CN1359487A - Apparatus and methods for unlocking password protected software systems to recover master password - Google Patents

Apparatus and methods for unlocking password protected software systems to recover master password Download PDF

Info

Publication number
CN1359487A
CN1359487A CN 99812581 CN99812581A CN1359487A CN 1359487 A CN1359487 A CN 1359487A CN 99812581 CN99812581 CN 99812581 CN 99812581 A CN99812581 A CN 99812581A CN 1359487 A CN1359487 A CN 1359487A
Authority
CN
China
Prior art keywords
user
password
key
central
local system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 99812581
Other languages
Chinese (zh)
Inventor
肯尼思·S·汉考克
托马斯·E·瓦德三世
道格拉斯·B·马克瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
YINDEK SYSTEM CO
Original Assignee
YINDEK SYSTEM CO
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by YINDEK SYSTEM CO filed Critical YINDEK SYSTEM CO
Publication of CN1359487A publication Critical patent/CN1359487A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides apparatus and method for recovering a forgotten password while maintaining the security and integrity of protected software system. In particular, the present invention provides for a centralized contact, as the 'central administrator' or 'central administration'. The present invention further provides for the identification of the particular user (10, 20, 30, 40, 50 and 60) to the particular local system, the identification of the particular local system to the central administrator, and the identification of the particular user to the central administrator. After providing all of the above-described proper identifications, the present invention provides for the identification of the forgotten password to the central administrator who then provides the forgotten password to the user. Also alternatively, the invention provides for the identification by the central administrator of a key that will unlock the software system (300) for the user so that the user can access the identification of the user's password.

