CN101064535B - Intelligent authentication method and system based on close range wireless communication handset - Google Patents

Intelligent authentication method and system based on close range wireless communication handset Download PDF

Info

Publication number
CN101064535B
CN101064535B CN2007100394037A CN200710039403A CN101064535B CN 101064535 B CN101064535 B CN 101064535B CN 2007100394037 A CN2007100394037 A CN 2007100394037A CN 200710039403 A CN200710039403 A CN 200710039403A CN 101064535 B CN101064535 B CN 101064535B
Authority
CN
China
Prior art keywords
subsystem
password
interface
authentication
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2007100394037A
Other languages
Chinese (zh)
Other versions
CN101064535A (en
Inventor
韩伟力
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fudan University
Original Assignee
Fudan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fudan University filed Critical Fudan University
Priority to CN2007100394037A priority Critical patent/CN101064535B/en
Publication of CN101064535A publication Critical patent/CN101064535A/en
Application granted granted Critical
Publication of CN101064535B publication Critical patent/CN101064535B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an attestation method and system which are based on close quarter's wireless communication mobile telephone, and provides an intelligent attestation method for computer system. The intelligent attestation method uses mobile telephone to store the characteristic information of computer system logging on interface, when user is logged; the mobile telephone validates the stored characteristic information to insure the validity of logging interface; by detecting the effective close quarter's wireless communication signal to realize the function of 'locking up by people away'. The intelligent attestation system includes: (1) countersign managing sub system; (2) attestation information receiving/sending sub system; (3) interface character obtaining sub system; (4) user name countersign filling sub system of computer logging interface; (5) intelligent locking sub system which is based on weakness of signal. The method and system can manage user names and countersigns of several computers; protects the countersigns stored in mobile telephone; authenticates the logged interface to avoid fishing attack.

