored in the password.
- the stealer's own mobile phone cannot cooperate with the wearable device 920 and pass through the background due to the lack of the count value.
- the authentication of the system 900 similarly, if the user smartphone 900 device is lost, the identity verification of the user in the background cannot be completed due to the lack of the password ciphertext on the wearable device 900.
- the thief can not obtain the password through network monitoring, cracking, etc. These methods greatly improve the security of the user password and improve the security protection of the user identity login. Of course, since the device is lost and still needs to be used, the user can synchronize the counter with the background and regenerate a password ciphertext by other security mechanisms, which will not be described in detail here.
- the cryptographic security system for a mobile device and the cryptographic security input method for the mobile device of the present invention use a mobile device such as a wearable device to store a password instead of a human brain, without using a memory password.
- a mobile device such as a wearable device to store a password instead of a human brain
- This makes it possible to set up a very complex combination of passwords, which increases the difficulty of password cracking and greatly enhances the user experience.
- the password ciphertext form is adopted, which can effectively prevent the malicious stealing, and can improve the security of the password use.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephone Function (AREA)
Abstract
本发明涉及一种用于移动设备的密码安全系统及其使用方法。该系统具备:安全设备,在密码生成阶段用于获取密码并根据该密码生成密码密文后传输给第一移动设备,在密码验证阶段用于验证从第一移动设备发送来的密码密文;第一移动设备,在密码生成阶段用于从安全设备接收生成的密码密文并且传输到第二移动设备,在密码验证阶段用于从第二移动设备读取密码密文并发送到安全设备;第二移动设备,在密码生成阶段用于存储从第一移动设备接收到的密码密文,在密码验证阶段用于向第一移动设备提供存储的密码密文。利用本发明能够提高密码使用的安全性和便捷性。
Description
本发明涉及移动通信技术,具体地涉及一种用于移动设备的密码安全系统以及用于移动设备的密码安全输入方法。
随着智能移动设备逐渐成为个人生活小助理,越来越多的个人信息存储在智能移动设备中,这些信息包含有个人密切相关的隐私信息,如个人照片、社交账户、游戏账户等信息,如何对这些个人隐私信息进行安全保护是用户对智能手机的一大安全需求。
现有的常用技术手段使用的是密码的方式,即让用户设置一个密码,当用户要保护个人信息时,则要求用户输入密码之后,智能移动设备判断密码是否正确,若正确,则对个人信息进行加密;之后,若用户需要查看个人信息时,同样输入密码,系统判断密码正确后,对个人信息进行解密以供用户查看。
然而,这种方式也会存在以下两个问题:
(1)为了保证安全性,当前密码使用的是字符形式且需要一定的复杂组合,这给密码增强安全度,降低被破解风险的同时,也带来一个现实的问题,即密码若有一段时间不用,用户将容易忘记,从而造成个人信息无法解密,为用户带来不便。
(2)密码以本地存储方式存在智能手机上,而由于智能手机在安全性方面的欠缺,无法防御恶意程序窃取,就算主密钥以密文形式进行存储,则对主密钥进行加密的密钥也是存在智能手机上,也无法从根本上防御密码被破解的风险。同时,由于用户每次查看个人隐私信息时,都需要输入密码,这也大大增加了被恶意程序以中间人攻击方式窃取密码的风险。
