CN108985040B - Method and apparatus, storage medium and the processor logged in using cipher key - Google Patents

Method and apparatus, storage medium and the processor logged in using cipher key Download PDF

Info

Publication number
CN108985040B
CN108985040B CN201810713864.6A CN201810713864A CN108985040B CN 108985040 B CN108985040 B CN 108985040B CN 201810713864 A CN201810713864 A CN 201810713864A CN 108985040 B CN108985040 B CN 108985040B
Authority
CN
China
Prior art keywords
cipher key
terminal
identification information
encrypted
current location
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810713864.6A
Other languages
Chinese (zh)
Other versions
CN108985040A (en
Inventor
张娟
温作奖
安晓江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Haitai Fangyuan High Technology Co Ltd
Original Assignee
Beijing Haitai Fangyuan High Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Haitai Fangyuan High Technology Co Ltd filed Critical Beijing Haitai Fangyuan High Technology Co Ltd
Priority to CN201810713864.6A priority Critical patent/CN108985040B/en
Publication of CN108985040A publication Critical patent/CN108985040A/en
Application granted granted Critical
Publication of CN108985040B publication Critical patent/CN108985040B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of method and apparatus, storage medium and processors logged in using cipher key.Wherein, this method comprises: obtaining the identification information and current location information of present terminal when logging in using cipher key, wherein present terminal is the terminal using cipher key, and current location information is the location information of present terminal;And the identification information of the authorization terminal recorded in the identification information and cipher key of present terminal be consistent and current location information with it is first logged in using cipher key when initial position message be consistent when, allow to carry out register using cipher key, wherein, authorization terminal is the terminal allowed using cipher key.The present invention solves the relevant technologies and does not limit the use scope of cipher key, leads to the technical problem that information security is lower.