Description

Intelligent authentication method and system based on the wireless near field communication mobile phone
Technical field
The invention belongs to wireless communication technology field, be specifically related to a kind of password management and intelligent authentication method and system, especially utilize wireless near field communication means and mobile phone to realize the method and system of the management and the realization intelligent authentication of username-password.
Background technology
Occur the security attack (such as phishing, man-in-the-middle attack, password cracking etc.) at user password in the current computer system, making becomes a hot issue of computer safety field to the research of password protection and authentification of user.The main means of computer network security mechanism comprise safety certification at present, be that the user is before the log into thr computer system comprises web station system, whether server end authenticates to determine consistent with the authentication information that is stored in server at server end after obtaining log-on message (as the user name and password) from user side earlier.If consistent, then allow this user to enter computer system, otherwise the refusal login.
Username-password computing system authentication techniques are simple and comparatively safe and widely vast calculating user accepts with it.Yet use username-password to login and have a lot of defectives, especially in some information systems higher (as bank system of web) to security requirement, these systems often require password to have certain length, and different computer systems is provided with different passwords.The defective of existing username-password login system mainly comprises the memory difficulty of password, the input difficulty of password, the safe storage difficulty of password.
1. the memory difficulty of password is meant that the user is difficult to remember the password of oneself, in case forget then need a large amount of resource of consumption calculations machine and adopt complicated processing procedure in order to recover password;
2. the input difficulty of password is meant that the user inputs password easily by mistake and causes system that the true identity of validated user is judged by accident;
More existing username-password management softwares are managed these username-password, but have some problems.Wherein the most outstanding these management softwares that are operate on the PC, in case PC is controlled by rogue program, then all username-password might be leaked to the assailant fully.
The solution of another kind of secured user's name password is the dynamic token system, typical SecureID as RSA company, the general order of company of Netease etc.The characteristics of these systems are to utilize the hardware of special portable regularly dynamically to generate a password, are input to conduct authentication key element in the password frame, combine the fail safe that can increase substantially system authentication with other authentication key element.Yet this solution has solved the password memory difficulty, but does not solve the difficulty that the user enters password.Simultaneously, this scheme needs system to change authentication mode, and relatively difficulty is revised by system.In addition, this scheme needs special hardware, and the cost of deployment is higher relatively, though that this hardware designs gets is smaller, still need additionally carry these hardware.
More than these schemes all have no idea people and computer log are linked together, also be that the people is when leaving system, system should automatically lock or log off, otherwise work as validated user when leaving the computer system of having logined, other people can malice pretend to be validated user to carry out illegal operation in system.
Summary of the invention
The object of the present invention is to provide that a kind of fail safe is good, password memory and input be easily based on the authentication method and the system of wireless near field communication mobile phone, and a kind of technical scheme of intelligent authentication is provided for computer system.
The intelligent authentication method that the present invention proposes, be that the mobile phone that will store authentication information is determined user identity as the authentication key element, concrete steps are as follows: elder generation is by the characteristic information at mobile phone storage computation machine system login interface, verify according to the characteristic information of storage in advance by mobile phone when the user logins, determine the legitimacy of login interface; Determining under the legal situation in interface,, by wireless near field communication the user name and password is being sent to the computer system log-in interface, and fills in automatically, realizing user's authentication by mobile phone storage the user name and password; By detecting the power of effective wireless near field communication signal, realization " people is from i.e. locking " authen session intelligence is kept.
Intelligent authentication of the present invention system realizes above-mentioned intelligent authentication method, and system comprises: (1) is based on the password management subsystem of mobile phone; (2) based on the authentication information reception/transmission subsystem of wireless near field communication; (3) interface feature obtains subsystem; (4) username-password of computer system login interface is filled in subsystem; (5) based on the intelligent locking subsystem of wireless near field communication signal power.This method and system can manage the user name and password of a plurality of computers effectively; The password that is stored on the mobile phone is effectively protected; Interface to login authenticates to prevent phishing attack.
Mobile phone can be stored many class boundaries face feature and corresponding username-password information thereof.Among the present invention, mobile phone operating system is supported Symbian, Windows Mobile, built-in Linux etc.The wireless near field communication means comprise Bluetooth communication, infrared communication, WLAN (wireless local area network) IEEE802.11a/b/g agreement and other wireless near field communication means.The mobile phone end is by the legitimacy at the interface feature authenticating computer system login interface of collecting in advance, and these interface features comprise: NIC address, the URL address in the browser Verification System, webpage hashed value and the digital certificate hashed value of operating system version number, place computer.
The authentication key element comprises username-password among the present invention, and password comprises static password and dynamic password.