发明内容
鉴于上述问题,本发明旨在提供一种能够解决密码使用过程中记忆困难和容易被窃取的问题并且实现密码的安全输入的用于移动设备的密码安全系统以及用于移动设备的密码安全输入方法。
本发明的用于移动设备的密码安全系统,其特征在于,具备:
安全设备,在密码生成阶段用于获取密码并根据该密码生成密码密文后传输给下述的第一移动设备,在密码验证阶段用于验证从下述的第一移动设备发送来的密码密文;
第一移动设备,在密码生成阶段用于从所述安全设备接收生成的密码密文并且传输到下述的第二移动设备,在密码验证阶段用于从下述的第二移动设备读取密码密文并发送到所述安全设备;
第二移动设备,在密码生成阶段用于存储从所述第一移动设备接收到的密码密文,在密码验证阶段用于向所述第一移动设备提供存储的密码密文。
优选地,所述安全设备作为所述第一移动设备的一部分而构成。
优选地,所述安全设备为云设备或者安全单元。
优选地,所述第一移动设备为智能手机或平板电脑,所述第二移动设备为穿戴设备。
本发明的用于移动设备的密码安全系统,其特征在于,具备:
安全设备,在密码生成阶段用于获取密码并且根据该密码生成密码密文后传输给下述第二移动设备,在密码验证阶段用于验证从下述的第一移动设备发送来的密码密文;
第一移动设备,在密码验证阶段用于从下述的第二移动设备读取密码密文并发送到所述安全设备;
第二移动设备,在密码生成阶段用于存储从所述安全设备接收到的密码密文,在密码验证阶段用于向所述第一移动设备提供存储的密码密文。
优选地,所述安全设备作为所述第一移动设备中的一部分而构成。
优选地,所述安全设备具备:
交互界面模块,用于获取用户输入的原始密码;
可信存储模块,用于存储所述原始密码;
加解密模块,在密码生成阶段用于根据原始密码生成密码密文,在密码验证阶段
用于对从下述密码数据生成模块提取的密码密文进行解密并进行验证;
密码数据生成模块,在密码生成阶段用于根据所述密码密文生成密码数据,在密码验证阶段用于从来自下述第二移动设备的密码数据中提取密码密文;
第一信息接收模块,用于在所述安全设备和所述第一移动设备之间以及/或者所述安全设备和所述第二移动设备之间进行数据交互,
所述第二移动设备具备:
存储模块,在密码生成阶段用于存储从安全模块发送来的所述密码数据;
密码数据展示模块,在密码验证阶段用于展示由所述存储模块存储的所述密码数据,
所述第一移动设备具备:
密码数据读取模块,用于读取所述密码数据展示模块所展示的密码数据;
第二信息接收模块,用于在所述第一移动设备和所述安全设备之间以及/或者所述第一移动设备和所述第二移动设备之间进行数据交互。
优选地,所述密码数据生成模块是二维码生成模块,
所述二维码生成模块在密码生成阶段用于根据所述密码密文生成二维码,在密码验证阶段用于从来自第二移动设备的密码数据中提取二维码,
所述密码数据展示模块是二维码展示模块,
所述二维码展示模块在密码验证阶段用于展示作为由所述存储模块存储的密码数据的二维码,
所述密码数据读取模块是摄像头,所述摄像头用于读取所述二维码展示模块展示的二维码。
优选地,所述密码数据生成模块是条形码生成模块,所述条形码生成模块在密码生成阶段用于根据所述密码密文生成条形码,在密码验证阶段用于从来自第二移动设备的密码数据中提取条形码,
所述密码数据展示模块是条形码展示模块,
所述条形码展示模块在密码验证阶段用于展示作为由所述存储模块存储的密码数据的条形码,
所述密码数据读取模块是摄像头,所述摄像头用于读取所述条形码展示模块展示的条形码。
优选地,所述第一移动设备为智能手机或平板电脑,所述第二移动设备是可穿戴设备,所述安全设备作为所述智能手机的一部分而设置在所述智能手机的TEEI中。
优选地,所述安全设备与所述第二移动设备之间的数据传送通过非接通信实现。
本发明的用于移动设备的密码安全输入方法,该方法利用安全设备、第一移动设备以及第二移动设备实现,其特征在于,包括下述步骤:
密码生成步骤,安全设备获取密码并且将该密码加密生成密码密文后通过第一移动设备传输到第二移动设备或者直接传送到第二移动设备;
密码存储步骤,第二移动设备存储所述密码密文;
密码输入步骤,用户在需要输入密码时,第二移动设备向第一移动设备展示密码密文,由第一移动设备获取密码密文并发送到安全设备;
密码验证步骤,安全设备将从第一移动设备发送来的密码密文解密并验证解密后的密码。
优选地,所述安全设备与所述第二移动设备之间的数据传送通过非接通信实现。
优选地,所述密码密文采用二维码或者条形码。
本发明的用于移动设备的密码安全系统包括,其特征在于,包括:后台系统、第一移动设备、以及第二移动设备,
其中,后台系统具备:
第一计数器,用于产生计数值并且对计数值比对次数进行计数;
公私钥生成单元,用于生成公钥和私钥;
加解密模块,在密码生成阶段,用于获取用户密码,并且将用户密码、上述第一计数器产生的计数值以及上述公私钥生成单元生成的公钥一起加密后生成密码密文发送到第一移动设备,在密码验证阶段,用于从第一移动设备发送来的下述第二密码密文中解析出计数值并且将该解析出的计数值与所述第一计数器存储的计数值进行比对,仅在计数值比对通过的情况下才对第二密码密文进行密码验证;
第一网络安全通道,用于在后台系统和第一移动设备之间进行数据传输,
第一移动设备具备:
第二计数器,存储来自后台系统的计数值;
密码处理单元,在密码生成阶段,接收从所述后台系统传输来的第一密码密文并且将第一密码密文和公钥传输给第二移动设备,在密码验证阶段,将所述第二计数器所存储的计数值发送给第二移动设备并且接收从所述第二移动设备返回的下述的第二密码密文,将所述第二密码密文发送到后台系统;
第二网络安全通道,用于在后台系统和第一移动设备之间进行数据传输;