Description

Method and apparatus, storage medium and the processor logged in using cipher key
Technical field
The present invention relates to information security field, in particular to a kind of method and apparatus logged in using cipher key, Storage medium and processor.
Background technique
Currently, client needs one to support more people to use cipher key, such as a finger-print cipher key in corporate client Use when spoon can be set to the fingerprint of 10 people of typing for service authorization.Since the relevant technologies do not make cipher key It is limited with range, considerably increases the probability of business information leakage in this way, or even injure personal property information or country The leakage of confidential information causes information security lower.For another example the website background system of some units, which logs in, uses password key Spoon is used as authentication tool, due to not limiting the use scope of cipher key, it will lead to system background operator Member damages system in the case where no supervision other than enterprise, and it is lower to will also result in information security.
The use scope of cipher key is not limited for the relevant technologies, causes information security is lower to ask Topic, currently no effective solution has been proposed.
Summary of the invention
The embodiment of the invention provides it is a kind of using cipher key log in method and apparatus, storage medium and processor, The use scope of cipher key is not limited at least solving the relevant technologies, the lower technology of information security is caused to be asked Topic.
According to an aspect of an embodiment of the present invention, a kind of method logged in using cipher key is provided, comprising: make When being logged in cipher key, the identification information and current location information of present terminal are obtained, wherein the present terminal is to use The terminal of the cipher key, the current location information are the location information of the present terminal;And at the current end The identification information of the authorization terminal recorded in the identification information at end and the cipher key be consistent and the current location information with When initial position message when being logged in using the cipher key for the first time is consistent, allow to carry out login behaviour using the cipher key Make, wherein the authorization terminal is the terminal allowed using the cipher key.
Further, using cipher key log in when, obtain present terminal identification information and current location information it Before, the method also includes: before being logged in for the first time using the cipher key, by the identification information storage of the authorization terminal In the cipher key;When being logged in for the first time using the cipher key, when obtaining for the first time using cipher key login The initial position message, and the initial position message is stored in the cipher key.
Further, before being logged in for the first time using the cipher key, by the identification information storage of the authorization terminal It include: before being logged in for the first time using the cipher key, by the identification information of the authorization terminal in the cipher key It is encrypted according to the first Encryption Algorithm, obtains the identification information of the encrypted authorization terminal;By the encrypted institute The identification information storage of authorization terminal is stated in the cipher key;When being logged in for the first time using the cipher key, obtain just Initial position message when the secondary login using the cipher key, and the initial position message is stored in the password It include: when being logged in for the first time using the cipher key in key, the initial position message that will acquire adds according to second Close algorithm is encrypted, and the encrypted initial position message is obtained;The encrypted initial position message is deposited Storage is in the cipher key.
Further, when being logged in using cipher key, in the identification information and current location information for obtaining present terminal Later, the method also includes: the identification information of the present terminal is encrypted according to first Encryption Algorithm, is obtained The identification information of the encrypted present terminal;The current location information is added according to second Encryption Algorithm It is close, obtain the encrypted current location information;It is recorded in the identification information and the cipher key of the present terminal Authorization terminal identification information be consistent and the current location information with for the first time using the cipher key log in when it is initial When location information is consistent, allow to carry out register using the cipher key to include: in the encrypted present terminal Identification information is consistent with the identification information of the encrypted authorization terminal and the encrypted present bit confidence When breath is consistent with the encrypted initial position message, allow to carry out register using the cipher key.
According to another aspect of an embodiment of the present invention, a kind of device logged in using cipher key is additionally provided, comprising: obtain Unit is taken, for obtaining the identification information and current location information of present terminal, wherein institute when logging in using cipher key Stating present terminal is the terminal using the cipher key, and the current location information is the location information of the present terminal; And unit is logged in, the mark of the authorization terminal for being recorded in the identification information and the cipher key in the present terminal When information is consistent and the current location information is consistent with initial position message when being logged in for the first time using the cipher key, Allow to carry out register using the cipher key, wherein the authorization terminal is the end allowed using the cipher key End.
Further, described device further include: the first storage unit, for when being logged in using cipher key, acquisition to be worked as Before the identification information and current location information of preceding terminal, before being logged in for the first time using the cipher key, by the authorization The identification information storage of terminal is in the cipher key;Second storage unit, for being stepped on for the first time using the cipher key When record, initial position message when logging in for the first time using the cipher key is obtained, and the initial position message is deposited Storage is in the cipher key.
