CN105072114A - Automatic form filling method, password manager, upper computer and system - Google Patents
Automatic form filling method, password manager, upper computer and system Download PDFInfo
- Publication number
- CN105072114A CN105072114A CN201510488837.XA CN201510488837A CN105072114A CN 105072114 A CN105072114 A CN 105072114A CN 201510488837 A CN201510488837 A CN 201510488837A CN 105072114 A CN105072114 A CN 105072114A
- Authority
- CN
- China
- Prior art keywords
- log
- message
- code management
- management device
- receiving
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
Abstract
The invention discloses an automatic form filling method, a password manager, an upper computer, and a system consisting of the password manager and the upper computer, and belongs to the technical field of network security. The method comprises the following steps: firstly, establishing connection between the password manager and the upper computer, receiving a user password, verifying the user password, and performing subsequent steps after verification pass; secondly, acquiring a login request and login information corresponding to the login request; and lastly, filling the login information into a login window in a keyboard mapping way. Through adoption of the automatic form filling method, the password manager, the upper computer, and the system consisting of the password manager and the upper computer, greater convenience is brought to operation while the security is ensured.
Description
Technical field
The present invention relates to technical field of network security, particularly a kind ofly automatically fill out folk prescription method and code management device, host computer, the system that is made up of code management device and host computer.
Background technology
Current code management device, only to record account and password, is exempted the memory of user, but is needed user manually to input account and password, brings and uses inconvenience.
Summary of the invention
Embodiments provide one and automatically fill out folk prescription method and code management device, host computer, being intended to solve existing code management device still needs to input manually the awkward problem that account and password bring.The embodiment of the present invention is achieved in that one fills out folk prescription method automatically, and described folk prescription method of automatically filling out comprises:
Connect with host computer;
Receive user cipher and verify, being verified, carrying out subsequent step;
Obtain logging request and obtain the log-on message corresponding with described logging request;
In the mode of keyboard map described log-on message is filled up to and logs in window.
Another object of the embodiment of the present invention is to provide one automatically to fill out folk prescription method, and described folk prescription method of automatically filling out comprises:
Connect with code management device;
Receive the logon information that code management device inputs in keyboard map mode, insert and log in window.
Another object of the embodiment of the present invention is to provide a kind of code management device, and described code management device comprises:
First link block, for connecting with host computer;
Authentication module, for receiving user cipher and verifying;
Acquisition module, for obtaining logging request and obtaining the log-on message corresponding with described logging request;
Filling in module, logging in window in the mode of keyboard map described log-on message being filled up to.
Another object of the embodiment of the present invention is to provide a kind of host computer, and described host computer comprises:
Second link block, for connecting with code management device;
Insert module, for receiving the logon information that code management device inputs in keyboard map mode, inserting and logging in window.
Another object of the embodiment of the present invention is to provide one automatically to fill out single system, and described system comprises above-mentioned code management device and above-mentioned host computer.
The beneficial effect that technical scheme provided by the invention is brought is:
From the invention described above embodiment, because first code management device and host computer connect, receive user cipher and verify, being verified, carrying out subsequent step; Then obtain logging request and obtain the log-on message corresponding with logging request; Finally log-on message being filled up in the mode of keyboard map logs in window, therefore, while guarantee fail safe, improves operation ease.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is that one of the present invention fills out a kind of flow chart of folk prescription method first embodiment automatically;
Fig. 2 is that one of the present invention fills out the another kind of flow chart of folk prescription method first embodiment automatically;
Fig. 3 is that one of the present invention fills out folk prescription method second embodiment flow chart automatically;
Fig. 4 is a kind of structural representation of a kind of code management device of the present invention;
Fig. 5 is the another kind of structural representation of a kind of code management device of the present invention;
Fig. 6 is that a kind of code management device of the present invention fills in a kind of structural representation of module;
Fig. 7 is a kind of structural representation of a kind of code management device acquisition module of the present invention;
Fig. 8 is a kind of structural representation of a kind of host computer of the present invention;
Fig. 9 is the another kind of structural representation of a kind of host computer of the present invention;
Figure 10 is that one of the present invention fills out single system structural representation automatically.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly, below in conjunction with accompanying drawing, embodiment of the present invention is described further in detail.