所述第二移动设备具备:
存储模块,在密码生成阶段用于存储从第一移动设备发送来的密码密文和公钥;以及
加解密模块,在密码验证阶段将从所述第一移动设备发送来的计数值与所述存储模块已经存储的密码密文公钥一起生成第二密码密文。
优选地,所述第一移动设备为智能手机或者平板电脑,所述第二移动设备是可穿戴设备。
优选地,所述第一移动设备和所述第二移动设备之间通过非接方式进行通讯。
综上所述,本发明的用于移动设备的密码安全系统以及用于移动设备的密码安全输入方法,通过来利用另一个移动设备例如穿戴设备来代替人脑对密码进行存储,不用记忆密码,由此可以设置非常复杂的密码组合,提高了密码被破解的难度,大大提升了用户的体验。而且,在密码的传输中都是采用密码密文形式,能够有效地防止不被恶意窃取,能够提高密码使用的安全性。
图1是表示本发明的用于移动设备的密码安全系统的框架图。
图2是表示本发明的密码安全输入方法的具体步骤的流程图。
图3是本发明第一实施方式的用于移动设备的密码安全系统的构造图。
图4是本发明第二实施方式的用于移动设备的密码安全系统的构造图。
图5是本发明第二实施方式的用于移动设备的密码安全系统的构造图。
下面介绍的是本发明的多个实施例中的一些,旨在提供对本发明的基本了解。并不旨在确认本发明的关键或决定性的要素或限定所要保护的范围。
随着新技术的发展,各种移动设备不断涌现,用户随身携带多个移动设备已经成为可能,例如同时携带智能手机和各种可穿戴设备等。本发明就是利用用户随身携带多个移动设备的优势,提供一种能够可靠、便利地输入用户密码的密码安全系统以及密码安全输入方法。
下面对于本发明的用于移动设备的密码安全系统进行说明。
图1是表示本发明的用于移动设备的密码安全系统的框架图。
如图1所示,本发明的用于移动设备的密码安全系统具备:安全设备100、第一移动设备200、第二移动设备300。
安全设备100在密码生成阶段用于对用户设定的密码加密生成密码密文并且将生成的密码密文传输给第一移动设备200在密码验证阶段用于验证将从下述的第一移动设备发送来的密码解密后进行验证。
第一移动设备200在密码生成阶段用于从所述安全设备100接收生成的密码密文并且传输到第二移动设备300,在密码验证阶段用于从第二移动设备300读取密码密文并发送到安全设备100。
第二移动设备300在密码生成阶段用于存储从第一移动设备200接收到的密码密文,在密码验证阶段用于向第一移动设备100提供存储的密码密文。
其中,安全设备100获取第一移动设备200使用时需要输入的密码(一般可以由用户进行输入),根据该密码生成加密的密文,通过通信通道传递第一移动设备200,第一移动设备200再通过通信通道传递给第二移动设备300,由第二移动设备300对密码密文进行存储。这样,在第一移动设备100上需要使用密码时,由第一移动设备200展示存储的从第二移动设备300读入密码后,发送到安全设备100,安全设备100对读入的密码进行验证,根据验证结果通知第一移动设备200密码验证是否通过。在本发明中,用第二移动设备300代替了人脑来记忆第一移动设备200的密码,利用移动设备相比人脑所具备的强大的计算能力和通讯接口能力,由此能够提升密码输入方式的安全形和便捷性。
在本发明中,安全设备100可以是作为一个单独的设备独立存在,例如,
安全设备100是云设备或者一个安全单元。当然,安全设备100也可以是属于第一移动设备200的一部分而存在。
这里,例如作为一个优选方式,第一移动设备100可以是智能手机、平板电脑,安全设备100可以是设置在该智能手机、平板电脑中的一部分单元,只要是能够完成密码生成和验证功能即可,另一方面,第二移动设备300可以是一种穿戴设备。
接着,对于利用本发明的用于移动设备的密码安全系统实现的密码安全输入方法进行说明。图2是表示本发明的密码安全输入方法的流程图。
如图2所示,本发明的密码安全输入方法包括下述步骤:
密码生成步骤S100:利用安全设备100获取密码并且将该密码加密生成密码密文后通过第一移动设备200传输到第二移动设备300或者直接传送到第二移动设备300;
密码存储步骤S200:第二移动设备300存储所述密码密文;
密码输入步骤S300:用户在需要输入密码时,第二移动设备300向第一移动设备200展示密码密文,由第一移动设备200获取密码密文并发送到安全设备100;
密码验证步骤S400:安全设备100将从第一移动设备200发送来的密码密文解密并验证解密后的密码。
第一实施方式
接着,对于本发明第一实施方式的用于移动设备的密码安全系统进行说明。
图3是本发明第一实施方式的用于移动设备的密码安全系统的构造图。
如图3所示,本发明第一实施方式的用于移动设备的密码安全系统包括智能手机400和可穿戴设备500。其中,智能手机400中包括TEEI区(Trusted Executive Environment Integration,可信执行环境)410和安卓区420。在第一实施方式中,TEEI区410相当于上述的安全设备、安卓区420相当于上述的第一移动设备、可穿戴设备500相当于上述的第二移动设备。
在当前的技术中,TEEI(Trusted Execution Environment Integration,可信执行环境)是为了解决当前移动智能终端存在的安全风险而提出的技术,TEEI构造了一个与移动智能终端操作系统(例如Android、iOS、WindowsPhone)隔
离的安全运行环境。TEEI可以是位于移动智能终端主处理器中的安全区域,能够保证在可信的环境中进行敏感数据的存储、处理和保护。TEEI为授权的安全软件(可信软件)提供了安全的执行环境,通过执行保护、保密、完整和数据访问权限实现了端到端的安全。
TEEI区410具备:
