TW201011587A - Computer tied-in system and its method - Google Patents

Computer tied-in system and its method Download PDF

Info

Publication number
TW201011587A
TW201011587A TW97133752A TW97133752A TW201011587A TW 201011587 A TW201011587 A TW 201011587A TW 97133752 A TW97133752 A TW 97133752A TW 97133752 A TW97133752 A TW 97133752A TW 201011587 A TW201011587 A TW 201011587A
Authority
TW
Taiwan
Prior art keywords
computer
binding
sub
main
bind
Prior art date
Application number
TW97133752A
Other languages
Chinese (zh)
Other versions
TWI403918B (en
Inventor
An Xie
Original Assignee
Wayi Internat Digital Entertainment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wayi Internat Digital Entertainment Co Ltd filed Critical Wayi Internat Digital Entertainment Co Ltd
Priority to TW97133752A priority Critical patent/TW201011587A/en
Publication of TW201011587A publication Critical patent/TW201011587A/en
Application granted granted Critical
Publication of TWI403918B publication Critical patent/TWI403918B/zh

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A computer tied-in system and its method are disclosed. The major tied-in computer at the customer end is coupled to the server computer through the network. After logging-in membership account is successfully registered, computer tie-in set up is applied at an account managing web-page A plurality of sub tied-in computers at the customer end obtain the verification code through application of the major tied-in computer, and the sub tied-in computers re-login the accounts so that the server computer records and ties in these computers, and the server computer only provides applications and services for the major tied-in computer and those sub tied-in computers verified through the major tied-in computer. Under the situations where hardware costs are not increased and usage inconvenience for the user will not arise, the security in the usage of the network by the user can be enhanced.