Description

The apparatus and method that are used for unlocking password protected software systems to recover master password
Related application
It number is 60/100,753 right that the application requires the temporary patent application submitted on September 17th, 1998, and the disclosed content of this application all is included in this.
Field of the present invention
The present invention relates generally to the password protection software systems, the software systems of the password protection of screen display are particularly arranged, as be used for the electronic programme guide system that is equipped with head of a family's control of television-viewing.
Background of the present invention
Many software systems require user's password of input before system allows user capture.Password must be discerned by software systems, thus the authorized user access system.An example of password protection software systems is the electronic programme guide systems that are equipped with head of a family's control, as the Guide Plus+99 that V-Chip Plus+In-Guide user interface is housed of Gemstar.
The password of clearly remembeing user oneself is user's a responsibility.If a user has forgotten password, the user just can not access system, learns this password once more up to the user.
The software systems of some password protections can obtain on network.In a network system, a network manager, online service supplier or similar are arranged typically, set up the initialization password, and help password that passes out of mind of User Recognition.
In many password protection software systems, the user provides initial (first-time) password by network manager, online service supplier or manufacturer.When the user attempted access system, the system prompt user imported user password.Some systems program discerns whether this password is " initially " password.When system detects an initial challenge, the system prompt user selects people's password one by one.Another is selected, and initial challenge is set to after a short relatively period or short relatively access times just expired.System is identified the expiration date of password by programming, and notifies the user must select a new password before old password expires.
If the user has forgotten chosen password, under the situation of many online network systems, system or Network Management person can typically be user's recover to pass out of mind sign of password.System or network manager, typical situation is away from user's locality, the secure file (security file) that he can check system inside.By reading inner secure file, system or network manager can offer this user's of user password.Before disclosing password, the system manager typically requires the user to provide correct sign to the system manager.
On the other hand, be not under the situation of system in the network a system, or under user, system or network manager can not the situations of access system software, in a single day password was set, and just has only system to know.In the application, so hereinafter system is known as " local system ".The example of a local system is exactly that a screen system that is used for head of a family's control of television-viewing is as the Guide Plus+99 that V-Chip Plus+In-Guide user interface is housed of Gemstar.
In a local system, do not have the network manager to read file, and offer the password that the user selectes from relative user's remote location.In such local system, the user have to disclose the password that passes out of mind by dismounting equipment; Separate the system hardware parts (as the RAM storage) of having preserved password; Then these parts are delivered to manufacturer goes to analyze there.This is pretty troublesome, also is unpractical solution.
Another offers the pass out of mind method of sign of password of user capture may be to allow the user capture password.That is to say that the user can select an option in system, it can show password.Yet such method is self-defeating, because others also can visit this password coequally.
Also have a kind of pass out of mind method of sign of password of user capture that can offer may provide the method for a back door, as: take out and plug again TV; Or by next enter key combination, for example button of a TV remote controller.Yet such back door method may can be found soon; Along with increasing family uses this password protection system, such back door method will become and be widely known by the people.
Because for some users, the password of forgetting them again and again is inevitably, just needs one can also keep the security of protected software systems and the method and apparatus of integrality for the user recovers the password while that passes out of mind.
Summary of the present invention
The invention provides equipment and method and satisfy these demands.Specifically, the invention provides equipment and the method for in security that keeps protected software systems and integrality, recovering the password that passes out of mind.Particularly, the invention provides a concentrated contact, when hereinafter referred as " central administrator " or " central management platform ".The present invention further provides the sign of specific user to specific local system, specific local system is to central administrator's sign, and the specific user is to central administrator's sign.After above-mentioned all correct signs are provided, the invention provides the password that passes out of mind to central administrator's sign, this central administrator and then the password that this is forgotten offered the user.
Also have a selection, the present invention by the central administrator for the user provide one can the release software systems key identification so that the sign that the user can the calling party password.
The hereinafter common referred password identification procedure that passes out of mind is meant master password rejuvenation in the application.
Diagram is described
Relate to following description, appended claim, and the diagram of following, these and other features of the present invention, aspect, advantage will become better understood:
Fig. 1 shows that on a screen setup procedure request user imports the diagram of the embodiment that the local system of the master password that identification information and user select realizes;
Fig. 2 is the process flow diagram of an embodiment realizing of the local system of master password setup procedure;
Fig. 3 is the diagram that demonstrates the embodiment that local system that master password recovers indicator panel realizes on a screen;
Fig. 4 is the process flow diagram of an embodiment realizing of the local system of master password rejuvenation.
Detailed description of the present invention
A central administration contact is called the central administrator when the application hereinafter mentions, be established.The user can visit the central administrator, by as one 800, or 900 telephone numbers, a website, or the like.In the embodiment of first-selection, central administration contact is a full automatic computer telephony interface system.In the embodiment of first-selection, the robotization center management system provides speech to exchange to the user, and the request user provides by the telephone key button of pushing the user and inputs to the central administrator.Alternatively, the robotization center management system programs recognizing voice, so the user can be by speaking so that requested information to be provided with center management system.
A. master password setup procedure
When the user attempts to visit local system, local system will point out the user to enter password.Typically, this is that a password protection system is for the first time accessed, and system will allow password of User Recognition.This password of hereinafter mentioning in the application is called " master password ".
As selection, manufacturer can provide system's initial challenge for the buyer.Fig. 2 is the process flow diagram of an embodiment realizing of the local system of master password setup procedure, has been provided an initial challenge this user.
When local system when being for the first time accessed, user/buyer is prompted initial challenge 210 will be provided.The password input or other user input that here relate to can realize by the variant that uses multiple device 230 and 450, include but not limited to infrared remote-control device, as TV remote controller 232a, 233a, 235a, 452a, perhaps keyboard 232b, 233b, 235b, 452b.The input media that uses is not a restriction of the present invention.