Further, first storage unit includes: the first encrypting module, for using the cipher key for the first time Before login, the identification information of the authorization terminal is encrypted according to the first Encryption Algorithm, obtains encrypted described award Weigh the identification information of terminal;First memory module, for the identification information storage of the encrypted authorization terminal to exist In the cipher key;Second storage unit includes: the second encrypting module, for being stepped on for the first time using the cipher key When record, the initial position message that will acquire is encrypted according to the second Encryption Algorithm, is obtained encrypted described initial Location information;Second memory module, for the encrypted initial position message to be stored in the cipher key.
Further, described device further include: the first encryption unit, for obtaining when being logged in using cipher key After the identification information and current location information of present terminal, by the identification information of the present terminal according to first encryption Algorithm is encrypted, and the identification information of the encrypted present terminal is obtained;Second encryption unit is used for the present bit Confidence breath is encrypted according to second Encryption Algorithm, obtains the encrypted current location information;The login unit Include: login module, in the encrypted present terminal identification information and the encrypted authorization terminal Identification information be consistent and the encrypted current location information and the encrypted initial position message phase Fu Shi allows to carry out register using the cipher key.
According to another aspect of an embodiment of the present invention, a kind of storage medium is additionally provided, the storage medium includes storage Program, wherein described program run when execute it is described in any of the above embodiments using cipher key log in method.
According to another aspect of an embodiment of the present invention, a kind of processor is additionally provided, the processor is used to run program, Wherein, the method described in any of the above embodiments logged in using cipher key is executed when described program is run.
In embodiments of the present invention, by obtaining the identification information of present terminal and working as when being logged in using cipher key Front position information, wherein present terminal is the terminal using cipher key, and current location information is that the position of present terminal is believed Breath;The identification information of the authorization terminal recorded in the identification information and cipher key of present terminal is consistent and present bit confidence When breath is consistent with initial position message when the first login using cipher key, allow to carry out register using cipher key, Wherein, authorization terminal is the terminal allowed using cipher key, has achieved the purpose that the use scope of limit for cryptographic key, thus The technical effect for improving information security is realized, and then solves the relevant technologies and the use scope of cipher key is not carried out Limitation, leads to the technical problem that information security is lower.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the method according to an embodiment of the present invention logged in using cipher key;And
Fig. 2 is the schematic diagram of the device according to an embodiment of the present invention logged in using cipher key.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work It encloses.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
According to embodiments of the present invention, a kind of embodiment of method logged in using cipher key is provided, needs to illustrate It is that step shown in the flowchart of the accompanying drawings can execute in a computer system such as a set of computer executable instructions, Also, although logical order is shown in flow charts, and it in some cases, can be to be different from sequence execution herein Shown or described step.
Fig. 1 is the flow chart of the method according to an embodiment of the present invention logged in using cipher key, as shown in Figure 1, the party Method includes the following steps:
Step S102 obtains the identification information and current location information of present terminal when logging in using cipher key, In, present terminal is the terminal using cipher key, and current location information is the location information of present terminal;
Step S104, the identification information phase of the authorization terminal recorded in the identification information and cipher key of present terminal Symbol and when current location information is consistent with initial position message when the first login using cipher key, allows using password key Spoon carries out register, wherein authorization terminal is the terminal allowed using cipher key.
Through the above steps, by obtaining the identification information and present bit of present terminal when logging in using cipher key Confidence breath, wherein present terminal is the terminal using cipher key, and current location information is the location information of present terminal;? The identification information of the authorization terminal recorded in the identification information of present terminal and cipher key be consistent and current location information and just When secondary initial position message when being logged in using cipher key is consistent, allow to carry out register using cipher key, wherein award Weighing terminal is the terminal allowed using cipher key, has achieved the purpose that the use scope of limit for cryptographic key, to realize The technical effect of information security is improved, and then solves the relevant technologies and the use scope of cipher key is not limited, Lead to the technical problem that information security is lower.
It should be noted that the cipher key in the embodiment of the present invention can be intelligent code key, and the present invention is implemented Example is not specifically limited the type of cipher key, such as cipher key can be finger-print cipher key, dynamic password password key Spoon etc..Optionally, safety chip can be set in cipher key, wherein safety chip can be used for storing cipher key Relevant information can specifically include:
It, can be by the mark of authorization terminal before cipher key factory, namely before being logged in for the first time using cipher key Know information to be stored in the safety chip of cipher key, wherein the identification information of authorization terminal can be to allow using password key The identification information of the terminal of spoon.Optionally, the type of authorization terminal may include but be not limited to the equipment such as mobile phone, PC.It is optional Ground, the identification information of authorization terminal can be the exclusive identification code of terminal.