Description

201011587 九、發明說明: 【發明所屬之技術領域】 一本發.及-觀腦綁定之系統及其方法,侧是關於帳號 就只能於綁定的電腦上開啟,其他電腦無法登入此帳號的系統及 八方法將可以達到防i的效果,大幅降^^帳號被盜取㈣的機 Φ 【先前技術】 近來由於各種網路應用的發展及其快速,網路相關應用的硬 體與軟體無不蓬勃發展,各種技術的·減少低人們應用成 本同時也增加了跨區域通訊應用的機會,也提升網路遊戲的熱 潮。 …、 -般網路應时有-身份欄位及一密碼樹立,藉此要求輸入 使用者身份(ID)與使时密姻贿行身份及密碼之#料認證, 待確認資料無誤’舰—步執油關_雜式或其他介面應用。 % 網路應用的多元應用,使用者也發現可能發生的帳號安全事 件’以及遇到盜帳之後所衍生的—些問題。現行骇客程式破解方 式概可分為二種方式:第-種破解密碼的方式係在使用者輸入密 馬的同時,利用一侧錄軟體對正在輸入的字元進行侧錄,以同步 竊取得該密碼攔位内的字元。第二種破解密碼的方式係在使用者 輪入密碼之後,利用一窺視軟體對該密碼攔位進行窺視,該窺視 軟體能夠經由與該密碼相連結之密碼暫存單元,以便在事後竊取 得知該密碼。以上二種駭客程式破解密碼的方式皆可輕易破解現 有的密碼系統,因此,有必要進一步改良現行的密碼輸入系統的 5 201011587 安全保護方法。 因此 加外B ^晴應用供脑發展了多項技術,包括軟體或外 ^ m 的方式,協助使用者防堵帳號被盜用等問題。由於 =邱3何安全機制能夠完全防範帳號遭竊,而在帳號安全機 ΜA^可有效果的加強,使用者小心謹慎,勿使用任何外掛 私式為取重要防範措施。 1讀’不管現有的軟體或硬體都只是加财被盜用的風 " 些裝置卻也增加了使用上的成本,無形中也造成了使用 ❿上的不便’無法解錄號實際已被錄關題。所以,使用者在 使用=應用上,最擔心帳號的安全,也渴望有好的防盜機制, 希望能提供更有保障的網路應用環境。 【發明内容】 θ於是,為解決上述之缺失,避免缺失存在,本發明之目的係 在提供-種電腦綁定之系統及其方法,其係利用一主鄉定電腦來 限定申請子綁定電腦,使不在綁定_電腦,就算雜號與密石馬 φ 也無法登入該相關的網路應用。 、 、為達上述之目的,本發明提出一種電腦綁定之系統及其方 法,其包括:註冊步驟:由一客戶端之主綁定電腦由網路耦接 ^一伺服,電腦登入會員帳號註冊。綁定申請:由該主綁定電 腦登入會員帳號註冊成功後,再到帳號管理頁面,點選「申請 電腦綁定」’申請設定電腦綁定。申請子綁定電腦:透過主^ 定電腦的申請取得驗證碼,可對複數台客戶端之子綁定電腦申 請綁定,再由該些子綁定電腦重新登入帳號,以便該伺服器電 腦記錄綁定該些電腦,使該伺服器電腦只對該主綁定電腦與1 201011587 過該主綁定電腦認定之該些子綁定電腦進行網路應用與 其中’該伺服ϋ電腦係透過該主綁定電腦與該些子 的啡MAC地址進行電腦綁定。又該些子鄉定電腦的數量由^ 伺服器電腦設定限定,且触綁定電腦可同時#該子綁定電腦 用。 其中,當該使用者要解除電腦綁定,必需透過該主绑 腦連接到該概ϋ電腦進行綁定移除。且电 ❹ ❿ 綁定電腦的話,必需透過該主鄉定電腦連接到該:= 行將需要變更峡的子綁定電腦重新提出敏中請,再 些子綁定電腦重新登入帳號,完成綁定作業。 ^ 本發明的優點在於’在不增加硬體的使用成本,且不會造成 了使用上的不便’且使用者在使闕路應用上,也利擔心帳號 的安全’就算親實際已被盜取,盜取者也無法登人,提供更有 保障的網路應用環境。又,_—主綁定電腦來限定申請子鄉定 電腦,使不在綁定内的電腦,就算有㈣與密碼也無法登入該相 關的網路顧。所以在助上,可赠主綁定電腦不實施該帳號 的網路應帛’ P、使職些子蚊電臟行_義路應用,更可 以增加使社的安全性;且複數台子綁定電腦财請加入,使得 在綁定的安全設定下,往返公司與家裡時,可有多台子電腦加入 綁定,讓使用者在使用上更為簡便。 【實施方式】 而 茲有關本發明之詳細内容及技術說明,現以實施例來作進 一步說明,但應瞭解的是,該等實施例僅為例示說明之用, 不應被解釋為本發明實施之限制。 7 201011587 請參閱圖1、2所示,本發明實施例之電腦綁定之方法流 程圖及其系統示意圖,該電腦綁定方法包括以下步驟: 註冊步驟:一客戶端之主綁定電腦11由網路耦接至一伺 服器電腦10登入會員帳號註冊。 綁定申請:由該主綁定電腦10登入會員帳號註冊成功 後,再到帳號管理頁面,點選「申請電腦綁定」,申請設定電 腦綁定。每申請一次電腦綁定,就需立即離開網路應用重新登 入’伺服器電腦10的系統才能準確記錄綁定的電腦。綁定電 參腦的判斷標準係以申請後,第一個登入該帳號的電腦為主綁定 電腦11。 申請子綁定電腦20 :複數台客戶端之子綁定電腦2〇的綁 定係透過主綁定電腦11的申請取得驗證碼,與申請第一台的 //IL程相同,均需在網頁提出申請後,再到該些子綁定電腦2〇 重新登入帳號,以便該伺服器電腦10記錄綁定該些電腦,使 二祠服器龟細10只對該主綁定電腦丨〗與透過該主綁定電腦認 定之該些子綁定電腦20進行網路應用與服務。其他電腦3〇因為 ❹尚未由α主綁定電腦n的申請綁定,就算有帳號也不可登入該 伺服器電腦10進行相關的網路應用與服務。 用者在網頁提電腦用。例如, 綁定”。若玩家都是申請二 201011587 綁定第-台電腦,而非綁定三台電腦。 連接==解除電腦綁定’必需透過該主綁定電腦11 連接到糾服4腦1G進行綁定移除。且,當 :綁定電腦的話’必需透過該主綁定電腦η連接』 ,1〇進行將需要變更綁定的子峡電腦2G重新提出鄉定; 請,再=該些子綁定電腦2〇重新登入帳號,完成鄉出定^申 —右玩家要解除電腦綁定,必需把有鄉定的電腦全都移 ❹ 若,任-電腦是、喊狀態,其他電腦就無法登入該帳 號。2.玩家要重新綁定電腦的話,只需在要 z、 新提出申請即可。例如玩家已綁定A、B、c三台^電^重 B電腦是中請「第二台電腦」綁定,玩家只需在㈣的第= ,選項,重新提出峡申請,並在D電腦重新登入^: 心的遊戲帳號就會綁定在A、C、D三台電腦上。 使不t㈣主綁疋電腦U來限定申請子綁定電腦20, 、·(内的電腦’就算祕號與密碼也無 的網路朗。所財制上,仙者可崎主峡_ = 2趙號的網路應用,只使用該些子綁定電腦2 =的申請加入,在鄉定的安全設定下’可有== 蚊,躲往返公司與家㈣制者,可針對需 要使用地方的電腦進行綁定。 it定述者’僅為本發明之較佳實施例而已,當不能以此 限疋本發明減之觀,即大凡依本發明申請專概圍及發明★兒 明内容所作之簡單的等效變化與修飾,皆仍屬本發 ^ 9 201011587 範圍内。 【圖式簡單說明】 圖1係本發明實施例之電腦綁定之方法流程圖。 圖2為本發明實施例之電腦綁定之系統示意圖。 【主要元件符號說明】 伺服器電腦10 φ 客戶端之主綁定電腦11 子綁定電腦20 其他電腦30201011587 IX. Description of the invention: [Technical field of invention] A system and method for binding the brain and the brain, the side is that the account can only be opened on the bound computer, and other computers cannot log in to the account. The system and the eight methods will be able to achieve the effect of preventing i, greatly reducing the number of machines that are stolen (4). [Prior Art] Recently, due to the development of various network applications and their rapid, hardware and software for network-related applications All of them are booming, and the reduction of people's application costs by various technologies has also increased the opportunities for cross-regional communication applications and the upsurge of online games. ..., - the general network should have - identity field and a password to establish, in order to enter the user identity (ID) and the time to bribe the identity and password of the material authentication, to confirm the information is correct 'ship - Step by step oil _ miscellaneous or other interface applications. % The multi-application of web applications, users also found possible account security incidents and problems arising after theft. The current hacking method can be divided into two ways: the first way to crack the password is to use the side recording software to side-record the characters being input while the user enters the secret horse. The character within the password block. The second method of cracking the password is to peep the password interception by using a peeping software after