One of the present invention fills out folk prescription method first embodiment flow process automatically, is applicable to Password Management equipment, and see Fig. 1, described method comprises:
101. connect with host computer.
102. receive user cipher and verify, are verified, carry out subsequent step.
In concrete enforcement, as authentication failed, then can exit and automatically fill out single process, or, to the trial and error chance of user's limited number of time (as 3 times), be finished the trial and error chance of limited number of time user after, still be not verified, then exit and automatically fill out single process, or, the treatment measures of the password authentification failure adopting other this areas to commonly use, the present embodiment does not limit the processing method after authentication failed.
103. obtain logging request and obtain the log-on message corresponding with logging request.
In concrete enforcement, step 103 can have two kinds of situations:
A. receive the log on request that host computer sends, in the logon information database prestored, obtain the logon information corresponding with logging request.
B. receive and specify log-on message input instruction, specify log-on message input instruction to comprise logging request, obtain log-on message according to logging request.
Concrete, when host computer is computer, computer can need by self-defined process monitoring is current the application inputting password, thus log on request corresponding for this application message is sent to Password Management equipment; When host computer is mobile terminal, because mobile terminal generally cannot need by self-defined process monitoring is current the application inputting password, user can manually select the mode inputting instruction by the current application input Password Management equipment needing to input password.
Log-on message to be filled up in the mode of keyboard map and to log in window by 104..
When host computer is computer, step 103 is: log-on message to be filled up in the mode of HID keyboard map and to log in window.Such as, when the operating system of computer is Windows or Mac, in the mode of HID (humaninterfacedevice, humanization interface device) keyboard map, log-on message is filled up to and logs in window.
When host computer is mobile terminal, step 104 is: log-on message is filled up to and logs in window by the mode mapped with bluetooth keyboard.Such as, when the operating system of mobile terminal is Android or IOS, log-on message is filled up to and logs in window by the mode mapped with bluetooth keyboard.
Alternatively, as shown in Figure 2, step 102-2 and step 102-3 is also comprised after step 101.
102-2. and host computer carry out two-way authentication.
102-3. judges two-way authentication whether success, when the result of two-way authentication be successfully time, perform follow-up step.
In concrete enforcement, two-way authentication can be realized by the mode of the digital security certificate of Password Management equipment and host computer interactive authentication the other side, or the mode of the two-way authentication adopting other this areas to commonly use realizes, and the present embodiment does not limit this.When the result of two-way authentication be unsuccessfully time, can terminate automatically to fill out one process, or, through limited number of time (as 2 times) two-way authentication, result be still unsuccessfully time, terminate automatically to fill out one process.
The beneficial effect of step 102-2 and step 102-3 is: through bidirectional identity authentication, and the use of Password Management equipment can be made safer, avoids, after Password Management device losses, being illegally used.Further, Password Management equipment and host computer can session keys through consultation, set up escape way, carry out data interaction in the mode of encrypting.
Alternatively, as shown in Figure 2, step 102-4 and step 102-5 is also comprised after step 102.
102-4., when receiving importing log-on message instruction, receives log-on message and stores from host computer.
The logon information of storage, when receiving derivation log-on message instruction, is sent to external equipment by 102-5..
Those skilled in the art will appreciate that step 102-4 and 102-5 also can before step 102-2.
Those skilled in the art will appreciate that step 102-4 and 102-5 also can be after step 104.
The application can also arrange the authorization mechanism of host computer according to the condition code of host computer.In concrete enforcement, can by the Mac (MediaAccessControl of binding computer, hardware address) IMEI (InternationalMobileEquipmentIdentity of address or mobile terminal, the international identification code of mobile device) code, the different authorization mechanisms of distinct device are set.Than if any can complete stored in, derive, have can only complete account, password automatically fill out list, have can only complete partial account number, password automatically fill out single use.Thus tackle different customer demands, improve fail safe further.