Optionally, before being logged in for the first time using cipher key, by the identification information storage of authorization terminal in cipher key In may include: for the first time using cipher key log in front of, by the identification information of authorization terminal according to the first Encryption Algorithm into Row encryption, obtains the identification information of encrypted authorization terminal;By the identification information storage of encrypted authorization terminal in password In key.Herein it should be noted that the embodiment of the present invention is not specifically limited the first Encryption Algorithm.
The embodiment of the present invention is stored encrypted in cipher key by carrying out the identification information of the authorization terminal of cipher key Safety chip in, can achieve prevents the identification information of authorization terminal to be tampered, with achieve the purpose that improve information security.
When logging in for the first time using cipher key, initial position message when logging in for the first time using cipher key is obtained, and Initial position message is stored in cipher key.Optionally, locating module can be set in cipher key, has utilized the positioning The location information namely available location information when logging in using cipher key of positioning cipher key may be implemented in module. Optionally, for the locating module in cipher key after getting initial position message, it is fixed that the embodiment of the present invention can control this Position module is closed, to prevent initial position message to be tampered.When reusing cipher key login, need to obtain current location Information can control locating module at this time and be again turned on, to obtain current location information, get current location information it Afterwards, control locating module is closed again, to prevent current location information to be tampered.The embodiment of the present invention is to acquired in cipher key To the form of location information be not specifically limited, such as co-ordinate position information, geographic name location information etc..
Optionally, when logging in for the first time using cipher key, initial position when logging in for the first time using cipher key is obtained Information, and it may include: that will acquire when being logged in for the first time using cipher key that initial position message, which is stored in cipher key, To initial position message encrypted according to the second Encryption Algorithm, obtain encrypted initial position message;It will be encrypted Initial position message is stored in cipher key.Herein it should be noted that the embodiment of the present invention does not do the second Encryption Algorithm Specific to limit, the second Encryption Algorithm can may be the same or different with the first Encryption Algorithm.
The embodiment of the present invention is by carrying out location information when logging in using cipher key to be stored encrypted in cipher key Safety chip in, can achieve prevents location information to be tampered, with achieve the purpose that improve information security.
When reusing cipher key login, the identification information and current location information of available present terminal, In, present terminal is the terminal using cipher key, and current location information can be the location information of present terminal.Optionally, Each terminal has a unique identification information, available current when user is logged in by terminal using cipher key The identification information of terminal.Optionally, when user is logged in by terminal using cipher key, it can use and determine in cipher key Position module positions current location information, or also can use the current location of the locating module positioning present terminal of present terminal Information, and the current location information of present terminal is also the current of cipher key.
Optionally, using cipher key log in when, obtain present terminal identification information and current location information it Afterwards, the embodiment of the present invention can also encrypt the identification information of present terminal according to the first Encryption Algorithm, after obtaining encryption Present terminal identification information, and by the identification information storage of encrypted present terminal cipher key safety chip In.The embodiment of the present invention can also encrypt current location information according to the second Encryption Algorithm, obtain encrypted current Location information, and encrypted current location information also is stored in the safety chip of cipher key.
It is stored after identification information and the current location information encryption that the embodiment of the present invention passes through the present terminal that will acquire In the safety chip of cipher key, can achieve prevents the identification information of present terminal and current location information to be tampered, with Achieve the purpose that improve information security.
In order to guarantee the safety logged in using cipher key, the embodiment of the present invention can be primarily based on present terminal Identification information and current location information be made whether to allow to carry out the judgement of register, after may include: judgement encryption The identification information of present terminal whether be consistent with the identification information of encrypted authorization terminal and encrypted current location Whether information is consistent with encrypted initial position message.After the identification information and encryption for judging encrypted present terminal The identification information of authorization terminal be consistent and when encrypted current location information is consistent with encrypted initial position message, Allow to carry out register using cipher key;When the identification information and encrypted authorization for judging encrypted present terminal When the identification information of terminal is not consistent and encrypted current location information is consistent with encrypted initial position message, alternatively, The identification information of encrypted present terminal is consistent with the identification information of encrypted authorization terminal and encrypted current location When information is not consistent with encrypted initial position message or the identification information of encrypted present terminal is awarded with encrypted When the identification information of power terminal is not consistent and encrypted current location information is not consistent with encrypted initial position message, Do not allow to carry out register using cipher key.