Computer system login interface described in the present invention comprises computer operating system login interfaces such as Windows, Linux and based on the website log interface of browser.
The authen session intelligence of " people from i.e. locking " of the present invention is kept, and wherein main frame is according to judging that regularly the validity of wireless near field communication judges whether the user leaves main frame.Validity is judged can not transmit data based on signal weakening to pre-set threshold or wireless near field communication.Main frame promptly locks main frame after judging that the user leaves; Main frame is being judged the effective wireless near field communication channel that rebulids in effective time, i.e. login automatically.
Among the present invention, subsystem 1 is realized registration, the storage of authentication key element.Subsystem 2 is realized wireless short-distance communication.Subsystem 3 is realized the feature extraction of computer system login interface.The username-password of realization computer system login interface is filled in automatically.The authen session intelligence of realization " people is from i.e. locking " is kept method.
The advantage of this method and system is:
1. solved user's password memory difficulty.The user does not need to remember password voluntarily and only password need be stored in and gets final product in the mobile phone;
2. solved the difficulty that the user enters password.System can judge legal interface automatically and the user name and password is input to the interface;
3. lower deployment cost is lower.Growing along with mobile phone technique, computing capability and communication capacity that mobile phone can carry are more and more stronger, wireless near field communication such as Bluetooth communication etc. are equipped in the novel mobile phone widely, and our designed system is the application software that operates in these medium-to-high grade mobile phones, so lower deployment cost is very low.Our system does not need to change the authentication protocol of original computer system simultaneously, and the cost of therefore revising original computer system is also lower;
4. can realize the anti-phishing attack.Discern legal inputting interface by the interface feature that mobile phone is stored in advance, stop username-password is input to illegal interface, thereby realize the anti-phishing attack.
5. can realize " people is from i.e. locking " function.By identification, if the wireless near field communication signal strength signal intensity is weaker than predefined value, then locking system to wireless near field communication signal power;
Description of drawings
Fig. 1 is a system schematic of the present invention.
Fig. 2 is a system architecture diagram of the present invention.
Number in the figure 1 expression this end of mobile phone (PH); 2 expression these ends of computer system (HOST).3 expressions realize interpolation, modification and delete function to many groups username-password based on the password management subsystem of mobile phone; 4 expression authentication information reception/transmission subsystems are realized the wireless near field communication function; 5 expression interface features obtain subsystem, realize the function of obtaining to computer system login interface characteristic information; 6 expression username-password are filled in subsystem, realize the information that receives is filled up to automatically the function of computer system login interface; 7 expression intelligent locking subsystems are realized the intelligent locking function based on the wireless near field communication signal strength signal intensity.
Embodiment
Suppose to have a user, have user name: UN, password: PWD.There is department of computer science to unify platform in the applied environment: HOST, one of mobile phone: PH.With this user and applied environment thereof is four enforcement subprocess of example explanation native system:
1. authentication registration information: (1) obtains the login interface feature that subsystem 5 is collected HOST by interface feature, and the feature that operating system need be collected comprises the network interface card card number at operating system version number, system place; The website log system need collect the hashed value of URL address, web page contents, the digital certificate hashed value of current sessions; (2) information is sent to the password management subsystem 3 of mobile phone end PH by authentication information reception/transmission subsystem 4; (3) if operating system, the then user name UN of User Interface feature correspondence and password PWD and storage in password management subsystem 3; If the website log system, then obtain and input user name UN and password PWD in the subsystem 5 and send to the subsystem 3 of mobile phone end PH, and store by subsystem 3 by subsystem 4 at interface feature; (4) ending said process.
2. authentication login interface: (1) initiates this function by HOST; (2) collected the login interface feature of HOST by subsystem 5, the feature that operating system need be collected comprises the network interface card card number at operating system version number, system place; The website log system need collect the hashed value of URL address, web page contents, the digital certificate hashed value of current sessions; (3) by subsystem 4 information is sent to mobile phone end PH subsystem 3; (4) in subsystem 3, search this interface feature and whether exist, if there is no, point out the possibility whether phishing attack had been revised or taken place at the interface, ending said process; (5) if interface feature in native system, exist and fit like a glove then; (6) set up secure authentication session and ending said process.
3. send and fill in username-password: (1) sends user name UN and the password PWD mobile phone end PH to subsystem 4 by subsystem 3; (2) the mobile phone end PH encrypting user name UN of subsystem 4 and password PWD and be delivered to the HOST end of subsystem 4 by wireless near field communication; (3) HOST of subsystem 4 holds decrypted user name UN and password PWD, and is sent to subsystem 6.; (4) subsystem 6 is filled in user name UN and password PWD to corresponding computing system login interface input frame; (5) if login successfully then send message to subsystem 4, otherwise the prompting error message.Ending said process;
4. intelligent locking authen session: (1) subsystem 4 is received the message of subsystem 6 authentication successs, then the current authentication session information is sent to subsystem 7; (2) in a single day subsystem 7 was regularly surveyed the validity of wireless near field communication every 5 seconds, if be lower than predefined signal strength signal intensity or do not have signal, then locked HOST; (3) if subsystem 7 detects in the session of locking wireless near field communication once again effectively then login HOST automatically again.