可信交互界面模块411,用于获取用户输入的原始密码;
可信存储模块412,用于存储所述原始密码;
加解密模块413,在密码生成阶段用于根据原始密码生成密码密文,在密码验证阶段用于对从二维码生成模块414提取的密码密文进行解密并进行验证;
二维码生成模块414,在密码生成阶段用于根据所述密码密文生成二维码,在密码验证阶段用于从来自可穿戴设备500中提取密码密文;
第一信息接收模块415,用于在TEEI区410和安卓区420之间以及/或者所述TEEI区410和可穿戴设备500之间进行数据交互。
安卓区420具备:
摄像头421,用于读取所述二维码展示模块512所展示的密码密文;
第二信息接收模块422,用于在安卓区420和TEEI区410之间以及/或者可穿戴设备500进行数据交互。
所述可穿戴设备500具备:
存储模块511,在密码生成阶段用于存储从TEEI区410发送来的密码密文;
二维码展示模块512,在密码验证阶段用于展示由存储模块511存储的密码密文。
其中,TEEI区410和可穿戴设备500之间的数据传送通过非接通信实现,例如NFC或者蓝牙。
在第一实施方式中,以智能手机中的TEEI区410作为支撑密码处理的安全平台,可保证密码生成过程的安全性,由可穿戴设备500存储密码,避免用户记忆密码的问题。
接着,对于利用该第一实施方式的用于移动设备的密码安全系统实现的密码的安全输入方法的流程进行具体说明。
该具体的流程可以简单分为密码生成过程(相当于上述的密码生成步骤S100和密码存储步骤S200)和使用过程(相当于上述的密码输入步骤S300和密
码验证步骤S400):
密码的生成过程为:
(1)用户设置密码时,通过TEEI区410提供的可信交互界面模块411获取用户输入的密码,传给加解密模块413;
(2)加解密模块413使用可信存储模块412存储密码,并使用密钥采用常用的加密方法如3DES、AES等对密码进行加密,生成密码密文,传给二维码模块414;
(3)二维码模块414基于该密文生成一个二维码,生成后以提示音等方式提示用户,用户通过可穿戴设备500靠近手机,使密码密文即二维码通过NFC传送到可穿戴设备500的存储模块511进行存储。
由上述过程可见,密码从输入到加密口令密文的生成都是处于TEEI的保护下,传输过程中也是密文形式,并不会被恶意程序获取,同时由于以可信存储的方式进行存储,避免了密码被恶意程序进行本地获取并破解的风险。
密码使用过程:
(1)当用户要对智能手机上的某部分个人信息,如目录、文件等信息进行加密保护时,加密应用以打开摄像头的方式提示用户输入密码;
(2)用户通过操作可穿戴设备500显示加密码密文二维码,用户摄像头421读入后,由摄像头421把数据传往二维码模块414,二维码模块414进行解析提取密码密文后传送给加解密模块413进行解密及验证,验证通过则通知系统对用户个人信息进行加密。
这样,当用户要查看加密的个人信息时,用户打开摄像头421读入可穿戴设备500上的二维码并以上述过程一样提取出密码并验证,由加解密模块413通知系统对个人信息进行解密以供用户查看。在这一过程中,由于是否需要通知系统进行个人信息加解密都是有TEEI下的加解密模块413发出,因而大大降低了个人信息被恶意程序非法加密及解密的风险。
而且,从体验上来说,相比现有的方式,本发明的密码安全输入方式从原有的密码手动输入变成摄像头拍摄即可,操作简单且易用,密码只在设置时输入一次即可,用户也不用记忆该密码,可设置非常复杂的密码组合,提高被破解难度,也大大提升了用户体验。
第二实施方式
图4是本发明第二实施方式的用于移动设备的密码安全系统的构造图。
如图4所示,本发明第二实施方式的用于移动设备的密码安全系统包括智能手机600和可穿戴设备700。其中,智能手机600中包括TEEI区(Trusted Executive Environment Integration,可信执行环境)610和安卓区620。在第一实施方式中,TEEI区610相当于上述的安全设备、安卓区620相当于上述的第一移动设备、可穿戴设备700相当于上述的第二移动设备。
TEEI区610具备:
可信交互界面模块611,用于获取用户输入的原始密码;
可信存储模块612,用于存储所述原始密码;
加解密模块613,在密码生成阶段用于根据原始密码生成密码密文,在密码验证阶段用于对从条形码生成模块414提取的密码密文进行解密并进行验证;
条形码生成模块614,在密码生成阶段用于根据所述密码密文生成条形码,在密码验证阶段用于从来自可穿戴设备700中提取密码密文;
第一信息接收模块615,用于在TEEI区610和安卓区620之间以及/或者所述TEEI区610和可穿戴设备700之间进行数据交互。
安卓区620具备:
摄像头621,用于读取所述条形码展示模块712所展示的密码密文;
第二信息接收模块622,用于在安卓区620和TEEI区610之间以及/或者可穿戴设备700进行数据交互。
所述可穿戴设备700具备:
存储模块711,在密码生成阶段用于存储从TEEI区610发送来的密码密文;
条形码展示模块712,在密码验证阶段用于展示由存储模块711存储的密码密文。
其中,TEEI区610和可穿戴设备700之间的数据传送通过非接通信实现,例如NFC或者蓝牙。
在第二实施方式中,以智能手机中的TEEI区610作为支撑密码处理的安全平台,可保证密码生成过程的安全性,由可穿戴设备700存储密码,能够避免用户记忆密码的问题。
该第二实施方式的密码生成过程和使用过程与上述第一实施方式的密码
生成过程和使用过程是相同的。
另外,在第一实施方式中采用了二维码,在第二实施方式中采用了条形码,这里二维码或者条形码只是一种密码密文的展现形式,只要安全设备与第一移动设备之间能约定这个展现形式即可,所以,从这个点上来说,只要是能有代表文字、数字等信息的展现方法都可以,就是直接展现密码密文数字也是可以的。