It should be noted that can be carried out in cipher key for all cryptographic operations in the embodiment of the present invention, Information security can be improved in this way.
In actual use, before cipher key Key factory, peace is written in the unique identifier of enterprise-specific PC by manufacturer In full chip, then encrypt.
After Key is issued to user, when user uses Key for the first time, Key obtains location information, then seals and obtains position The module of information, location information is tampered in order to prevent, in deposit safety chip after encrypting to location information.
When reusing Key, first obtain location information, in order to avoid location information is tampered at this time, need using with head The consistent encryption method of method encrypted after secondary acquisition location information is encrypted, with the encrypted location information being stored in front of It compares, passes through if compared, carry out in next step.
Key reads the unique identifier in PC, and the encryption method before being dispatched from the factory using Key to unique identification code encryption is in PC Unique identifier encrypted, search for Key safety chip in factory before be written identification code, it is identical if there is being compared with this Encrypted identification code, just can be carried out next step register.
Inventive embodiments additionally provide a kind of embodiment of device logged in using cipher key, it should be noted that should It can be used for executing the method logged in using cipher key in the embodiment of the present invention using the device that cipher key logs in, namely The method logged in using cipher key in the embodiment of the present invention can be executed in the device logged in using cipher key.
Fig. 2 is the schematic diagram of the device according to an embodiment of the present invention logged in using cipher key, as shown in Fig. 2, the dress It sets and may include:
Acquiring unit 22, for obtaining identification information and the current location of present terminal when logging in using cipher key Information, wherein present terminal is the terminal using cipher key, and current location information is the location information of present terminal;And Unit 24 is logged in, the identification information of the authorization terminal for recording in the identification information and cipher key in present terminal is consistent, And current location information with it is first logged in using cipher key when initial position message be consistent when, allow using cipher key into Row register, wherein authorization terminal is the terminal allowed using cipher key.
It should be noted that the acquiring unit 22 in the embodiment can be used for executing the step in the embodiment of the present invention S102, the login unit 24 in the embodiment can be used for executing the step S104 in the embodiment of the present invention.Above-mentioned module with it is right The example that the step of answering is realized is identical with application scenarios, but is not limited to the above embodiments disclosure of that.
Optionally, which can also include: the first storage unit, for when being logged in using cipher key, acquisition to be worked as Before the identification information and current location information of preceding terminal, before being logged in for the first time using cipher key, by the mark of authorization terminal Know information to be stored in cipher key;Second storage unit, for when logging in for the first time using cipher key, obtaining first use Initial position message when cipher key logs in, and initial position message is stored in cipher key.
Optionally, the first storage unit may include: the first encrypting module, for logging in it using cipher key for the first time Before, the identification information of authorization terminal is encrypted according to the first Encryption Algorithm, obtains the mark letter of encrypted authorization terminal Breath;First memory module, for by the identification information storage of encrypted authorization terminal in cipher key;Second storage unit May include: the second encrypting module, for when being logged in for the first time using cipher key, the initial position message that will acquire according to Second Encryption Algorithm is encrypted, and encrypted initial position message is obtained;Second memory module, being used for will be encrypted initial Location information is stored in cipher key.
Optionally, which can also include: the first encryption unit, for obtaining when being logged in using cipher key After the identification information and current location information of present terminal, the identification information of present terminal is carried out according to the first Encryption Algorithm Encryption, obtains the identification information of encrypted present terminal;Second encryption unit, for adding current location information according to second Close algorithm is encrypted, and encrypted current location information is obtained;Logging in unit includes: login module, for after encryption The identification information of present terminal be consistent with the identification information of encrypted authorization terminal and encrypted current location information with plus When initial position message after close is consistent, allow to carry out register using cipher key.
To achieve the goals above, according to another aspect of the present invention, the embodiment of the invention also provides a kind of storage Jie Matter, the storage medium include the program of storage, wherein equipment where controlling the storage medium in described program operation is held The row method described above logged in using cipher key.
To achieve the goals above, according to another aspect of the present invention, the embodiment of the invention also provides a kind of processor, The processor is for running program, wherein described program executes the side described above logged in using cipher key when running Method.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
In the above embodiment of the invention, it all emphasizes particularly on different fields to the description of each embodiment, does not have in some embodiment The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, Ke Yiwei A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple On unit.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code Medium.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (10)