In case user/buyer provides initial challenge 220,232a and 232b, system typically will invite the user to select people's master password 250 one by one.In case the user selects and has imported master password 270 and Fig. 1,80, local system typically please the user be entered password for the second time, confirms master password (not showing).If the user can not confirm this password, local system typically is returned to initial challenge and this process is restarted again.The application hereinafter is called said process " master password setup procedure ".
In master password setup procedure, one embodiment of the present of invention request user provides some extra identification informations.This information be meant to the user be know but other people and ignorant information, as mother's user birth name, mother's user date of birth, or other personal information.
Fig. 1 shows that at screen setup procedure the request user imports the diagram of the embodiment that the local system of the master password that identification information and user select realizes.In this embodiment, the user is invited the drop-down menu (not showing) that uses alphabet, special character and a digital 0-9, or some other similar methods, forms the input to individual subscriber identification information screen.One particular embodiment of the present invention need identification information, and this identification information hereinafter will be called " master password identification information " in the application.In Fig. 1, the embodiment request user that the setting up procedure display screen is represented imports user's name (10), user's middle name (20), user's surname (30), user's date of birth, use form (40) month in and month out/everyday/every year, mother's user birth name (50), mother's user date of birth, use form (60) month in and month out/everyday/every year.The setting up procedure display screen that is showed provides subscriber unit sequence number (70).In one embodiment, this sequence number is encrypted by a hash function.The user also is requested to import a selected master password (80).
In one embodiment of the invention, master password setup procedure indication customer contact central administrator provides definite user totem information 280.This further identification information can be a credit number, maybe can be same with master password identification information, maybe can comprise some identification information except that master password identification information.This further identification information hereinafter is called " counter-identification information " (counter-identification information) in the application.
In one embodiment of the invention, the master password setup procedure request comes from central administrator's the affirmation that counter-identification information has been provided.In this embodiment, local system uses identical hash function to calculate an affirmation key separately with center management system separately.Central managing computer system (or another kind of the selection, the manual process of carrying out by the central administrator) and local system the hash function of execution that all programs to TV " known " information, for example, date, what day, the on-site postcode of televisor, wired or other program service related with televisor, the sequence number of televisor, or the like.In another optional embodiment, hash function can be programmed, and merges the part as the calculating of Hash key, offers the part of local system and central administrator's information as identification information by the user.
The central administrator uses center management system to calculate suitable affirmation key.Local system calculates the corresponding key 290 of confirming.The affirmation key that the user is instructed to the central administrator is provided is then imported local system 235a and 235b.The key 310 that local system will relatively be imported key and be calculated by local system.If two key match, local system allows the user to continue master password setup procedure 320 so.
B. master password change procedure
The system of most password protections allows user's change again after password is set.Typically, password change process request user discerned current password before enter new password; In case new password is transfused to, password change process request user confirms this new password by enter new password once more.Such password change process also is included in " master password setup procedure " as a reference.
C. password protection and master password recover
Each time after having finished master password setup procedure, as long as the user attempts to visit local system, or in certain embodiments, as long as the user attempt access system protected fixed zone, local system prompting user provides master password.If the user can not provide master password, system will not allow the secure screen of user by system.
In this, the invention provides the safe handling that the user can visit local system.Specifically, the invention provides a master password rejuvenation.Fig. 3 is the diagram that demonstrates the embodiment that local system that master password recovers indicator panel realizes on a screen.Fig. 4 is the process flow diagram of an embodiment realizing of the local system of master password rejuvenation.In an optional embodiment, the user will or get in touch manufacturer with reference to user manual, the retailer comes to determine contact details for center management system.
If this information is required that in master password setup procedure the local system safe processor will require the user that master password identification information is provided.The screen of request mark information looks like and screen is set, an embodiment described in Fig. 1.
In case requested information has been transfused to, security system will show that a screen indicates the user capture central administrator.Hereinafter this screen is called " instruction screen ".As what Fig. 3 saw, instruction screen will tell how the user gets in touch central administrator (100), as pull out a specific telephone number, such as a 1-900 number, 1-800 number, or visit a specific website.Instruction screen is discerned specific local system unit with display message, as specific local system unit sequence number (110,405-410).In one embodiment, instruction screen also show a character string (120,420-430).In one embodiment, character string display is encrypted, and is included in some other things, the master password that passes out of mind, and, if required by local system, master password identification information.
In case customer contact the central administrator, the central administrator will be read in definite information from instruction screen request user.As: device unit identification information (110), as the sequence number of specific local system unit; And/or other are presented at the information on the subscriber's local system screen, as an encrypted characters string (120).In one embodiment, the central administrator will further ask the user that the counter-identification information that before offers the central administrator in master password setup procedure is provided.
The central administrator will use customer-furnished information to offer user or user's master password then, or the key of a release custom system (this depends on embodiment), disclose the master password that passes out of mind or select a new master password.Central administrator's function can manually be carried out, and perhaps is chosen in programming realization in the central managing computer system.
Depend on present embodiment, the central administrator may need decrypts information that the user is provided.For the decrypts information that the user is provided, the central administrator can use a manual procedure or input information in the central managing computer system of process that is composed of decrypted user and provides information.Depend on this embodiment, the central administrator will contrast counter-identification information then and detect the master password identification information of having deciphered.This comparison procedure can be the manual process of being carried out by the central administrator, is perhaps carried out by the central managing computer system.