The present embodiment is connected by first code management device and host computer, receives user cipher and also verifies, be verified, carry out subsequent step; Then obtain logging request and obtain the log-on message corresponding with logging request; Finally log-on message being filled up in the mode of keyboard map logs in window, therefore, while guarantee fail safe, improves operation ease.
One of the present invention fills out folk prescription method second embodiment flow process automatically, is applicable to the host computer that can be connected with Password Management devices communicating, as computer, or, the mobile terminals such as mobile phone, method flow comprises as shown in Figure 3:
301. connect with code management device.
302. carry out two-way authentication with code management device.
303. judge two-way authentication whether success, when the result of two-way authentication be successfully time, perform when receiving importing log-on message instruction, transmission log-on message is to the step of code management device.
304. when receiving importing log-on message instruction, sends log-on message to code management device.
305., when receiving derivation log-on message instruction, receive log-on message and store from code management device.
The logon information that 306. reception code management devices input in keyboard map mode, inserts and logs in window.
In concrete enforcement, two-way authentication can be realized by the mode of the digital security certificate of Password Management equipment and host computer interactive authentication the other side, or the mode of the two-way authentication adopting other this areas to commonly use realizes, and the present embodiment does not limit this.When the result of two-way authentication be unsuccessfully time, can terminate automatically to fill out one process, or, through limited number of time (as 2 times) two-way authentication, result be still unsuccessfully time, terminate automatically to fill out one process.
The present embodiment, by first connecting with code management device, then receives the logon information that code management device inputs in keyboard map mode, inserts and log in window, therefore, while guarantee fail safe, improves operation ease.
Automatically to fill out folk prescription method first embodiment corresponding with one, present invention also offers a kind of code management device 40, as shown in Figure 4, comprise the first link block 410, authentication module 490, acquisition module 420 and fill in module 430.
First link block 410, for connecting with host computer.
Authentication module 490, for receiving user cipher and verifying.
Acquisition module 420, obtains logging request and obtains the log-on message corresponding with logging request;
Filling in module 430, logging in window in the mode of keyboard map log-on message being filled up to.
Alternatively, as shown in Figure 5, a kind of code management device 50 also comprises:
First authentication module 470, for carrying out two-way authentication with host computer.
First judge module 480, for judging that whether two-way authentication is successful.
Alternatively, as shown in Figure 5, a kind of code management device 50 also comprises:
First imports module 440, for when receiving importing log-on message instruction, receiving log-on message and store from host computer.
First derives module 450, for when receiving derivation log-on message instruction, the logon information of storage is sent to external equipment.
In concrete enforcement, can for arranging the account and password that need to derive on host computer; Host computer sends to be needed to derive account number cipher to code management device; Code management device ejects the dialog box needing to input password on code management device; Code management device inputs code management device password and obtains mandate; The backup file of username and password is exported in host computer.
As shown in Figure 6, fill in module 430 to comprise first and fill in unit 431 or the second and fill in unit 432.
First fills in unit 431, logs in window for log-on message being filled up in the mode of HID keyboard map.
Second fills in unit 432, log-on message to be filled up to log in window for the mode that maps with bluetooth keyboard.
In concrete enforcement, can be on code management device connects after mobile terminal, first operating mobile terminal, by the window of application operating to login interface, and input focus is placed on password box control, then operator password manager, manually enter the login interface of code management device, after inputting correct code management device password, code management device is selected the application account of typing, manually press the startup input key on code management device, code management device inputs password in the corresponding control of mobile terminal automatically in the mode that bluetooth keyboard maps.
As shown in Figure 7, acquisition module 420 comprises the first receiving element 421 or the second receiving element 422.
First receiving element 421, for receiving the log on request that host computer sends, obtains the logon information corresponding with logging request in the logon information database prestored.
Second receiving element 422, specifies log-on message input instruction for receiving, and specifies log-on message input instruction to comprise logging request, obtains log-on message according to logging request.