Claims (3)

1. the intelligent authentication method based on the wireless near field communication mobile phone is characterized in that the mobile phone that stores authentication information is determined user's identity as authenticating key element, and concrete steps are as follows:
Step 1. authentication registration information: (a) obtain the login interface feature that subsystem (5) is collected HOST by interface feature, the feature that operating system need be collected comprises the network interface card card number at operating system version number, system place; The website log system need collect the hashed value of URL address, web page contents, the digital certificate hashed value of current sessions; (b) by authentication information reception/transmission subsystem
(4) authentication registration information is sent to the password management subsystem (3) of mobile phone end; (c) if operating system, the then the user name and password of User Interface feature correspondence and storage in password management subsystem (3); If website log system, then obtain in the subsystem (5) the input the user name and password and send to the password management subsystem (3) of mobile phone end, and store by this password management subsystem (3) by authentication information reception/transmission subsystem (4) at interface feature; (d) ending said process;
Step 2. authentication login interface: (a) initiate this function by HOST; (b) obtain the login interface feature that subsystem (5) is collected HOST by interface feature, the feature that operating system need be collected comprises the network interface card card number at operating system version number, system place; The website log system need collect the hashed value of URL address, web page contents, the digital certificate hashed value of current sessions; (c) information of login interface feature is sent to the password management subsystem (3) of mobile phone end by authentication information reception/transmission subsystem (4); (d) in password management subsystem (3), search this interface feature and whether exist, if there is no, point out the possibility whether phishing attack had been revised or taken place at the interface, ending said process; (e) if interface feature exists and fits like a glove, then set up secure authentication session and ending said process in native system;
Step 3. sends and fills in username-password: (a) send the mobile phone end of the user name and password to authentication information reception/transmission subsystem (4) by password management subsystem (3); (b) the mobile phone end encrypting user name of authentication information reception/transmission subsystem (4) and password and be delivered to the HOST end of authentication information reception/transmission subsystem (4) by wireless near field communication; (c) HOST of authentication information reception/transmission subsystem (4) end is decrypted user name and password, and is sent to username-password and fills in subsystem
(6); (d) username-password is filled in subsystem (6) and is filled in the user name and password to corresponding computing system login interface input frame; (e) if login successfully then send message to authentication information reception/transmission subsystem (4), otherwise the prompting error message; Ending said process;
Step 4. intelligent locking authen session: (a) authentication information reception/transmission subsystem (4) is received the message that username-password is filled in subsystem (6) authentication success, then the current authentication session information is sent to intelligent locking subsystem (7); (b) in a single day intelligent locking subsystem (7) was regularly surveyed the validity of wireless near field communication every 5 seconds, if be lower than predefined signal strength signal intensity or do not have signal, then locked HOST; (c) if intelligent locking subsystem (7) detects in the session of locking wireless near field communication once again effectively then login HOST automatically again;
Here, HOST refers to the main frame of computer system.
2. intelligent authentication method according to claim 1 is characterized in that:
Described mobile phone stores many class boundaries face feature and corresponding username-password information thereof, and mobile phone operating system is supported Symbian, Windows Mobile, built-in Linux;
Wireless near field communication is Bluetooth communication, infrared communication or WLAN (wireless local area network) IEEE 802.11a/b/g agreement;
The mobile phone end is by the legitimacy at the interface feature authenticating computer system login interface of collecting in advance, and described interface feature is: NIC address, the URL address in the browser Verification System, webpage hashed value and the digital certificate hashed value of operating system version number, place computer;
Described username-password is divided into two kinds of static password and dynamic passwords;
