CN108400969A - A kind of striding equipment, cross-platform safe login method - Google Patents

A kind of striding equipment, cross-platform safe login method Download PDF

Info

Publication number
CN108400969A
CN108400969A CN201810045921.8A CN201810045921A CN108400969A CN 108400969 A CN108400969 A CN 108400969A CN 201810045921 A CN201810045921 A CN 201810045921A CN 108400969 A CN108400969 A CN 108400969A
Authority
CN
China
Prior art keywords
computer end
mobile phone
password
socket
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810045921.8A
Other languages
Chinese (zh)
Inventor
宋军
王力哲
杨帆
马钊
高坤
徐衡
胡雨涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Geosciences
Original Assignee
China University of Geosciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Geosciences filed Critical China University of Geosciences
Priority to CN201810045921.8A priority Critical patent/CN108400969A/en
Publication of CN108400969A publication Critical patent/CN108400969A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • H04L69/162Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/06Details of telephonic subscriber devices including a wireless LAN interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of striding equipment, cross-platform safe login methods, including " password tunnel " module and automated log on module two parts;Wherein, " password tunnel " module is used to establish the communication of computer end and mobile phone by WiFi, and the information of coded communication makes the encrypted information that can not be stolen;When automated log on module receives register instruction for computer end, computer end sends logging request to mobile phone, and corresponding username and password is sent to computer, realizes the automated log on of computer end by mobile phone.The present invention uses Socket technologies, and the communication of computer and mobile phone is established by WiFi, and the communication information can not be stolen by encryption, as long as carrying Android phone, can carry out striding equipment, cross-platform secure log whenever and wherever possible, simple and convenient, highly practical;The present invention realizes the management to computer end account password, can be by mobile phone in computer end automated log on;The present invention has higher universality and higher application prospect.