In one embodiment, the user reads to comprise an encrypted characters string of encrypting master password to one of central administrator, in case the central administrator determines that identification information is intact, the central administrator will decipher this character string and discern the password that passes out of mind.In one embodiment of the invention, the central administrator will indicate one of user's Request System system-computed to confirm key then.In order to accomplish this, the user will select a screen items to calculate the affirmation key.In one embodiment, local system will automatically calculate 440 and 490 1 affirmation keys (130) and/or a contrary affirmation key (140).Safety information system will show a screen, and one of announcement affirmation key is calculated (seeing Fig. 3,130).The central administrator will calculate one then and confirm key, and indication user input validation key.The user will use a drop-down menu (not showing) then, or other similar methods, import this and confirm key.Confirm key in case the user has imported this, local system will detect this two keys.If the affirmation key of this key and local system is complementary, system will show on screen that a contrary affirmation key (140 and 500) and indication user read this contrary affirmation key and give the central administrator.In one embodiment, after certain time limit, it is expired that local system will be set master password, as one day, 48 hours, a week, one month or after access times necessarily, as by the local system user capture after 1,2 or 3 time.
The central administrator will tell the password that the user passes out of mind then.
In an optional embodiment of the present invention, as mentioned above, the central administrator will calculate one and confirm key, and the indication user is confirming in the key input local system.The user will use a drop-down menu (not having to show) or other similar methods to import this affirmation key then.In case the user has imported the affirmation key, local system will use the affirmation key that calculates a local system with the central administrator with the identical hash function of crossing.Local system will detect this two keys then.If the affirmation key match of this key and local system, system will be on screen the master password (similar with 500) of explicit user to 140.
In another optional embodiment of the present invention, as mentioned above, the central administrator will use such as a Hash formula that is used for the release custom system calculates a key.The central administrator will indicate the user to import this Personal Unlocking Key then.The user will import this Personal Unlocking Key with a drop-down menu (not having to show) or other similar methods.In case the user has imported this Personal Unlocking Key, as mentioned above, local system will use such as a Hash formula calculates a key.The identical Hash formula that local system application and central administrator and/or central managing computer system used.For two key match, local system must adopt and the applied identical information of the Hash formula of center management system.If this Personal Unlocking Key and local system key match, local system will be on screen the master password (similar with 500) of explicit user to 140.In an optional embodiment, under the situation of key match, local system will ask the user to determine a new master password at once.
D. in a V-CHIP PLUS+IN-GUIDE USER INTERFACE, the illustrative embodiment that master password recovers
As an illustrative embodiment of the present invention, carry out master password setup procedure mentioned above and master password rejuvenation with following mode, allow head of a family's release and recover this head of a family's master password, this master password is being arranged an Electronic Program Guides system that is furnished with head of a family's control, as the GuidePlus+99 that V-Chip Plus+In-Guide user interface is housed of Gemstar.
The head of a family/user has bought one and has been furnished with the televisor of controlling the electronic programme guide system as the head of a family of the Guide Plus+99 that V-Chip Plus+In-Guide user interface is housed of Gemstar.The head of a family powers up televisor for the first time, and when system was opened, being prompted will be by an initialization setting up procedure that has comprised master password setup procedure.As the part of master password setup procedure, user/head of a family has determined a master password.
Afterwards, if user/head of a family has forgotten master password, user/head of a family selects a security system option, and this option demonstrates a screen (" instruction screen ") on tv display screen, and indication user/head of a family is by a 1-900 telephone number contact central administrator.Central administrator in this embodiment is a full automatic computer telephony interface system.
In an optional embodiment, user/head of a family determines the contact details of center management system with reference to a user manual or contact manufacturer or retailer.
Central administrator's one-way Hash function will be carried out current date, calculate a Personal Unlocking Key.As selection, the central administrator can be asked the user that the sequence number of televisor is provided in case quilt has got in touch, and also might be the information of some other types, and this front in the application is already mentioned.User/head of a family will be instructed to import some requested information with user/head of a family's phone switch.Other requested information types may be " known " information of those televisors, as, the on-site postcode of televisor, cable service or other program service that links to each other with TV, or the like.
The central managing computer system will use an one-way Hash function to calculate a Personal Unlocking Key then.This Personal Unlocking Key to user/head of a family will be read by the central managing computer system, and indication user/head of a family imports the V-Chip Plus+In-Guide user interface system of Personal Unlocking Key to user/head of a family's local TV.
User/head of a family has imported this Personal Unlocking Key in local system after, local system will use the identical one-way Hash function of using with the central managing computer system, calculate a Personal Unlocking Key.Local system will compare this two keys then.
If these two key match, the V-Chip Plus+In-Guide user interface system of local TV will show indication on television display screen, and indication user/head of a family selects a new master password at once.User/head of a family must use key suitable on the remote control equipment to determine a new master password then.In case user/head of a family has determined a new master password, local system replaces old master password with new master password in the security of system file, and allows user/head of a family to continue to visit the local system function.
As an optional feature, custom system is display reminding on television display screen, has been modified in order to prompting user master password.Prompting can be shown with an information screen, insertion, covering, rolling message or other other prompting forms.One section specific access times, or in one section specific fate, when the user turned on TV at every turn, prompting all can be revealed.
Illustrative embodiment
What described here embodiments of the invention were only considered is first-selected, and/or the illustration of notion of the present invention; Scope of the present invention is not limited to these embodiment.Those skilled in the art it is contemplated that out diversified other equipment under the situation that does not break away from the spirit and scope of the present invention.For example, the present invention can realize that this cover center management system can be discerned information or the identification user's voice of user from the telephone key input by adopting the full automatic center management system of a cover.Select as another kind, the present invention also can adopt the partially or completely manual central administration contact of a cover to realize.