第三实施方式
由上述第一具体实施方式和第二具体实施方式可知,在本发明中对密码的保护措施改进主要是通过一个额外的移动智能设备来代替人脑进行密码输入的,使密码摆脱了由于人脑与智能设备之间计算能力不匹配所带来的输入样式过于单一、固定的问题。
在此基础上,发明人进一步发现如果对加密口令进行动态变化,使每次可穿戴设备生成的加密密文都是一次动态生成,可更好地排除被复制的风险。
基于这个变换机制,在本发明的第三实施方式中就是把这样的方案运用在现有的无卡支付的用户登录保护上,能够解决现有无卡支付在用户身份登录时登录密码容易被窃取的问题,提高登录过程安全性的同时,提升用户体验。
图5是本发明第三实施方式的用于移动设备的密码安全系统的构造图。
如图5所示,本发明第三实施方式的用于移动设备的密码安全系统包括:后台系统800、智能手机900、可穿戴设备920。
其中,后台系统800具备:
第一计数器811,产生计数值并且对计数值比对计数值的次数进行计数;
公私钥生成单元812,用于生成公钥和私钥;
加解密模块813,在密码生成阶段用于获取用户密码,并且将用户密码、上述计数器产生的计数值以及上述公私钥生成单元生成的公钥一起加密后生成密码密文发送到智能手机900的密码处理单元912,在密码验证阶段用于从智能手机900的发送来的下述第二密码密文中解析出计数值并且将该解析出的计数值与第一计数器811存储的计数值进行比对,仅在计数值比对通过的情况下才对第二密码密文进行密码验证;
第一网络安全通道814,用于在后台系统800和智能手机900之间进行数据传输。
智能手机900具备:
第二计数器911,存储来自所述后台系统800的计数值;
密码处理单元912,在密码生成阶段接收从所述后台系统800的加解密模块传输来的第一密码密文并且将第一密码密文和公钥传输给可穿戴设备900,在密码验证阶段,将第二计数器911所存储的计数值发送给可穿戴设备900并且接收从所述可穿戴设备920返回的下述的第二密码密文,将所述第二密码密文(也可以包含用户名一起)发送到后台系统800;
第二网络安全通道913,用于在后台系统800和智能手机900之间进行数据传输(实际上第二网络安全通道913和第一网络安全通道814是一条双向的安全传输通道);
所述可穿戴设备920具备:
存储模块921,在密码生成阶段用于存储从智能手机900发送来的密码密文和公钥;以及
加解密模块922,在密码验证阶段将从所述智能手机900的密码处理单元912发送来的计数值与所述存储模块921已经存储的密码密文公钥一起生成第二密码密文。
利用该第三实施方式的用于移动设备的密码安全系统实现的安全密码输入方法也与上述实施方式类似,也存在两个过程:密码设置过程和用户登录过程。
密码设置流程为:
(1)当用户使用智能手机900进行注册时,在网站上输入用户名和登录密码后,密码由后台系统800的加解密模块813基于密钥生成第一密码密文,并由后台系统800的第一计数器811随机生成一个计数值,把该计数值、公钥与第一密码密文合成一个数据经过第一网络安全通道814、第二网络安全通道913传送到智能手机900的密码处理单元912;
(2)密码处理单元912收到数据后,将计数值存储在第二计数器911中,再通过提示音等方式提示用户将可穿戴设备920靠近智能手机900,把从上述后台系统800收到的公钥与第一密码密文经由NFC等非接方式传送给可穿戴设备900的存储模块921加以存储。
用户登录过程流程为:
(1)当用户在智能手机900上进行登录要输入密码时,通过提示音等方式提示用户将可穿戴设备920靠近智能手机900,密码处理单元912将第二计数器911的计数值通过NFC等非接方式发送给可穿戴设备900的加密解密模块912;
(2)可穿戴设备900的加解密模块912基于之前保存的公钥和收到的计数值,生成一个新的密码密文,即第二密码密文,接着,通过NFC等非接方式传送会给智能手机900的密码处理单元912,此时密码处理单元912使得第二计数器911的计数值加1,并以提示音等方式提示密码输入完成;
(3)登录应用通过密码处理单元913获得第二密码密文,并与用户名一起通过第二网络安全通道913和第一网络安全通道814、传输给后台系统800;
(4)后台系统800使用公私钥生成单元812的私钥解析第二密码密文,并将提取出的计数值与后台系统800的第一计数器的计数值进行比对,不管是否比对成功,后台计数器都加1。比对通过后,在对提取出的第二密码密文进行解密以验证密码,密码验证通过,用户身份登录过程完成。
在这一过程中,用户只需将可穿戴设备920靠近智能手机900,即可完成登录,简单易用。在安全性上,由于可穿戴设备920每次生成的密码密文都是动态生成的,一次有效,无法被复制使用。此外,可穿戴设备920丢失后,由于存储的是密码密文,窃取者也无法获取到实际的密码,同时,窃取者自己的手机也由于缺乏计数值,无法与可穿戴设备920配合后通过后台系统900的身份验证;同理,若用户智能手机900设备丢失,由于缺失可穿戴设备900上的密码密文,也无法完成使后台完成用户的身份验证。此外,加上网络传输过程中都是密文形式,窃取者也无法通过网络监听、破解等方式获取密码,这些方式都大大提升了用户密码的安全性,提高了对用户身份登录的安全保护。当然,由于丢失了设备之后,还想继续用,用户可以其他安全机制与后台交互同步计数器或者重新生成一个密码密文,在此不做详述。
综上所述,本发明的用于移动设备的密码安全系统以及用于移动设备的密码安全输入方法,通过来利用另一个移动设备例如穿戴设备来代替人脑对密码进行存储,不用记忆密码,由此可以设置非常复杂的密码组合,提高了密码被破解的难度,大大提升了用户的体验。而且,在密码的传输中都是采用密码密文形式,能够有效地防止不被恶意窃取,能够提高密码使用的安全性。
上例子主要说明了本发明的用于移动设备的密码安全系统以及用于移动设备的密码安全输入方法。尽管只对其中一些本发明的具体实施方式进行了描述,但是本领域普通技术人员应当了解,本发明可以在不偏离其主旨与范围内以许多其他的形式实施。因此,所展示的例子与实施方式被视为示意性的而非限制性的,在不脱离如所附各权利要求所定义的本发明精神及范围的情况下,本发明可能涵盖各种的修改与替换。
Claims (17)
- 一种用于移动设备的密码安全系统,其特征在于,具备:安全设备,在密码生成阶段用于获取密码并根据该密码生成密码密文后传输给下述的第一移动设备,在密码验证阶段用于验证从下述的第一移动设备发送来的密码密文;第一移动设备,在密码生成阶段用于从所述安全设备接收生成的密码密文并且传输到下述的第二移动设备,在密码验证阶段用于从下述的第二移动设备读取密码密文并发送到所述安全设备;第二移动设备,在密码生成阶段用于存储从所述第一移动设备接收到的密码密文,在密码验证阶段用于向所述第一移动设备提供存储的密码密文。
- 如权利要求1所述的用于移动设备的密码安全系统,其特征在于,所述安全设备作为所述第一移动设备的一部分而构成。
- 如权利要求1所述的用于移动设备的密码安全系统,其特征在于,所述安全设备为云设备或者安全单元。
- 如权利要求1~3任意一项所述的用于移动设备的密码安全系统,其特征在于,所述第一移动设备为智能手机或平板电脑,所述第二移动设备为穿戴设备。
- 一种用于移动设备的密码安全系统,其特征在于,具备:安全设备,在密码生成阶段用于获取密码并且根据该密码生成密码密文后传输给下述第二移动设备,在密码验证阶段用于验证从下述的第一移动设备发送来的密码密文;第一移动设备,在密码验证阶段用于从下述的第二移动设备读取密码密文并发送到所述安全设备;第二移动设备,在密码生成阶段用于存储从所述安全设备接收到的密码密文,在密码验证阶段用于向所述第一移动设备提供存储的密码密文。
- 如权利要求5所述的用于移动设备的密码安全系统,其特征在于,所述安全设备作为所述第一移动设备中的一部分而构成。
- 如权利要求6所述的用于移动设备的密码安全系统,其特征在于,所述安全设备具备:交互界面模块,用于获取用户输入的原始密码;可信存储模块,用于存储所述原始密码;加解密模块,在密码生成阶段用于根据原始密码生成密码密文,在密码验证阶段用于对从下述密码数据生成模块提取的密码密文进行解密并进行验证;密码数据生成模块,在密码生成阶段用于根据所述密码密文生成密码数据,在密码验证阶段用于从来自下述第二移动设备的密码数据中提取密码密文;第一信息接收模块,用于在所述安全设备和所述第一移动设备之间以及/或者所述安全设备和所述第二移动设备之间进行数据交互,所述第二移动设备具备:存储模块,在密码生成阶段用于存储从安全模块发送来的所述密码数据;密码数据展示模块,在密码验证阶段用于展示由所述存储模块存储的所述密码数据,所述第一移动设备具备:密码数据读取模块,用于读取所述密码数据展示模块所展示的密码数据;第二信息接收模块,用于在所述第一移动设备和所述安全设备之间以及/或者所述第一移动设备和所述第二移动设备之间进行数据交互。
- 如权利要求7所述的用于移动设备的密码安全系统,其特征在于,所述密码数据生成模块是二维码生成模块,所述二维码生成模块在密码生成阶段用于根据所述密码密文生成二维码,在密码验证阶段用于从来自第二移动设备的密码数据中提取二维码,所述密码数据展示模块是二维码展示模块,所述二维码展示模块在密码验证阶段用于展示作为由所述存储模块存储的密码数据的二维码,所述密码数据读取模块是摄像头,所述摄像头用于读取所述二维码展示模块展示的二维码。
- 如权利要求7所述的用于移动设备的密码安全系统,其特征在于,所述密码数据生成模块是条形码生成模块,所述条形码生成模块在密码生成阶段用于根据所述密码密文生成条形码,在密码验证阶段用于从来自第二移动设备的密码数据中提取条形码,所述密码数据展示模块是条形码展示模块,所述条形码展示模块在密码验证阶段用于展示作为由所述存储模块存储的密码数据的条形码,所述密码数据读取模块是摄像头,所述摄像头用于读取所述条形码展示模块展示的条形码。
- 如权利要求5~9任意一项所述的用于移动设备的密码安全系统,其特征在于,所述第一移动设备为智能手机或平板电脑,所述第二移动设备是可穿戴设备,所述安全设备作为所述智能手机的一部分而设置在所述智能手机的TEEI中。
- 如权利要求10所述的用于移动设备的密码安全系统,其特征在于,所述安全设备与所述第二移动设备之间的数据传送通过非接通信实现。
- 一种用于移动设备的密码安全输入方法,该方法利用安全设备、第一移动设备以及第二移动设备实现,其特征在于,包括下述步骤:密码生成步骤,安全设备获取密码并且将该密码加密生成密码密文后通过第一移动设备传输到第二移动设备或者直接传送到第二移动设备;密码存储步骤,第二移动设备存储所述密码密文;密码输入步骤,用户在需要输入密码时,第二移动设备向第一移动设备展示密码密文,由第一移动设备获取密码密文并发送到安全设备;密码验证步骤,安全设备将从第一移动设备发送来的密码密文解密并验证解密后的密码。
- 如权利要求12所述的用于移动设备的密码安全输入方法,其特征在于,所述安全设备与所述第二移动设备之间的数据传送通过非接通信实现。
- 如权利要求12所述的用于移动设备的密码安全输入方法,其特征在于,所述密码密文采用二维码或者条形码。