Description

A kind of striding equipment, cross-platform safe login method
Technical field
The present invention relates to field of information security technology, specially a kind of striding equipment, cross-platform safe login method.
Background technology
Nowadays, according to Potsdam, Germany university Ha Suo Hasso Plattners research institute current research report, " 123456 " still It is to use most wide password, in other words it is also assumed that being the password of worst.Scientific research personnel collects and arranges in network The password of upper exposure, statistical collection 215,185,959 altogether at present, wherein wherein reference password number quantity in 2015 is more than 35,000,000 It is a.It shows that at least 10% password uses " 123456 " by big data, is followed by " 123456789 " and " 12345678 ", Accounting is respectively 3.5% and 1.9%.Password " password " and " qwerty " occupy first five, and accounting is respectively 1.85% He 0.95%.
《Weak password rule in 3,000,000 sample of big data analysis》In report, repeatedly propose " memory cost " this Word, it is the most basic reason for occurring so many weak password that it is excessive, which to remember cost,.So contradiction is that:Safety=trouble saves Thing=dangerous=more troublesome thing.To solve the above-mentioned problems, many password keeping softwares also just generate therewith, such as KeePass, LastPass, 1Password etc..
There are two types of storage modes for the database of these Password Management softwares, and some is taken preserves user on network server The method (such as LastPass etc.) of cryptographic libraries, some then take local side preserve user password library method (such as KeePass, 1Password etc.).
It is stored in the Password Management software on network server for key database, many people worry its safety, Once server is attacked, then the password of all users is through facing the risk of leakage.4 days or so May in 2011, LastPass exists Its blog has issued safety notice, and notice was found that suspicious network activity May 3 in LastPass internal networks, suspected There may be Partial encryption leaking data.LastPass has locked rapidly all accounts and has prevented from illegally being logged in, and passes through electronics Mail notification user, which confirms E-mail address and changes stronger main password, reactivates account to ensure data safety.Largely more The operation for changing main password also results in LastPass server delay machines.
It is stored in the Password Management software of local side for key database, the platform each logged in is required for that there are one The database of key, if login account on different devices, otherwise necessary prior sync database will be unable to realize automatic It logs in, this results in great inconveniences.
Invention content
The technical problem to be solved in the present invention is, automated log on pole is realized not on different devices at present for above-mentioned Convenient technological deficiency provides a kind of striding equipment, cross-platform safe login method to solve the above problems.
A kind of striding equipment, cross-platform safe login method, which is characterized in that including " password tunnel " module and automated log on Module two parts;Wherein, communication of " password tunnel " module for establishing computer end and mobile phone by WiFi, and coded communication Information makes the encrypted information that can not be stolen;When automated log on module receives register instruction for computer end, computer It holds to mobile phone and sends logging request, corresponding username and password is sent to computer, realizes the automated log on of computer end by mobile phone.
Further, the communication for the computer end and mobile phone that " password tunnel " module is established is realized by building C/S structures , by computer end as server-side, mobile phone forms a small-sized network as client.
Further, mobile phone is communicated to realize with computer end by creating client thread, the server-side in computer end Host ip and process port numbers are obtained when unlatching, and the connection with computer end is established using socket.
Further, computer end realizes building for server-side using C# language, and mobile phone terminal is realized using Java language Client is built.
Further:The work of " password tunnel " module is as follows:
S51, the unlatching service of Start () function is defined, passes through the constructed fuction Socket of Socket classes (AddressFamily.InterNetwork, SocketType.Stream, ProtocolType.Tcp) creates a server-side Then socket descriptors are assigned to IP address and port numbers by Bind (localEndPoint) function in Socket classes Socket then calls Listen (1) function in Socket classes to monitor this socket, monitors whether have server-side hair in real time The request come;
S52, thread serverThread=new Thread (new ThreadStart (ReceiveAccept)) are created And the server thread is opened, client session class Client, and the example in function ReceiveAccept () are defined first Change such, for operating the client socket received in correlation function;
When S53, stopping service, Abort () function in Close () function and Thread classes in Socket classes is called To close socket and terminate thread.
Further, automated log on module work is as follows:
S61, pass through calling public static extern int GetFocus (), public static extern Int AttachThreadInput (int idAttach, int idAttachTo, int fAttach) and public static The api functions such as extern int GetWindowThreadProcessId (int hwnd, int lpdwProcessId), effectively Solve the problems, such as that Views show and obtain input frame focus;
S62, void OnLoad (EventArgs e) function is rewritten, loads customized forms program;