1. a kind of method logged in using cipher key characterized by comprising
When logging in using cipher key, the identification information and current location information of present terminal are obtained, wherein the current end End gets for using the terminal of the cipher key, the current location information is the location information of the present terminal The identification information of the present terminal and the current location information are stored in the cipher key, and the cipher key includes Locating module, the current location information are obtained by the locating module opened, and the locating module is worked as described in the acquisition It is closed after the information of front position;And
The identification information of the authorization terminal recorded in the identification information and the cipher key of the present terminal is consistent and institute State current location information with for the first time using the cipher key log in when initial position message be consistent when, allow using described close Code key carries out register, wherein the authorization terminal is the terminal allowed using the cipher key, the initial position Information is obtained by the locating module opened, and the locating module is closed after obtaining the initial position message.
2. the method according to claim 1, wherein obtaining present terminal when logging in using cipher key Before identification information and current location information, the method also includes:
Before being logged in for the first time using the cipher key, by the identification information storage of the authorization terminal in the cipher key In;
When logging in for the first time using the cipher key, initial position when logging in for the first time using the cipher key is obtained Information, and the initial position message is stored in the cipher key.
3. according to the method described in claim 2, it is characterized in that,
Before being logged in for the first time using the cipher key, by the identification information storage of the authorization terminal in the cipher key In include: for the first time using the cipher key log in front of, by the identification information of the authorization terminal according to first encryption calculate Method is encrypted, and the identification information of the encrypted authorization terminal is obtained;By the mark of the encrypted authorization terminal Know information to be stored in the cipher key;
When logging in for the first time using the cipher key, initial position when logging in for the first time using the cipher key is obtained Information, and it includes: to be logged in for the first time using the cipher key in the cipher key that the initial position message, which is stored in, When, the initial position message that will acquire is encrypted according to the second Encryption Algorithm, obtains the encrypted initial bit Confidence breath;The encrypted initial position message is stored in the cipher key.
4. according to the method described in claim 3, it is characterized in that,
When being logged in using cipher key, after the identification information and current location information for obtaining present terminal, the method Further include: the identification information of the present terminal is encrypted according to first Encryption Algorithm, is obtained encrypted described The identification information of present terminal;The current location information is encrypted according to second Encryption Algorithm, after obtaining encryption The current location information;
The identification information of the authorization terminal recorded in the identification information and the cipher key of the present terminal is consistent and institute State current location information with for the first time using the cipher key log in when initial position message be consistent when, allow using described close It includes: identification information and the encrypted authorization in the encrypted present terminal that code key, which carries out register, The identification information of terminal is consistent and the encrypted current location information and the encrypted initial bit confidence When manner of breathing accords with, allow to carry out register using the cipher key.
5. a kind of device logged in using cipher key characterized by comprising
Acquiring unit, for obtaining the identification information and current location information of present terminal when logging in using cipher key, In, the present terminal is the terminal using the cipher key, and the current location information is the position of the present terminal Information, the identification information and the current location information of the present terminal got are stored in the cipher key, institute Stating cipher key includes locating module, and the current location information is obtained by the locating module opened, the positioning mould Block is closed after obtaining the current location information;And
Unit is logged in, the mark of the authorization terminal for recording in the identification information and the cipher key in the present terminal When information is consistent and the current location information is consistent with initial position message when being logged in for the first time using the cipher key, Allow to carry out register using the cipher key, wherein the authorization terminal is the end allowed using the cipher key End, the initial position message are obtained by the locating module opened, and the locating module is obtaining the initial position It is closed after information.
6. device according to claim 5, which is characterized in that described device further include:
First storage unit, for when logging in using cipher key, obtaining the identification information and present bit confidence of present terminal Before breath, before being logged in for the first time using the cipher key, by the identification information storage of the authorization terminal in the password In key;
Second storage unit, for when being logged in for the first time using the cipher key, acquisition to be stepped on using the cipher key for the first time Initial position message when record, and the initial position message is stored in the cipher key.
7. device according to claim 6, which is characterized in that
First storage unit includes: the first encrypting module, is used for before being logged in for the first time using the cipher key, by institute The identification information for stating authorization terminal is encrypted according to the first Encryption Algorithm, obtains the mark letter of the encrypted authorization terminal Breath;First memory module, for by the identification information storage of the encrypted authorization terminal in the cipher key;
Second storage unit includes: the second encrypting module, for will acquire when being logged in for the first time using the cipher key To the initial position message encrypted according to the second Encryption Algorithm, obtain the encrypted initial position message;The Two memory modules, for the encrypted initial position message to be stored in the cipher key.
8. device according to claim 7, which is characterized in that
Described device further include: the first encryption unit is used for when being logged in using cipher key, in the mark for obtaining present terminal After information and current location information, the identification information of the present terminal is encrypted according to first Encryption Algorithm, Obtain the identification information of the encrypted present terminal;Second encryption unit is used for the current location information according to institute It states the second Encryption Algorithm to be encrypted, obtains the encrypted current location information;
The login unit includes: login module, in the encrypted present terminal identification information and the encryption The identification information of the authorization terminal afterwards is consistent and the encrypted current location information and the encrypted institute When stating initial position message and being consistent, allow to carry out register using the cipher key.
9. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein run in described program When control the storage medium where equipment perform claim require any one of 1 to 4 described in method.
10. a kind of processor, which is characterized in that the processor is for running program, wherein right of execution when described program is run Benefit require any one of 1 to 4 described in method.
CN201810713864.6A 2018-06-29 2018-06-29 Method and apparatus, storage medium and the processor logged in using cipher key Active CN108985040B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810713864.6A CN108985040B (en) 2018-06-29 2018-06-29 Method and apparatus, storage medium and the processor logged in using cipher key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810713864.6A CN108985040B (en) 2018-06-29 2018-06-29 Method and apparatus, storage medium and the processor logged in using cipher key