- 一种用于移动设备的密码安全系统包括,其特征在于,包括:后台系统、第一移动设备、以及第二移动设备,其中,后台系统具备:第一计数器,用于产生计数值并且对计数值比对次数进行计数;公私钥生成单元,用于生成公钥和私钥;加解密模块,在密码生成阶段,用于获取用户密码,并且将用户密码、上述第一计数器产生的计数值以及上述公私钥生成单元生成的公钥一起加密后生成密码密文发送到第一移动设备,在密码验证阶段,用于从第一移动设备发送来的下述第二密码密文中解析出计数值并且将该解析出的计数值与所述第一计数器存储的计数值进行比对,仅在计数值比对通过的情况下才对第二密码密文进行密码验证;第一网络安全通道,用于在后台系统和第一移动设备之间进行数据传输,第一移动设备具备:第二计数器,存储来自后台系统的计数值;密码处理单元,在密码生成阶段,接收从所述后台系统传输来的第一密码密文并且将第一密码密文和公钥传输给第二移动设备,在密码验证阶段,将所述第二计数器所存储的计数值发送给第二移动设备并且接收从所述第二移动设备返回的下述的第二密码密文,将所述第二密码密文发送到后台系统;第二网络安全通道,用于在后台系统和第一移动设备之间进行数据传输;所述第二移动设备具备:存储模块,在密码生成阶段用于存储从第一移动设备发送来的密码密文和公钥;以及加解密模块,在密码验证阶段将从所述第一移动设备发送来的计数值与所述存储模块已经存储的密码密文公钥一起生成第二密码密文。
- 如权利要求15所述的用于移动设备的密码安全系统,其特征在于,所述第一移动设备为智能手机或者平板电脑,所述第二移动设备是可穿戴设备。
- 如权利要求16所述的用于移动设备的密码安全系统,其特征在于,所述第一移动设备和所述第二移动设备之间通过非接方式进行通讯。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510616410.3 | 2015-09-24 | ||
CN201510616410.3A CN105592056A (zh) | 2015-09-24 | 2015-09-24 | 用于移动设备的密码安全系统及其密码安全输入方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017050152A1 true WO2017050152A1 (zh) | 2017-03-30 |
Family
ID=55931273
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/098824 WO2017050152A1 (zh) | 2015-09-24 | 2016-09-13 | 用于移动设备的密码安全系统及其密码安全输入方法 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105592056A (zh) |
WO (1) | WO2017050152A1 (zh) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105592056A (zh) * | 2015-09-24 | 2016-05-18 | 中国银联股份有限公司 | 用于移动设备的密码安全系统及其密码安全输入方法 |
CN106066965B (zh) * | 2016-05-30 | 2020-03-17 | 宇龙计算机通信科技(深圳)有限公司 | 加密方法、加密装置和加密系统 |
CN108062467A (zh) * | 2017-12-16 | 2018-05-22 | 深圳市飞马国际供应链股份有限公司 | 基于蓝牙的快捷验证方法、设备和系统 |
CN111159696A (zh) * | 2019-12-31 | 2020-05-15 | 中国银行股份有限公司 | 一种密码保存、查看方法、系统及密码管理系统 |
CN113792276A (zh) * | 2021-11-11 | 2021-12-14 | 麒麟软件有限公司 | 基于双体系结构的操作系统用户身份认证方法及系统 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101997678A (zh) * | 2010-11-18 | 2011-03-30 | 东莞宇龙通信科技有限公司 | 一种获取密码的方法及终端 |
CN103237305A (zh) * | 2013-03-27 | 2013-08-07 | 公安部第三研究所 | 面向移动终端上的智能卡密码保护方法 |
CN104092550A (zh) * | 2014-07-23 | 2014-10-08 | 三星电子(中国)研发中心 | 密码保护方法、系统及装置 |
CN204046622U (zh) * | 2014-06-09 | 2014-12-24 | 北京石盾科技有限公司 | 一种密钥存储设备 |
CN105592056A (zh) * | 2015-09-24 | 2016-05-18 | 中国银联股份有限公司 | 用于移动设备的密码安全系统及其密码安全输入方法 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102054146A (zh) * | 2009-11-06 | 2011-05-11 | 深圳市研祥通讯终端技术有限公司 | 一种开机密码保护方法和装置 |
CN103049686A (zh) * | 2011-10-11 | 2013-04-17 | 镇江精英软件科技有限公司 | 用Usb Key来实现数据库和用户信息验证方法 |
CN104484596B (zh) * | 2015-01-07 | 2018-02-13 | 宇龙计算机通信科技(深圳)有限公司 | 多操作系统中创建密码的方法及终端 |
CN104834863A (zh) * | 2015-03-31 | 2015-08-12 | 努比亚技术有限公司 | Wi-Fi密码存储方法及装置 |
CN104883686A (zh) * | 2015-05-28 | 2015-09-02 | 中国工商银行股份有限公司 | 一种用于移动终端的安全认证方法、装置、系统及可穿戴设备 |
-
2015
- 2015-09-24 CN CN201510616410.3A patent/CN105592056A/zh active Pending
-
2016
- 2016-09-13 WO PCT/CN2016/098824 patent/WO2017050152A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101997678A (zh) * | 2010-11-18 | 2011-03-30 | 东莞宇龙通信科技有限公司 | 一种获取密码的方法及终端 |
CN103237305A (zh) * | 2013-03-27 | 2013-08-07 | 公安部第三研究所 | 面向移动终端上的智能卡密码保护方法 |
CN204046622U (zh) * | 2014-06-09 | 2014-12-24 | 北京石盾科技有限公司 | 一种密钥存储设备 |
CN104092550A (zh) * | 2014-07-23 | 2014-10-08 | 三星电子(中国)研发中心 | 密码保护方法、系统及装置 |
CN105592056A (zh) * | 2015-09-24 | 2016-05-18 | 中国银联股份有限公司 | 用于移动设备的密码安全系统及其密码安全输入方法 |
Also Published As
Publication number | Publication date |
---|---|
CN105592056A (zh) | 2016-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8930700B2 (en) | Remote device secure data file storage system and method | |
JP6399382B2 (ja) | 認証システム | |
US9800562B2 (en) | Credential recovery | |
CN112425114B (zh) | 受公钥-私钥对保护的密码管理器 | |
US20180082050A1 (en) | Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device | |
US11544365B2 (en) | Authentication system using a visual representation of an authentication challenge | |
CN106878245B (zh) | 图形码信息提供、获取方法、装置及终端 | |
US9621344B2 (en) | Method and system for recovering a security credential | |
JP2016502377A (ja) | 安全計算を用いて安全性を提供する方法 | |
CN103905188B (zh) | 利用智能密钥设备生成动态口令的方法和智能密钥设备 | |
WO2015133990A1 (en) | Methods and apparatus for migrating keys | |
WO2015188424A1 (zh) | 一种密钥存储设备及其使用方法 | |
WO2017050152A1 (zh) | 用于移动设备的密码安全系统及其密码安全输入方法 | |
US10867056B2 (en) | Method and system for data protection | |
EP3180725A1 (en) | Methods and systems for securing proofs of knowledge for privacy | |
CN105187382A (zh) | 防止撞库攻击的多因子身份认证方法 | |
KR20170124953A (ko) | 암호화된 otp를 모바일폰에서 지문 등을 이용하여 복호화하여 사용자 인증을 자동화하는 방법과 그 시스템 | |
JP2011505034A (ja) | 使い捨て用仮想秘密情報認証システムおよび認証方法 | |
JP2017530636A (ja) | 認証スティック | |
KR101834522B1 (ko) | 데이터 확인 장치 및 이를 이용하여 데이터를 확인하는 방법 | |
CN106330897A (zh) | 一种信息存储方法及系统 | |
JP6165044B2 (ja) | 利用者認証装置、システム、方法及びプログラム | |
JP2004320229A (ja) | 相互認証方法 | |
TWI746504B (zh) | 實現會話標識同步的方法及裝置 | |
CN117834242A (zh) | 验证方法、装置、设备、存储介质和程序产品 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16848034 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16848034 Country of ref document: EP Kind code of ref document: A1 |