ExStyle parameters in S63, rewriting CreateParams classes do not activate mark for the forms pattern addition of extension, So that although forms are always showed in top, but it is not at state of activation;
S64, mouse click function void btnStart_Click (object o, EventArgs e) are defined;
S65, setting is affine, and thread where being attached to foreground window can just obtain control in thread only in thread Focus.
Further, also a kind of striding equipment, cross-platform Security Login System, which is characterized in that including " password tunnel " Module and automated log on module two parts;Wherein, " password tunnel " module is used to establish leading to for computer end and mobile phone by WiFi Letter, and the information of coded communication makes the encrypted information that can not be stolen;Automated log on module receives login for computer end When operational order, computer end sends logging request to mobile phone, and corresponding username and password is sent to computer by mobile phone, realizes electricity The automated log at brain end.
The theory significance and actual application value that the present invention has:Realize a kind of striding equipment, cross-platform secure log Method establishes the communication of computer and mobile phone by WiFi using Socket technologies, and the information of communication can not be stolen by encryption It takes;When user needs to carry out application or the web logins of computer end, computer gives mobile phone to send logging request, and mobile phone will be corresponding Username and password is sent to computer, it can be achieved that computer end is applied and the automated log on of web, as long as carrying Android phone, just Striding equipment, cross-platform secure log can be carried out whenever and wherever possible, it is not necessary that the cryptographic libraries in mobile phone are synchronized in computer, simply just It is prompt, highly practical;It can realize that mobile phone terminal and computer end are applied and the account of web is automatic by the connection of mobile phone terminal and computer end It logs in, does not directly display password in user operation process, striding equipment, cross-platform protection are provided, it is hidden to further reduced user The risk of private leakage;The performance of practicality and high efficiency of the present invention contains huge market and application prospect.
Description of the drawings
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is a kind of striding equipment of the present invention, cross-platform safe login method structure chart;
Fig. 2 is a kind of striding equipment of the present invention, cross-platform Security Login System password tunnel main interface;
Fig. 3 is a kind of striding equipment of the present invention, cross-platform Security Login System barcode scanning connection figure;
Fig. 4 is a kind of striding equipment of the present invention, cross-platform Security Login System computer end reception hum pattern;
Fig. 5 is a kind of striding equipment of the present invention, cross-platform Security Login System selection account figure;
Fig. 6 is a kind of striding equipment of the present invention, cross-platform Security Login System automated log on figure.
Specific implementation mode
For a clearer understanding of the technical characteristics, objects and effects of the present invention, now control attached drawing is described in detail The specific implementation mode of the present invention.
As shown in Figure 1, the present invention mainly establishes the communication of computer and mobile phone by WiFi, the information of communication is by encryption nothing Method is stolen;When user needs to carry out application or the web logins of computer end, computer gives mobile phone to send logging request, and mobile phone will Corresponding username and password is sent to computer, it can be achieved that computer end is applied and the automated log on of web, as long as carrying Android Mobile phone can carry out striding equipment, cross-platform secure log whenever and wherever possible,
1, " password tunnel " module
The communication of " password tunnel " function is realized by building C/S structures.Computer end establishes Wi-Fi hotspot as clothes Business end, mobile phone terminal accesses WiFi as client, and host ip and process port numbers, utilization are obtained when computer end is opened and serviced Socket is communicated.
For the C/S structures of this function by computer as server-side, mobile phone forms a small-sized network as client. Computer end realizes building for server-side with C# language, and mobile phone terminal realizes building for customer side with Java language.
Computer end first has to the port for obtaining the IP address of oneself and the process after the order of acquisition " opening service " Number, port numbers are supplied to mobile phone terminal to realize the connection of Socket.It is to realize the code for obtaining IP and port numbers below:Its In, the effect of function PortInUse (int port) is to check whether the port is occupied by other processes, is returned if occupying True, if do not have it is occupied if return to false.
It defines Start () function and opens service, pass through the constructed fuction Socket of Socket classes (AddressFamily.InterNetwork, SocketType.Stream, ProtocolType.Tcp) creates a server-side Then socket descriptors are assigned to IP address and port numbers by Bind (localEndPoint) function in Socket classes Socket then calls Listen (1) function in Socket classes to monitor this socket, monitors whether have server-side hair in real time The request come.