Publications (2)

Publication Number Publication Date
CN108985040A CN108985040A (en) 2018-12-11
CN108985040B true CN108985040B (en) 2019-06-28

Family

ID=64539933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810713864.6A Active CN108985040B (en) 2018-06-29 2018-06-29 Method and apparatus, storage medium and the processor logged in using cipher key

Country Status (1)

Country Link
CN (1) CN108985040B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111147457A (en) * 2019-12-12 2020-05-12 泰斗微电子科技有限公司 Data processing method and device, terminal equipment and server
CN111597545B (en) * 2020-05-19 2021-08-31 北京海泰方圆科技股份有限公司 Authorization management method and device
CN115051914A (en) * 2022-03-24 2022-09-13 飞诺门阵(北京)科技有限公司 Method and device for processing equipment configuration information, electronic equipment and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9208293B1 (en) * 2008-01-28 2015-12-08 Sprint Communications Company L.P. Authentication for tag-based content delivery
CN104253801B (en) * 2013-06-28 2017-09-22 中国电信股份有限公司 Realize the methods, devices and systems of login authentication
CN103685311B (en) * 2013-12-27 2017-06-13 网易(杭州)网络有限公司 A kind of login validation method and equipment
CN107104968A (en) * 2017-04-27 2017-08-29 深圳怡化电脑股份有限公司 Safety certifying method, system, terminal and the storage medium of portable finance device

Also Published As

Publication number Publication date
CN108985040A (en) 2018-12-11

Similar Documents

Publication Publication Date Title
CN109067528B (en) Password operation method, work key creation method, password service platform and equipment
EP3893170A1 (en) Federated learning-based model parameter training method, apparatus and device, and medium
CN107645486B (en) login authentication method and device
CN109766700A (en) Access control method and device, the storage medium, electronic device of file
US9372987B1 (en) Apparatus and method for masking a real user controlling synthetic identities
CN108985040B (en) Method and apparatus, storage medium and the processor logged in using cipher key
US9781109B2 (en) Method, terminal device, and network device for improving information security
CN106850209A (en) A kind of identity identifying method and device
CN109902494A (en) Data encryption storage method, device and document storage system
CN110740128B (en) Offline data encryption method and device
CN110399717A (en) Key acquisition method and device, storage medium and electronic device
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN106992851A (en) TrustZone-based database file password encryption and decryption method and device and terminal equipment
CN112131564A (en) Encrypted data communication method, apparatus, device, and medium
WO2022206453A1 (en) Method and apparatus for providing cross-chain private data
CN109246088A (en) A kind of big data security system based on financial service management
CN110381075A (en) Equipment identities authentication method and device based on block chain
CN112559991A (en) System secure login method, device, equipment and storage medium
CN106656992A (en) Information verification method
CN108965324A (en) A kind of anti-brush method of short message verification code, terminal, server, equipment and medium
CN108737390A (en) Protect the authentication method and system of user name privacy
US11445374B2 (en) Systems and methods for authenticating a subscriber identity module swap
CN105743859B (en) A kind of method, apparatus and system of light application certification
CN113254989B (en) Fusion method and device of target data and server
CN106156650A (en) Data protection system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant