发明名称 ONE-TIME PASSWORD OPERATING METHOD
摘要 Disclosed is a one-time password operating method, comprising: when a one-time password detects a valid key, judging the type of a pressed key, if the pressed key is a power-on key, detecting whether a current power-on logo is set, if yes, resetting same, otherwise, setting same and inspecting whether a locking logo is set, if yes, entering an unlocking code interface, otherwise entering an information interface; if the pressed key is a delete key, deleting data at the tail end of a data cache area; if the pressed key is a number key and the one-time password is not in the information interface, storing corresponding data in the data cache area; if the one-time password is in the information interface, judging whether the time for the key being pressed down goes beyond a preset time period, if yes, entering a power-on password modifying interface, otherwise storing corresponding data in the data cache area; if the pressed key is an Enter key and the one-time password is not in the information interface, judging whether the data in the data cache area are correct or meet requirements, if the one-time password is in the information interface, generating a dynamic password and displaying corresponding contents.
申请公布号 US2015304313(A1) 申请公布日期 2015.10.22
申请号 US201214233245 申请日期 2012.10.31
申请人 LU Zhou;YU Huazhang 发明人 LU Zhou;YU Huazhang
分类号 H04L29/06;G06F21/31 主分类号 H04L29/06
代理机构 代理人
主权项 1. A working method of a dynamic token, comprising, after the dynamic token detects that its key flag is set, (Step A) clearing the key flag, scanning keys and determining type of the key pressed down; performing Step B in a case that the key pressed down is a power key; performing Step D in a case that the key pressed down is a delete key; performing Step E in a case that the key pressed down is a key in a first numeric key group; performing Step F in a case that the key pressed down is a key in a second numeric key group; and performing Step G in a case that the key pressed down is an OK key; (Step B) checking power flag; in a case that the power flag is set, resetting the power flag and entering a dormant state; and in a case that the power flag is not set, setting the power flag and performing Step C; (Step C) checking lock flag; in a case that the lock flag is set, setting state identification to be a first predetermined value and performing Step L; and in a case that the lock flag is not set, setting the state identification to be a second predetermined value and performing Step L; (Step D) checking the power flag; in a case that the power flag is set, deleting one unit data at the end of a data cache, displaying a corresponding number, and performing Step L; and in a case that the power flag is not set, entering the dormant state; (Step E) checking the power flag; in a case that the power flag is set, storing corresponding data into the data cache, displaying a corresponding number, and performing Step L; and in a case that the power flag is not set, entering the dormant state; (Step F) checking the power flag; in a case that the power flag is set and the state identification is a third predetermined value, determining whether time period for holding the key pressed down exceeds a predetermined time period; setting the state identification to be a fifth predetermined value and performing Step L in a case that the time period for holding the key pressed down exceeds the predetermined time period; and performing Step L directly in a case that the time period for holding the key pressed down does not exceed the predetermined time period; in a case that the power flag is set and the state identification is not the third predetermined value, storing corresponding data into the data cache, displaying a corresponding number, and performing Step L; and in a case that the power flag is not set, entering the dormant state; (Step G) checking the power flag; in a case that the power flag is set, checking the state identification; performing Step H in a case that the state identification is the first predetermined value; performing Step I in a case that the state identification is the second predetermined value; performing Step J in a case that the state identification is the third predetermined value; and performing Step K in a case that the state identification is the fifth predetermined value; and in a case that the power flag is not set, entering the dormant state; (Step H) generating an unlock verification code by computing; determining whether data in the data cache is identical to the generated unlock verification code; in a case that the data in the data cache is identical to the generated unlock verification code, resetting the lock flag, setting the state identification to be the fifth predetermined value, clearing the data in the data cache, and performing Step L; and in a case that the data in the data cache is not identical to the generated unlock verification code, clearing the data in the data cache and performing Step C; (Step I) determining whether data in the data cache is identical to a logon password currently stored in the dynamic token; in a case that the data in the data cache is identical to the logon password currently stored in the dynamic token, setting the state identification to be the third predetermined value, clearing the data in the data cache, and performing Step L; and in a case that the data in the data cache is not identical to the logon password currently stored in the dynamic token, clearing the data in the data cache, setting the lock flag, and performing Step C; (Step J) generating a dynamic password by computing, displaying content corresponding to the dynamic password and performing Step L; (Step K) determining whether data in the data cache meets a predetermined condition; in a case that the data in the data cache meets the predetermined condition, replacing the logon password currently stored in the dynamic token with the data in the data cache, clearing the data in the data cache, setting the state identification to be the third predetermined value, and performing Step L; and in a case that the data in the data cache does not meet the predetermined condition, clearing the data in the data cache and performing Step L; (Step L) determining whether the key flag is detected to be set in a predetermined time period; in a case that the key flag is detected to be set in the predetermined time period, performing Step A; and in a case that the key flag is not detected to be set in the predetermined time period, resetting the power flag and entering the dormant state.
地址 Beijing CN