It creates thread serverThread=new Thread (new ThreadStart (ReceiveAccept)) and opens The server thread is opened, defines client session class Client first, and instantiation should in function ReceiveAccept () Class, for operating the client socket received in correlation function.
The effect of wherein function ReceiveMessages (Client client) is the client-side information that processing receives, Information can be sent to client simultaneously, client is received using Receive (receiveBuffer) function in Socket classes The information transmitted, we define information is transmitted in the form of byte stream in socket, so with receiveBuffer words Joint number group receives, and receives and converts byte arrays to character string after information and facilitate processing, the transmission of information is utilization Send (sendBuffer) in Socket classes is realized, is also transmitted by byte arrays.
When stopping service, Abort () function in Close () function and the Thread classes in Socket classes need to be called It closes socket and terminates thread.
After computer end opens service, mobile phone terminal need to insert IP address and port numbers establish client and server-side it Between communication.
Mobile phone terminal establishes socket connections by creating client thread.Thread mRunnable is defined, is led in thread Cross the socket descriptors of IP address and port numbers one client of establishment that computer end provides.Then iostream is encapsulated, Data are sent using write (startFlag.getBytes ()) function in OutputStream classes, and utilizing should Flush () function in class refreshes output stream.Client utilizes the read in OutputStream classes when receiving message (buffer) function reads in data in the form of byte stream, and is stored in byte arrays.
The above work completes the connection of mobile phone terminal and computer end.
2, automated log on module
It realizes there are two automatic input main problems to be solved:First, how present procedure to be made to always show In forms top layer, the focus just obtained in real time is monitored;Second, the focus of current foreground window input frame how is obtained, And acquisition focus process is made not clashed with present procedure, that is, after clicking foreground window input frame acquisition focus, the present invention Program is still in monitoring foreground window.
The api function of Windows is utilized in the automatic input informational function of computer end of the present invention.Pass through calling publicstatic extern int GetFocus()、public static extern int AttachThreadInput (int idAttach, int idAttachTo, int fAttach) and public static The api functions such as extern int GetWindowThreadProcessId (int hwnd, int lpdwProcessId), effectively Solve the problems, such as that Views show and obtain input frame focus.
In order to provide the mark of automatic input to program and the api function of calling Windows, the present invention be facilitated to devise spy Different button response events, and drawing classes are defined for drawing response button.
Wherein, the effect of constructed fuction vkButton (string text, Size size, Font font) is to create certainly Button is defined, button instance is generated, is the entrance of drawing classes.Function void btnNormal (object o, EventArgse) Effect be paint conventional sense button interfaces, create drawing object first, then call btnPaint (graphic, This.ForeColor, NormalColor) function drawing button interfaces, last releasing object resource.Painting mouse is pressed when activating The function void btnHover (object o, EventArgs e) and painting mouse at button interface press the function of rear button interfaces Void btnPressed (object o, EventArgs e) and function void btnNormal (object o, EventArgs E) similar.Function void btnPaint (Graphics graphic, Color foreColor, Color BackgroundColor it is) most important function in drawing classes, effect is according to incoming color, background colour and drawing circle Face parameter generates required button.Generating process is similar with the drawing in reality, first Define Brush, Fill Color and background Color then generates the filling of brush example and generates button.
Void OnLoad (EventArgs e) function is rewritten, customized forms program is loaded.It creates first and starts to record The example for entering button and conclusion button, button is added in forms.Then frame size is set, close control frame, and should Forms are set as always showing in top.It is eventually adding the monitoring to button.
By the automatic input function of completing computer end with upper module.
As shown in figures 2-6, specifically also a kind of striding equipment, cross-platform Security Login System, for realizing foregoing invention The institute of content is functional, including " password tunnel " module and automated log on module two parts;Wherein, " password tunnel " module is used for The communication of computer end and mobile phone is established by WiFi, and the information of coded communication makes the encrypted information that can not be stolen;From When dynamic login module receives register instruction for computer end, computer end sends logging request to mobile phone, and mobile phone will be corresponding Username and password is sent to computer, realizes the automated log on of computer end.
In actual life, user carries out needing to input using when logging in web in Android platform and windows platform Username and password may cause to reveal these privacy informations in input, and traditional solution is to hide other people's input, This brings many inconvenience again.The present invention can make user not have to worry this problem, because not having in user's input process It showed username and password, the risk that username and password is revealed is made to substantially reduce.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (7)