Claims (4)

1. method of reseting password on a consumer device comprises:
By a particular consumer equipment, show one or multinomial information of this particular consumer equipment appointment;
Send this or multinomial information to a central place;
In this central authorities place this or multinomial information and executing mathematical function are obtained a central key (central key);
Import this central key in this consumer device;
In this consumer device, obtain a local key at this or mathematical function of multinomial information and executing;
If central key is for predetermined and do not have original password and the local key of input to match, a password is reseted in permission on consumer device;
2. claim 1 method, wherein mathematical function is an one-way Hash function
3. claim 1 method, wherein one of this particular consumer equipment appointment or multinomial information are exclusive for this particular consumer equipment.
4. claim 1 method, wherein one of this particular consumer equipment appointment or multinomial information are rare, but are not exclusive.
CN 99812581 1998-09-17 1999-09-17 Apparatus and methods for unlocking password protected software systems to recover master password Pending CN1359487A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10075398P 1998-09-17 1998-09-17
US60/100,753 1998-09-17

Publications (1)

Publication Number Publication Date
CN1359487A true CN1359487A (en) 2002-07-17

Family

ID=22281360

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 99812581 Pending CN1359487A (en) 1998-09-17 1999-09-17 Apparatus and methods for unlocking password protected software systems to recover master password

Country Status (6)

Country Link
EP (1) EP1121632A1 (en)
JP (1) JP2002525706A (en)
CN (1) CN1359487A (en)
AU (1) AU6151499A (en)
CA (1) CA2344448A1 (en)
WO (1) WO2000016190A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1777096B (en) * 2004-11-17 2010-09-29 微软公司 Password protection method and device
CN101345622B (en) * 2007-07-10 2012-07-25 北京紫贝龙科技有限责任公司 Information safety device capable of defining authority of apparatus holder
CN102687492A (en) * 2009-12-28 2012-09-19 诺基亚公司 Method and apparatus for user interaction while device is locked
CN103310136A (en) * 2012-03-15 2013-09-18 苏州宝时得电动工具有限公司 Automatic walking system and set thereof