The present embodiment, by first connecting with host computer, receives user cipher and verifies, being verified, carrying out subsequent step; Then receive the network address logging in window that host computer sends, finally in the mode of keyboard map, username and password mate with network address stored is filled up to and logs in window, therefore, while ensureing fail safe, improve operation ease.
Automatically to fill out folk prescription method second embodiment corresponding with one, present invention also offers a kind of host computer 80, as shown in Figure 8, comprise the second link block 810 and sending module 820.
Second link block 810, for connecting with code management device.
Insert module 820, for receiving the logon information that code management device inputs in keyboard map mode, inserting and logging in window.
Optionally, a kind of host computer 90, as shown in Figure 9, also comprises:
Second authentication module 850, for carrying out two-way authentication with code management device.
Second judge module 860, for judging that whether two-way authentication is successful.
Second imports module 830, for when receiving importing log-on message instruction, sends log-on message to code management device.
Second derives module 840, for when receiving derivation log-on message instruction, receiving log-on message and store from code management device.
The present embodiment, by first connecting with code management device, then receives the logon information that code management device inputs in keyboard map mode, inserts and log in window, therefore, while guarantee fail safe, improves operation ease.
Automatically to fill out folk prescription method the 3rd embodiment corresponding with one, present invention also offers one and automatically fill out single system 100, as shown in Figure 10, comprise above-mentioned code management device 60 or 70, also comprise above-mentioned host computer 80 or 90.
The present embodiment, by first connecting with host computer, receives user cipher and verifies, being verified, carrying out subsequent step; Then receive the network address logging in window that host computer sends, finally in the mode of keyboard map, username and password mate with network address stored is filled up to and logs in window, therefore, while ensureing fail safe, improve operation ease.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can have been come by hardware, the hardware that also can carry out instruction relevant by program completes, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium mentioned can be read-only memory, disk or CD etc.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (17)
1. automatically fill out a folk prescription method, it is characterized in that, described folk prescription method of automatically filling out comprises:
Connect with host computer;
Receive user cipher and verify, being verified, carrying out subsequent step;
Obtain logging request and obtain the log-on message corresponding with described logging request;
In the mode of keyboard map described log-on message is filled up to and logs in window.
2. method according to claim 1, is characterized in that, described reception user cipher is also verified, is verified, also comprises after carrying out the step of subsequent step:
When receiving importing log-on message instruction, from described host computer, receiving described log-on message and store;
When receiving derivation log-on message instruction, the described logon information stored is sent to external equipment.
3. method according to claim 1 and 2, is characterized in that, described reception user cipher is also verified, is verified, also comprises after carrying out the step of subsequent step:
Two-way authentication is carried out with described host computer;
Judge two-way authentication whether success, when the result of two-way authentication be successfully time, perform follow-up step.
4. method according to claim 1, is characterized in that, describedly in the mode of keyboard map, described log-on message is filled up to the step logged in window and comprises the following steps:
Described log-on message being filled up in the mode of HID keyboard map logs in window; Or
Described log-on message is filled up to and logs in window by the mode mapped with bluetooth keyboard.
5. method according to claim 1, is characterized in that, the step that described acquisition logging request also obtains the log-on message corresponding with described logging request comprises the following steps:
Receive the log on request that described host computer sends, in the logon information database prestored, obtain the logon information corresponding with described logging request; Or
Receive and specify log-on message input instruction, described appointment log-on message input instruction comprises logging request, obtains log-on message according to described logging request.
6. automatically fill out a folk prescription method, it is characterized in that, described folk prescription method of automatically filling out comprises:
Connect with code management device;
Receive the logon information that code management device inputs in keyboard map mode, insert and log in window.
7. method according to claim 6, is characterized in that, also comprises after the described step connected with code management device:
When receiving importing log-on message instruction, send log-on message to described code management device;
When receiving derivation log-on message instruction, from described code management device, receiving described log-on message and store.
8. the method according to claim 6 or 7, is characterized in that, also comprises after the described step connected with code management device:
Two-way authentication is carried out with described code management device;
Judge two-way authentication whether success, when the result of two-way authentication be successfully time, perform follow-up step.
9. a code management device, is characterized in that, described code management device comprises:
First link block, for connecting with host computer;
Authentication module, for receiving user cipher and verifying;
Acquisition module, for obtaining logging request and obtaining the log-on message corresponding with described logging request;
Filling in module, logging in window in the mode of keyboard map described log-on message being filled up to.
10. code management device according to claim 9, is characterized in that, described code management device also comprises:
First derives module, for when receiving derivation log-on message instruction, the described logon information stored is sent to external equipment;
First imports module, for when receiving importing log-on message instruction, receiving described log-on message and store from described host computer.
11. code management devices according to claim 9 or 10, it is characterized in that, described code management device also comprises:
First authentication module, for carrying out two-way authentication with described host computer;
First judge module, for judging that whether two-way authentication is successful.
12. code management devices according to claim 9, is characterized in that, described in fill in module and comprise:
First fills in unit, logs in window for described log-on message being filled up in the mode of HID keyboard map; Or
Second fills in unit, described log-on message to be filled up to log in window for the mode that maps with bluetooth keyboard.
13. code management devices according to claim 9, is characterized in that, described acquisition module comprises:
First receiving element, for receiving the log on request that described host computer sends, obtains the logon information corresponding with described logging request in the logon information database prestored; Or
Second receiving element, specifies log-on message input instruction for receiving, and described appointment log-on message input instruction comprises logging request, obtains log-on message according to described logging request.
14. 1 kinds of host computers, is characterized in that, described host computer comprises:
Second link block, for connecting with code management device;
Insert module, for receiving the logon information that code management device inputs in keyboard map mode, inserting and logging in window.
15. host computers according to claim 14, is characterized in that, described host computer also comprises:
Second imports module, for when receiving importing log-on message instruction, sends log-on message to described code management device;
Second derives module, for when receiving derivation log-on message instruction, receiving described log-on message and store from described code management device.
16. host computers according to claims 14 or 15, it is characterized in that, described host computer also comprises:
Second authentication module, for carrying out two-way authentication with described code management device;
Second judge module, for judging that whether two-way authentication is successful.
Automatically fill out single system, it is characterized in that for 17. 1 kinds, described system comprises the code management device as described in claim 9-13 any one and the host computer as described in claim 14-16 any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510488837.XA CN105072114A (en) | 2015-08-11 | 2015-08-11 | Automatic form filling method, password manager, upper computer and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510488837.XA CN105072114A (en) | 2015-08-11 | 2015-08-11 | Automatic form filling method, password manager, upper computer and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105072114A true CN105072114A (en) | 2015-11-18 |
Family
ID=54501394
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510488837.XA Pending CN105072114A (en) | 2015-08-11 | 2015-08-11 | Automatic form filling method, password manager, upper computer and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105072114A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112464183A (en) * | 2019-09-06 | 2021-03-09 | 深圳市文鼎创数据科技有限公司 | Security information input method, information security device, and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101051292A (en) * | 2007-01-08 | 2007-10-10 | 中国信息安全产品测评认证中心 | Reliable U disc, method for realizing reliable U disc safety and its data communication with computer |
CN101727211A (en) * | 2008-11-03 | 2010-06-09 | 北京魔力科技有限公司 | Intelligent electronic whiteboard system |
CN101765261A (en) * | 2008-10-24 | 2010-06-30 | 杨林 | Control platform for household lighting equipment |
CN103136489A (en) * | 2012-12-30 | 2013-06-05 | 北京理工大学 | Portable and secure automatic password input unit |
CN103425921A (en) * | 2012-05-18 | 2013-12-04 | 鸿富锦精密工业(深圳)有限公司 | Device, system and method for code management |
US20140150092A1 (en) * | 2005-10-07 | 2014-05-29 | Imation Corp. | Method and apparatus for secure credential entry without physical entry |
US20140344907A1 (en) * | 2011-11-21 | 2014-11-20 | Beijing Qihoo Technology Company Limited | Auto login method and device |
-
2015
- 2015-08-11 CN CN201510488837.XA patent/CN105072114A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140150092A1 (en) * | 2005-10-07 | 2014-05-29 | Imation Corp. | Method and apparatus for secure credential entry without physical entry |
CN101051292A (en) * | 2007-01-08 | 2007-10-10 | 中国信息安全产品测评认证中心 | Reliable U disc, method for realizing reliable U disc safety and its data communication with computer |
CN101765261A (en) * | 2008-10-24 | 2010-06-30 | 杨林 | Control platform for household lighting equipment |
CN101727211A (en) * | 2008-11-03 | 2010-06-09 | 北京魔力科技有限公司 | Intelligent electronic whiteboard system |
US20140344907A1 (en) * | 2011-11-21 | 2014-11-20 | Beijing Qihoo Technology Company Limited | Auto login method and device |
CN103425921A (en) * | 2012-05-18 | 2013-12-04 | 鸿富锦精密工业(深圳)有限公司 | Device, system and method for code management |
CN103136489A (en) * | 2012-12-30 | 2013-06-05 | 北京理工大学 | Portable and secure automatic password input unit |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112464183A (en) * | 2019-09-06 | 2021-03-09 | 深圳市文鼎创数据科技有限公司 | Security information input method, information security device, and storage medium |
WO2021042808A1 (en) * | 2019-09-06 | 2021-03-11 | 深圳市文鼎创数据科技有限公司 | Security information input method, information security device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105376216B (en) | A kind of remote access method, proxy server and client | |
US20100257357A1 (en) | Systems and methods for providing authentication and authorization utilizing a personal wireless communication device | |
CN105871838A (en) | Third party account login control method and user center platform | |
CN107484152B (en) | Management method and device for terminal application | |
CN106487762A (en) | The recognition methodss of user identity, identification applications client and server | |
CN105119931A (en) | Application logging method and application logging system | |
CN106161475B (en) | Method and device for realizing user authentication | |
CN101668288A (en) | Identity authenticating method, identity authenticating system and terminal | |
CN105959942A (en) | Identification authentication system and identification authentication method based on wireless access | |
EP4068834A1 (en) | Initial security configuration method, security module, and terminal | |
CN112953970A (en) | Identity authentication method and identity authentication system | |
CN104917740A (en) | Password resetting method and password verifying method and device | |
US20230180010A1 (en) | Method for securely connecting vehicle and bluetooth key, and bluetooth module and bluetooth key | |
CN106572081A (en) | Login authority verifying method | |
CN109587142A (en) | A kind of the data safety AM access module and equipment of service-oriented stream | |
CN105515781A (en) | Login system of application platform and login method thereof | |
CN107223328A (en) | A kind of method and system of Root authority management and control | |
CN105320873A (en) | Unlocking method and device for terminal application, terminal and SIM card | |
CN105871840B (en) | A kind of certificate management method and system | |
CN105072114A (en) | Automatic form filling method, password manager, upper computer and system | |
CN108123918A (en) | A kind of account authentication login method and device | |
CN110430572A (en) | The communication means and its communication system of a kind of eUICC card, eUICC card and management platform | |
CN105335637A (en) | Authentication method, authentication device and authentication system | |
CN107026814A (en) | A kind of login validation method and device through point attendant application | |
CN109547217B (en) | One-to-many identity authentication system and method based on dynamic password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170411 Address after: 100000 room 703-710, room B3, Huayuan Road, Haidian District, Beijing, 7 Applicant after: Beijing Minghua Alliance Technology Co., Ltd. Address before: 518000 Guangdong city of Shenzhen province Nanshan District Ke Feng Lu No. 2 idiopathic information building A building unit seven floor South 701-709 Applicant before: Shenzhen Wendingchuang Data Technology Co., Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151118 |