1. a kind of striding equipment, cross-platform safe login method, which is characterized in that including " password tunnel " module and automated log on mould Block two parts;Wherein, " password tunnel " module is used to establish the communication of computer end and mobile phone, and the letter of coded communication by WiFi Breath makes the encrypted information that can not be stolen;When automated log on module receives register instruction for computer end, computer end Logging request is sent to mobile phone, corresponding username and password is sent to computer, realizes the automated log on of computer end by mobile phone.
2. a kind of striding equipment according to claim 1, cross-platform safe login method, which is characterized in that " password tunnel " The communication of computer end and mobile phone that module is established is realized by building C/S structures, and by computer end as server-side, mobile phone is made For client, a small-sized network is formed.
3. a kind of striding equipment according to claim 1, cross-platform safe login method, which is characterized in that mobile phone passes through wound It builds client thread to communicate with computer end to realize, host ip and process port is obtained when the server-side in computer end is opened Number, establish the connection with computer end using socket.
4. a kind of striding equipment according to claim 1, cross-platform safe login method, which is characterized in that computer end uses C# language realizes building for server-side, and mobile phone terminal realizes building for client using Java language.
5. a kind of striding equipment according to claim 1, cross-platform safe login method, which is characterized in that " password tunnel " Module work is as follows:
S51, the unlatching service of Start () function is defined, passes through the constructed fuction Socket of Socket classes (AddressFamily.InterNetwork, SocketType.Stream, ProtocolType.Tcp) creates a server-side Then socket descriptors are assigned to IP address and port numbers by Bind (localEndPoint) function in Socket classes Socket then calls Listen (1) function in Socket classes to monitor this socket, monitors whether have server-side hair in real time The request come;
S52, thread serverThread=new Thread (new ThreadStart (ReceiveAccept)) are created and are opened The server thread is opened, defines client session class Client first, and instantiation should in function ReceiveAccept () Class, for operating the client socket received in correlation function;
When S53, stopping service, Abort () function in Close () function and Thread classes in Socket classes is called to close It closes socket and terminates thread.
6. a kind of striding equipment according to claim 1, cross-platform safe login method, which is characterized in that automated log on mould Block work is as follows:
S61, pass through calling public static extern int GetFocus (), public static extern int AttachThreadInput (int idAttach, int idAttachTo, int fAttach) and public static The api functions such as extern int GetWindowThreadProcessId (int hwnd, int lpdwProcessId), effectively Solve the problems, such as that Views show and obtain input frame focus;
S62, void OnLoad (EventArgs e) function is rewritten, loads customized forms program;
ExStyle parameters in S63, rewriting CreateParams classes do not activate mark for the forms pattern addition of extension so that Although forms are always showed in top, but be not at state of activation;
S64, mouse click function void btnStart_Click (object o, EventArgs e) are defined;
S65, setting is affine, and thread where being attached to foreground window can just obtain the focus of control in thread only in thread.
7. a kind of striding equipment, cross-platform Security Login System, which is characterized in that including " password tunnel " module and automated log on mould Block two parts;Wherein, " password tunnel " module is used to establish the communication of computer end and mobile phone, and the letter of coded communication by WiFi Breath makes the encrypted information that can not be stolen;When automated log on module receives register instruction for computer end, computer end Logging request is sent to mobile phone, corresponding username and password is sent to computer, realizes the automated log on of computer end by mobile phone.
CN201810045921.8A 2018-01-17 2018-01-17 A kind of striding equipment, cross-platform safe login method Pending CN108400969A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810045921.8A CN108400969A (en) 2018-01-17 2018-01-17 A kind of striding equipment, cross-platform safe login method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810045921.8A CN108400969A (en) 2018-01-17 2018-01-17 A kind of striding equipment, cross-platform safe login method