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7191466B1 (en) 2000-07-25 2007-03-13 Laurence Hamid Flexible system and method of user authentication for password based system
WO2003062968A1 (en) * 2002-01-24 2003-07-31 Activcard Ireland, Limited Flexible method of user authentication for password based system
WO2004021114A2 (en) 2002-08-27 2004-03-11 Td Security, Inc., Dba Trust Digital, Llc Enterprise-wide security system for computer devices
US20040103325A1 (en) * 2002-11-27 2004-05-27 Priebatsch Mark Herbert Authenticated remote PIN unblock
US6934535B2 (en) * 2002-12-02 2005-08-23 Nokia Corporation Privacy protection in a server
WO2005064498A1 (en) * 2003-12-23 2005-07-14 Trust Digital, Llc System and method for enforcing a security policy on mobile devices using dynamically generated security profiles
US7631082B2 (en) * 2005-06-10 2009-12-08 Microsoft Corporation Transparent resource administration using a read-only domain controller
CN1913431A (en) * 2006-08-24 2007-02-14 华为技术有限公司 Method and system of user password for managing network equipment and password management server
US8259568B2 (en) 2006-10-23 2012-09-04 Mcafee, Inc. System and method for controlling mobile device access to a network
US8935384B2 (en) 2010-05-06 2015-01-13 Mcafee Inc. Distributed data revocation using data commands

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4802217A (en) * 1985-06-07 1989-01-31 Siemens Corporate Research & Support, Inc. Method and apparatus for securing access to a computer facility
US4786900A (en) * 1985-09-30 1988-11-22 Casio Computer Co. Ltd. Electronic key apparatus
GB2295712B (en) * 1994-12-03 1998-06-17 Icl Systems Ab Theft protection for electrically-powered articles
US5666415A (en) * 1995-07-28 1997-09-09 Digital Equipment Corporation Method and apparatus for cryptographic authentication
US5832214A (en) * 1995-10-26 1998-11-03 Elonex I.P, Holdings, Ltd. Method and apparatus for data security for a computer
US5892906A (en) * 1996-07-19 1999-04-06 Chou; Wayne W. Apparatus and method for preventing theft of computer devices
US5944824A (en) * 1997-04-30 1999-08-31 Mci Communications Corporation System and method for single sign-on to a plurality of network elements

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1777096B (en) * 2004-11-17 2010-09-29 微软公司 Password protection method and device
CN101345622B (en) * 2007-07-10 2012-07-25 北京紫贝龙科技有限责任公司 Information safety device capable of defining authority of apparatus holder
CN102687492A (en) * 2009-12-28 2012-09-19 诺基亚公司 Method and apparatus for user interaction while device is locked
US8718606B2 (en) 2009-12-28 2014-05-06 Nokia Corporation Method and apparatus for user interaction while device is locked
CN102687492B (en) * 2009-12-28 2016-02-10 诺基亚技术有限公司 When the device is locked for the method and apparatus of user interactions
CN103310136A (en) * 2012-03-15 2013-09-18 苏州宝时得电动工具有限公司 Automatic walking system and set thereof

Also Published As

Publication number Publication date
CA2344448A1 (en) 2000-03-23
EP1121632A1 (en) 2001-08-08
WO2000016190A9 (en) 2000-06-08
AU6151499A (en) 2000-04-03
WO2000016190A1 (en) 2000-03-23
JP2002525706A (en) 2002-08-13

Similar Documents

Publication Publication Date Title
US9516037B2 (en) Decoding of encrypted file
CN1359487A (en) Apparatus and methods for unlocking password protected software systems to recover master password
JP4878617B2 (en) Method and apparatus for tracking resource status in a system for managing resource usage
JP5727008B2 (en) Operating system unlocking method and mobile phone
CA2649015C (en) Graphical image authentication and security system
EP1540869B1 (en) System and method for user authentication with enhanced passwords
AU2005283167B2 (en) Method and apparatus for authentication of users and communications received from computer systems
US20060149970A1 (en) Authentication method and device
US20050177750A1 (en) System and method for authentication of users and communications received from computer systems
US7007173B2 (en) Content distribution system, copyright protection system and content receiving terminal
US20060215360A1 (en) Password input and verification method
WO2007037703A1 (en) Human factors authentication
EP2990959B1 (en) Terminal and method for hiding and protecting data information
CN1834977A (en) Authentication protection method based on USB device
CN101207483A (en) Bidirectional double factor authentication method
JP2005115485A (en) Authentication system and computer readable storage medium
CN1095112C (en) Security cipher confirming keyboard and method thereof
TW200837596A (en) A method for verifying authorized access
CN116541821A (en) Verification code verification method based on scene
CN118155318A (en) Unlocking method and intelligent access control system

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication