Abstract:
The present disclosure provides a Bluetooth device and a working method thereof, which relates to application in information security field. The Bluetooth device includes a Bluetooth connecting module, a pairing module and a data communicating module. The working method includes a Bluetooth connecting process, a pairing process and a data communicating process, where the pairing process includes that the device computes an encryption key according to a preset authentication code, a first random number obtained from an initiator, a second random number generated by the device, encrypt the link encryption data containing a link encryption key by using the encryption key to obtain a link encryption request and sends the link encryption request to the imitator, and the initiator obtains the link encryption key from the link encryption request. The disclosure is compatible to the present Bluetooth protocol and enhances security in the Bluetooth device pairing process as well.
Abstract:
The disclosure provides a method for protecting PIN code on Android platform, including: introducing, by Java layer, start event to C layer after invoked by upper layer; invoking, by C layer, Java layer via JNI to generate a password-storage-class-instance after receiving start event, and invoking Java layer after receiving a handle returned by Java layer to monitor input from user; storing, by Java layer, PIN code data into a instance memory when Java layer monitors PIN code data from user, updating storage location identification, and introducing encrypting event to C layer; introducing, by Java layer, confirming event to C layer when Java layer monitors confirmation information from user; accessing, by C layer, the instance via handle to encrypt the PIN code data when receiving encrypting event; and accessing, by C layer, the instance via handle to decrypt the encrypted data in instance memory to obtain PIN code.
Abstract:
An implementing method for JavaCard application function expansion is provided, where a registering process includes: an expansion application processes a random number when receiving a registration command and sends a processing result, an expansion application identification and an expansion interface number to a master application; the master application verifies the process result, if verification is successful and an expansion application corresponding to the expansion application identification is installed, the master application sets a bit of an expansion point upon the expansion interface number, obtains and stores a handle of the expansion application; a state of an expansion interface registered by the expansion application is stored in the buffer. In solutions provided by the present invention, the expansion interface corresponding to the expansion application is registered to the master application; when needing to invoke the expansion application, the master application can invoke corresponding expansion application via the registered expansion interface.
Abstract:
An authentication method includes: receiving a command of an upper host; parsing an option parameter in the command; determining a value of a fingerprint authentication identifier in the option parameter, and if the value is a first preset value, prompting a user to input a fingerprint and verifying the fingerprint input to obtain a user operation verification result; if the value is a second preset value, prompting the user to press a key and verifying the key pressed to obtain a user operation verification result; determining the user operation verification result, and if the user operation verification result is success, setting an authentication mode confirmation identifier, obtaining client data from the command, generating data to be signed, signing the data to be signed to generate a signature result, sending the signature result to the upper host; if the user operation verification result is failure, reporting an error.
Abstract:
The present disclosure relates to the field of communications and, particularly to a visual card and an operating method for the visual card; the visual card includes a main control module, an antenna module, a power management module, a displaying module and a signal converting module; the main control module is connected to all of the antenna module, the power management module, the displaying module and the signal converting module, the signal converting module is connected to the antenna module; the main control module is configured to communicate with an external card read device via the antenna module, update and store key information; the main control module is further configured to monitor an exit signal according to an electronic signal input by the signal converting module.
Abstract:
A registering method involving an authenticating device includes: a client obtains a URI, obtains an application ID according to the URI, obtains a device registering request according to the application ID and a user identification input, and sends the request to a server; receives registering data from the server, and obtains a client data object according to a challenge value and the application ID in the registering data; hashes the client data object and the application ID to obtain a challenge parameter and an application parameter, sends registering request information combining the challenge parameter and application parameter; receives registering response information from the authenticating device, sends a key registering request combining the registering response information, client data object and session ID in the registering data to the server; and the registering is deemed successful if success information is received from the server, or is failed if otherwise.
Abstract:
The present invention provides a battery with display function and an electronic device containing the same; the battery includes a non-volatile display layer, a substrate layer and a power layer, the non-volatile display layer includes a first electrode layer, a display medium layer, a second electrode layer and a transparent medium layer; the power layer includes a first electrode current collector, a first electrode material, electrolyte, a second electrode material and a second electrode current collector; the substrate layer is a PCB substrate, both the second electrode current collector and the first electrode layer are placed on the PCB substrate; the second electrode current collector, the PCB substrate and the first electrode layer constitute a PCB structure.
Abstract:
Disclosed is a working method of a voice authentication system and a device. The method includes that: an application server sends user information sent by an application interface and a stored application name to an authentication server; the authentication server generates a push authentication request according to a generated challenge value, the user information and the application name and sends the push authentication request to a mobile terminal token; the mobile terminal token generates voice information, collects the voice response of user, generates a first response value according to the challenge value and sends the challenge value to the authentication server when determining that logon is authorized; the authentication server generates a second response value, returns successful authentication when two response values are identical. The invention prevents click errors caused by mistaken operations, and is convenient to remind user of current information, avoids authentication delay and enhances security.
Abstract:
The present invention discloses a method for realizing bluetooth-binding between a smart key device and a mobile device, which belongs to the field of information security. The method comprises: the smart key device performs bluetooth pairing with a current paired mobile device, obtains and determines a bind identification when the pairing succeeds; in case that the bind identification is bind, it determines whether a mac address of the current mobile device is the same as a stored mac address of the bound mobile device, and, if yes, executes a data interactive operation, otherwise, reports an error; in case that the bind identification is unbind, it takes the mac address of the current paired mobile device as the mac address of the bound mobile device and the address, and sets the bind identification as bind, and executes the data interactive operation.