Publications (1)

Publication Number Publication Date
CN108400969A true CN108400969A (en) 2018-08-14

Family

ID=63094595

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810045921.8A Pending CN108400969A (en) 2018-01-17 2018-01-17 A kind of striding equipment, cross-platform safe login method

Country Status (1)

Country Link
CN (1) CN108400969A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102651739A (en) * 2011-02-28 2012-08-29 阿里巴巴集团控股有限公司 Login verification method, system and instant messaging (IM) server
CN103279411A (en) * 2013-06-06 2013-09-04 刘洪磊 Method and system of entering application programs based on fingerprint identification
CN103313428A (en) * 2013-06-17 2013-09-18 南京邮电大学 Wi-Fi (wireless fidelity) communication system and Wi-Fi communication method for smartphone and upper computer in computer five-prevention system
AU2014202843A1 (en) * 2013-05-23 2014-12-11 Nowww.Us Pty Ltd A process for Encrypted Login to a Secure Computer Network, for the Creation of a Session of Encrypted Communications Between Computers and a Device Including a Mobile Phone Logged into a Network, for the Persistence of Encrypted Communications between Communication Devices, and for the Termination of Communications.

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102651739A (en) * 2011-02-28 2012-08-29 阿里巴巴集团控股有限公司 Login verification method, system and instant messaging (IM) server
AU2014202843A1 (en) * 2013-05-23 2014-12-11 Nowww.Us Pty Ltd A process for Encrypted Login to a Secure Computer Network, for the Creation of a Session of Encrypted Communications Between Computers and a Device Including a Mobile Phone Logged into a Network, for the Persistence of Encrypted Communications between Communication Devices, and for the Termination of Communications.
CN103279411A (en) * 2013-06-06 2013-09-04 刘洪磊 Method and system of entering application programs based on fingerprint identification
CN103313428A (en) * 2013-06-17 2013-09-18 南京邮电大学 Wi-Fi (wireless fidelity) communication system and Wi-Fi communication method for smartphone and upper computer in computer five-prevention system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
J.SONG F.YANG L.WANG: "secure authentication in motion: A novel online payment framework for drive-thru Internet", 《FUTURE GENERATION COMPUTER SYSTEMS》 *
LEEVANS: "获取当前具有输入焦点控件的窗口句柄", 《HTTPS://BLOG.CSDN.NET/LEEVANS/ARTICLE/DETAILS/7318023》 *
LXTING21: "C#让TopMost窗体弹出并置顶层但不获取当前输入焦点的终极办法", 《HTTPS://BLOG.CSDN.NET/LVXIAOTING/ARTICLE/DETAILS/50388379》 *
蒋中云等: "《计算机网络原理与实践》", 30 September 2017 *

Similar Documents

Publication Publication Date Title
CN108650149B (en) Server testing method, device, equipment and computer readable storage medium
EP3484125B1 (en) Method and device for scheduling interface of hybrid cloud
US7188314B2 (en) System and method for user authentication interface
US6728884B1 (en) Integrating heterogeneous authentication and authorization mechanisms into an application access control system
JP5057475B2 (en) Service access authentication data management system
CN108829528B (en) Content sharing method and device, and message processing method and device
CA2585591A1 (en) Screensaver for individual application programs
CN109214161A (en) A kind of two-dimension code safe label login system
Hu et al. Development and operation analysis of spectrum monitoring subsystem 2.4–2.5 GHz range
CN104363226A (en) Method, device and system for logging in operating system
CN112436936B (en) Cloud storage method and system with quantum encryption function
Takashio et al. A mobile agent framework for follow-me applications in ubiquitous computing environment
CN106506565B (en) Remote command execution method and device
CN103384254A (en) Application account login method, server, client and system
CN107643930A (en) Using operation method and Cloud Server
CN111901289B (en) Identity authentication method, device, equipment and storage medium
US20060137001A1 (en) Methods, systems, and computer program products for providing authentication in a computer environment
CN108400969A (en) A kind of striding equipment, cross-platform safe login method
US7039952B2 (en) Using patterns to perform personal identification data substitution
US20030046590A1 (en) Secure personal identification number entry in a distributed network
CN101527646A (en) System and method for WEB network management
CN111539006A (en) Authority management and control method and device
CN109286931B (en) Wireless local area network access method and device
Hoang et al. Secure roaming with identity metasystems
KR100468566B1 (en) Integrated Authentication Method of TCP/IP Service via HTTP Proxy

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Song Jun

Inventor after: Yang Fan

Inventor after: Ma Zhao

Inventor after: Gao Kun

Inventor after: Xu Heng

Inventor after: Hu Yutao

Inventor before: Song Jun

Inventor before: Wang Lizhe

Inventor before: Yang Fan

Inventor before: Ma Zhao

Inventor before: Gao Kun

Inventor before: Xu Heng

Inventor before: Hu Yutao

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180814