Described computer system login interface is for Windows, Linux computer operating system login interface with based on the website log interface of browser.
3. intelligent authentication system based on the wireless near field communication mobile phone, it is characterized in that system comprises: based on the password management subsystem (3) of mobile phone, authentication information reception/transmission subsystem (4) based on wireless near field communication, interface feature obtains subsystem (5), and the username-password of computer system login interface is filled in subsystem (6) and based on the intelligent locking subsystem (7) of wireless near field communication signal power; The flow process that described each subsystem is realized intelligent authentication is as follows:
Step 1. authentication registration information: (a) obtain the login interface feature that subsystem (5) is collected HOST by interface feature, the feature that operating system need be collected comprises the network interface card card number at operating system version number, system place; The website log system need collect the hashed value of URL address, web page contents, the digital certificate hashed value of current sessions; (b) authentication registration information is sent to the password management subsystem (3) of mobile phone end by authentication information reception/transmission subsystem (4); (c) if operating system, the then the user name and password of User Interface feature correspondence and storage in password management subsystem (3); If website log system, then obtain in the subsystem (5) the input the user name and password and send to the password management subsystem (3) of mobile phone end, and store by password management subsystem (3) by authentication information reception/transmission subsystem (4) at interface feature; (d) ending said process;
Step 2. authentication login interface: (a) initiate this function by HOST; (b) obtain the login interface feature that subsystem (5) is collected HOST by interface feature, the feature that operating system need be collected comprises the network interface card card number at operating system version number, system place; The website log system need collect the hashed value of URL address, web page contents, the digital certificate hashed value of current sessions; (c) information of login interface feature is sent to the password management subsystem (3) of mobile phone end by authentication information reception/transmission subsystem (4); (d) in password management subsystem (3), search this interface feature and whether exist, if there is no, point out the possibility whether phishing attack had been revised or taken place at the interface, ending said process; (e) if interface feature exists and fits like a glove, then set up secure authentication session and ending said process in native system;
Step 3. sends and fills in username-password: (a) send the mobile phone end of the user name and password to authentication information reception/transmission subsystem (4) by password management subsystem (3); (b) the mobile phone end encrypting user name of authentication information reception/transmission subsystem (4) and password and be delivered to the HOST end of authentication information reception/transmission subsystem (4) by wireless near field communication; (c) HOST of authentication information reception/transmission subsystem (4) end is decrypted user name and password, and is sent to username-password and fills in subsystem (6); (d) username-password is filled in subsystem (6) and is filled in the user name and password to corresponding computing system login interface input frame; (e) if login successfully then send message to authentication information reception/transmission subsystem (4), otherwise the prompting error message; Ending said process;
Step 4. intelligent locking authen session: (a) authentication information reception/transmission subsystem (4) is received the message that username-password is filled in subsystem (6) authentication success, then the current authentication session information is sent to intelligent locking subsystem (7); (b) in a single day intelligent locking subsystem (7) was regularly surveyed the validity of wireless near field communication every 5 seconds, if be lower than predefined signal strength signal intensity or do not have signal, then locked HOST; (c) if intelligent locking subsystem (7) detects in the session of locking wireless near field communication once again effectively then login HOST automatically again;
Here, HOST refers to the main frame of computer system.
CN2007100394037A 2007-04-12 2007-04-12 Intelligent authentication method and system based on close range wireless communication handset Expired - Fee Related CN101064535B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007100394037A CN101064535B (en) 2007-04-12 2007-04-12 Intelligent authentication method and system based on close range wireless communication handset