the user turns in the password, and the peeping software can pass the password temporary storage unit connected with the password, so as to obtain the knowledge after theft. The password. The above two hacking methods can easily crack the existing cryptosystem by means of cracking the password. Therefore, it is necessary to further improve the current 201010587 security protection method of the password input system. Therefore, the application of the external B ^ Qing for brain development of a number of technologies, including software or external ^ m, to help users prevent theft of accounts and other issues. Since the security mechanism of Qiu 3 can completely prevent the account from being stolen, and the account security machine ΜA^ can be effectively enhanced, the user should be cautious and do not use any external private mode as an important preventive measure. 1 read 'regardless of the existing software or hardware is just the wind that has been stolen.' These devices have also increased the cost of use, which inevitably caused the inconvenience of using the '. The unsolvable number has actually been recorded. Key questions. Therefore, the user is most worried about the security of the account when using the application, and is also eager to have a good anti-theft mechanism, hoping to provide a more secure network application environment. SUMMARY OF THE INVENTION Therefore, in order to solve the above-mentioned shortcomings and avoid the absence of the existence, the object of the present invention is to provide a computer-bound system and method thereof, which utilizes a main rural computer to limit the application of the binding computer. So that it is not in the binding _ computer, even if the code and the pebbles φ can not log into the relevant network application. For the above purposes, the present invention provides a computer binding system and method thereof, including: registration step: a client binding computer is coupled by a network to a servo, and the computer login member account is registered. . Binding application: After the primary binding computer login member account is successfully registered, go to the account management page and click “Apply for computer binding” to apply for setting the computer binding. Apply the sub-binding computer: obtain the verification code through the application of the main computer, and apply for binding to the sub-binding computer of the plurality of clients, and then re-login the account by the sub-bind computers, so that the server computer records the binding. Set the computers so that the server computer only binds the main binding computer to the sub-binding computer identified by the main binding computer for the network application and the 'the servo ϋ computer system is tied through the main The computer is bound to the computer's MAC address for the computer. In addition, the number of these computers is limited by the setting of the server computer, and the binding computer can be used at the same time. Wherein, when the user wants to release the computer binding, the primary binding brain must be connected to the general computer for binding removal. And if you bind your computer, you must connect to the computer through the hometown computer: = You will need to change the sub-binding computer of the gorge to re-propose the zhongzhong, then bind the computer to re-login the account and complete the binding. operation. ^ The advantage of the present invention is that 'the cost of using the hardware is not increased, and the inconvenience of use is not caused, and the user is worried about the security of the account in the application of the road. Even if the pro has actually been stolen The pirates are also unable to board people and provide a more secure network application environment. In addition, _-the main binding computer to limit the application of the computer, so that the computer is not in the binding, even if there are (four) and password can not log in to the relevant network. Therefore, in the help, you can donate the network that the main computer does not implement the account should be 'P, make some of the mosquitoes and dirty lines _ Yilu application, can increase the security of the agency; and the multiple tables are bound Computer money is added, so that under the security settings of the binding, when you go to and from the company and home, you can have multiple sub-computers to join the binding, making it easier for users to use. DETAILED DESCRIPTION OF THE INVENTION The detailed description and technical description of the present invention will be further described by the embodiments of the present invention, but it should be understood that these embodiments are for illustrative purposes only and should not be construed as The limit. 7 201011587 Please refer to FIG. 1 and FIG. 2 , a flow chart of a method for binding a computer and a system diagram thereof according to an embodiment of the present invention. The computer binding method includes the following steps: a registration step: a client binding computer 11 The network is coupled to a server computer 10 to log in to the member account to register. Binding application: After the main binding computer 10 logs in to the member account, after registering successfully, go to the account management page and click “Apply for computer binding” to apply for setting up computer binding. Each time you apply for a computer binding, you need to leave the web application and re-enter the system of the server computer 10 to accurately record the bound computer. After the application is made, the first computer that logs in to the account is bound to the computer 11. The application binding computer 20: the binding of the plurality of clients to the computer 2〇 is obtained through the application of the main binding computer 11 to obtain the verification code, which is the same as the //IL procedure of the first application, and needs to be presented on the webpage. After the application, go to the sub-bind computer 2〇 and re-login the account, so that the server computer 10 records the binding of the computers, so that the two servers are finely bound to the main binding computer 丨The main binding computer recognizes the sub-binding computers 20 for network applications and services. Other computers 3 〇 Because ❹ has not been bound by the application of the α main binding computer n, even if there is an account, the server computer 10 cannot be logged into the relevant network application and service. The user uses the computer on the web page. For example, Binding". If the player is applying for the second 201011587 binding the first computer, instead of binding the three computers. Connection == Unlock the computer binding 'must connect to the computer 4 through the main binding computer 11 1G is bound and removed. And, when: the computer is bound, it must be connected through the main binding computer η, and the sub-xia computer 2G that needs to change the binding is re-raised; please, then These sub-bind computers 2 〇 re-login to the account, complete the township to set up ^ Shen - the right player to unlock the computer, you must move all the computers that have a hometown, if you are - the computer is, shouting state, other computers can not Log in to the account. 2. Players need to re-bind the computer, just need to apply for z, new application. For example, the player has bound A, B, c three ^ ^ ^ ^ B computer is the second The computer is bound, the player only needs to re-apply the gorge application in the (4), option, and re-login in the D computer. ^: The heart game account will be bound to the three computers A, C, and D. Let the t (four) main kidnapper computer U to limit the application to bind the computer 20, , (the computer inside is not the network number of the secret number and password. In the financial system, the fairy can be the main gorge _ = 2 Zhao's network application only uses these sub-binding computers 2 = application to join, under the security settings of the township, there may be == mosquitoes, hiding from the company and home (four) system, can be used for the place where you need to use The computer is bound. The presenter is only a preferred embodiment of the present invention, and it is not limited to the present invention, that is, the application of the invention is based on the invention and the content of the invention. The simple equivalent changes and modifications are still within the scope of the present invention. [Simplified Schematic] FIG. 1 is a flowchart of a method for binding a computer according to an embodiment of the present invention. FIG. 2 is a computer according to an embodiment of the present invention. Schematic diagram of the binding system. [Key component symbol description] Server computer 10 φ Client's main binding computer 11 Sub-bind computer 20 Other computer 30

Claims (1)

201011587 十、申請專利範圍 1. 一種電腦綁定之系統,其包括: 客戶端之主綁定電腦; :伺服器電腦,經由網_接至上述的客戶端之主鄉 功德i 用者由該主綁定電腦登人會s帳號註冊成 力後,再到帳號管理頁面,點選「申請電 抓 定電腦綁定;以及 疋」甲明3又 ❸ 複數台各戶端之子綁定電腦,透過主 再由該些子綁定電腦重新登入 綁己錄綁定該些電腦,使該伺服11電腦只對該主 '、’疋%月甸與透過該主綁定電 ^^ 網路應用與服務。 子綁又電腦進行 2· 利範圍第1項所述之電腦綁定之系統,其中談碰 : '恥係透過該主綁定電腦與該 地址進行_綁定。 &錢的網卡MAC 綁定所述之電腦綁定之系統,其中該些子 《如二數!由該伺服器電腦設定。 申§月專利酬第i項所述之 s. 可同時當該子綁定電_。 射該主鄉 用者要電卿定之n其中當該使 6服器電腦進行綁定移除。、而透過該主綁定電腦連接至刚 •::心::===,當該 尚透過該主綁定電腦連接 201011587201011587 X. Patent application scope 1. A computer-bound system, which includes: a client-bound computer of the client; a server computer, connected to the client of the above-mentioned client via the network _ After binding the computer to board the person's account registration, then go to the account management page, click "Apply for the computer to fix the computer binding; and 疋" A Ming 3 and ❸ ❸ 各 各 各 各 绑定 绑定 绑定Then, the sub-binding computers re-login to bind the computers to bind the computers, so that the servo 11 computer only binds the main ', '疋% Yuedian and the network application and service through the main. Sub-tied and computerized 2· The computer-bound system described in item 1 of the scope of interest, in which the touch: 'Shame is _bound through the main binding computer and the address. & money NIC MAC binding the computer-bound system described, where the "like the second! Set by the server computer. The s. described in item i of the § monthly patent remuneration can be simultaneously _. Shooting the hometown, the user must be electro-cleared, which should be used to bind the 6 server computer. And through the main binding computer connected to just •:: heart::===, when the still connected through the main binding computer 201011587 到該伺服器電腦進行將需要變更綁定的子綁定電腦重新提 出綁定申請,再由要該些子綁定電腦重新登入帳號,完成 綁定作業。 —種電腦綁定之方法,其包括下列步驟: 註冊步驟:一客戶端之主綁定電腦由網路耦接至一伺 服器電腦登入會員帳號註冊; ^綁疋申凊.由该主綁定電腦登入會員帳號註冊成功 後,再到帳號管理頁面,點選「申請電腦綁定」,申請設定 電腦綁定;以及 申請子綁定電腦:透過主綁定電腦的申請取得驗證 ^再由°亥些子綁定電腦重新登入帳號,以便該伺服器電 ^錄=定雜電腦,使鋪服器電腦只對該主綁定電腦 與服S亥主鄉疋電腦認定之該些子綁定電腦進行網路應用 8· 圍第7項所述之電腦綁定之方法,其中子綁定 月的數1由該伺服器電腦設定。 9‘ 圍第7項所述之電腦綁定之方法,其中該主綁 上可同吩畲該子綁定電腦用。 第7項所述之電腦綁定之綠,其中當該使 服器電腦鄉定,必需透過該主鄉定電腦連接到該伺 細進仃綁定移除。 第7項所述之電腦綁定之方法’其中當該使用 器電腦進^腦的話’必需透過該主綁定電腦連接到該飼服 订將需要變更綁定的子綁定電腦簡提出綁定申 12 201011587 " 請,再由要該些子綁定電腦重新登入帳號,完成綁定作業。 ❹Go to the server computer to re-submit the binding application to the sub-binding computer that needs to change the binding, and then re-login the account to the sub-bind computer to complete the binding operation. A computer binding method, comprising the following steps: Registration step: a client-side binding computer is coupled by a network to a server computer to log in to a member account to register; ^Bundle Shen Shen. The master binding After the computer login member account is successfully registered, go to the account management page, click "Apply for computer binding", apply for setting the computer binding; and apply for the sub-bind computer: obtain the verification through the application of the main binding computer ^ These sub-bind computers re-login the account, so that the server can record the computer, so that the shopper computer only performs the sub-bind computer that the main binding computer and the service Shai main home computer recognize. Network application 8 The method of computer binding according to item 7, wherein the number of sub-binding months is set by the server computer. 9' The method of computer binding as described in item 7, wherein the main binding can be used to bind the child to the computer. The computer-bound green described in item 7, wherein when the server computer is set up, it is necessary to connect to the server through the host computer to remove the binding. The method of computer binding described in item 7, wherein when the user computer enters the brain, it is necessary to connect to the feed binding through the main binding computer, and the sub-binding computer that needs to change the binding is bound. Shen 12 201011587 " Please, then re-login the account by the sub-bind computer to complete the binding operation. ❹ 1313
TW97133752A 2008-09-03 2008-09-03 Computer tied-in system and its method TW201011587A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97133752A TW201011587A (en) 2008-09-03 2008-09-03 Computer tied-in system and its method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97133752A TW201011587A (en) 2008-09-03 2008-09-03 Computer tied-in system and its method