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007100394037A CN101064535B (en) 2007-04-12 2007-04-12 Intelligent authentication method and system based on close range wireless communication handset

Publications (2)

Publication Number Publication Date
CN101064535A CN101064535A (en) 2007-10-31
CN101064535B true CN101064535B (en) 2011-12-07

Family

ID=38965306

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007100394037A Expired - Fee Related CN101064535B (en) 2007-04-12 2007-04-12 Intelligent authentication method and system based on close range wireless communication handset

Country Status (1)

Country Link
CN (1) CN101064535B (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101677442A (en) * 2008-09-17 2010-03-24 艾威梯科技(北京)有限公司 Method and equipment for automatically logging in application programs
CN101826897B (en) * 2010-05-12 2014-10-22 中兴通讯股份有限公司 Method, device and system for realizing communication between mobile terminal and PC
CN102624709A (en) * 2012-02-27 2012-08-01 无锡华赛信息技术有限公司 Divulgence prevention method based on Bluetooth for cloud architecture
CN102685330A (en) * 2012-05-15 2012-09-19 江苏中科梦兰电子科技有限公司 Method for logging in operation system by taking cell phone as authentication tool
EP2680535B1 (en) * 2012-06-27 2022-04-06 GN Audio A/S Providing presence information in a personal communications system comprising an interface unit
CN102984149B (en) * 2012-11-23 2015-10-28 广东欧珀移动通信有限公司 A kind of mobile terminal holds synchronous login method and device with PC
CN104009858A (en) * 2013-02-26 2014-08-27 成都勤智数码科技股份有限公司 Multilevel verification system based on safety management
CN104105084A (en) * 2013-04-15 2014-10-15 王方淇 Information interaction method, terminal and information interaction system
CN103488933A (en) * 2013-09-27 2014-01-01 太仓苏易信息科技有限公司 Non-contact type computer login protection system
CN103488932A (en) * 2013-10-16 2014-01-01 重庆邮电大学 Desktop security intercommunication system for mobile device and personal computer and implementation method thereof
CN103888265B (en) * 2014-04-11 2017-07-25 上海博路信息技术有限公司 A kind of application login system and method based on mobile terminal
CN105337937B (en) * 2014-07-24 2019-07-26 小米科技有限责任公司 Network verification method, device and computer readable storage medium
JP6265873B2 (en) * 2014-09-24 2018-01-24 キヤノン株式会社 Mobile terminal, control method thereof, and program
CN104992125A (en) * 2015-06-30 2015-10-21 向岚 Computer network security protection system
CN105224848B (en) * 2015-10-15 2019-06-21 京东方科技集团股份有限公司 A kind of equipment authentication method, apparatus and system
CN106411831A (en) * 2016-03-11 2017-02-15 山东渔翁信息技术股份有限公司 Office environment login system and method
CN110650110B (en) * 2018-06-26 2022-03-22 深信服科技股份有限公司 Login page identification method and related equipment
CN113556739B (en) * 2020-04-01 2024-03-22 中国长城科技集团股份有限公司 Bluetooth-based computer system unlocking/locking control method and device
CN112632526B (en) * 2021-01-07 2022-04-12 复旦大学 User password modeling and strength evaluation method based on comprehensive segmentation
CN117320007B (en) * 2023-11-27 2024-02-09 北京时代亿信科技股份有限公司 Office system control method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1614924A (en) * 2004-11-26 2005-05-11 王小矿 Identity certifying system based on intelligent card and dynamic coding
CN1921386A (en) * 2006-07-11 2007-02-28 钟权 Method for realizing associator identity identification in intelligent communication network by using mobile phone number

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1614924A (en) * 2004-11-26 2005-05-11 王小矿 Identity certifying system based on intelligent card and dynamic coding
CN1921386A (en) * 2006-07-11 2007-02-28 钟权 Method for realizing associator identity identification in intelligent communication network by using mobile phone number

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
袁彬.基于二维条码和智能手机的无线身份认证系统.大连理工大学硕士学位论文.2006,28-31. *

Also Published As

Publication number Publication date
CN101064535A (en) 2007-10-31

Similar Documents

Publication Publication Date Title
CN101064535B (en) Intelligent authentication method and system based on close range wireless communication handset
Razouk et al. A new security middleware architecture based on fog computing and cloud to support IoT constrained devices
CN100380356C (en) Device authentication system
CN102638473B (en) User data authorization method, device and system
CN107005442B (en) Method and apparatus for remote access
CN111092899B (en) Information acquisition method, device, equipment and medium
CN108173822A (en) Intelligent door lock management-control method, intelligent door lock and computer readable storage medium
US20120324545A1 (en) Automated security privilege setting for remote system users
CN111027035B (en) Multi-identity authentication method and system based on block chain
CN103067338A (en) Third party application centralized safety management method and system and corresponding communication system
CN104270250B (en) WiFi internets online connection authentication method based on asymmetric whole encryption
WO2013101358A1 (en) System and method for secure network login
CN1937499A (en) Domainname-based unified identification mark and authentication method
CN109716724A (en) The method and system authenticated with double nets of the communication equipment of server communication
Jaidhar Enhanced mutual authentication scheme for cloud architecture
CN104158824A (en) Method and system of network real name authentication
CN102868702B (en) System login device and system login method
US20180234418A1 (en) Method and apparatus for facilitating access to publish or post utilizing frictionless two-factor authentication
CN104683357B (en) A kind of dynamic password authentication method and system based on software token
CN109379388B (en) Identity recognition method, terminal and wearable device
US20180365399A1 (en) Secure authentication of a user of a device during a session with a connected server
CN106534071A (en) Internet-of-vehicles link security authentication method and system based on device whitelist management
CN110278084B (en) eID establishing method, related device and system
CN104243488B (en) A kind of login authentication method of inter-network site server
CN105681350A (en) Zero interaction double-factor authentication system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20111207

Termination date: 20140412