Publications (2)

Publication Number Publication Date
TW201011587A true TW201011587A (en) 2010-03-16
TWI403918B TWI403918B (en) 2013-08-01

Family

ID=44828678

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97133752A TW201011587A (en) 2008-09-03 2008-09-03 Computer tied-in system and its method

Country Status (1)

Country Link
TW (1) TW201011587A (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1472850B1 (en) * 2002-01-29 2017-05-03 Koninklijke Philips N.V. A method and system for connecting mobile client devices to the internet
US20060294383A1 (en) * 2005-06-28 2006-12-28 Paula Austel Secure data communications in web services
US7913084B2 (en) * 2006-05-26 2011-03-22 Microsoft Corporation Policy driven, credential delegation for single sign on and secure access to network resources
JP5189104B2 (en) * 2006-10-31 2013-04-24 テレフオンアクチーボラゲット エル エム エリクソン(パブル) Method and apparatus for enabling multimedia communication with a private network
EP1940085B1 (en) * 2006-12-27 2013-06-05 Huawei Technologies Co., Ltd. Method and device for service binding

Also Published As

Publication number Publication date
TWI403918B (en) 2013-08-01

Similar Documents

Publication Publication Date Title
JP4864898B2 (en) Method and apparatus for dynamically activating / deactivating an operating system
CN104094270B (en) User certificate is protected for computing device
CN109639740A (en) A kind of login state sharing method and device based on device id
CN104580364B (en) A kind of method and apparatus of resource sharing
CN104202162B (en) A kind of system logged in based on mobile phone and login method
TW202006580A (en) Identity verification method, login method, apparatuses, and computer device
CN103501229B (en) Method for conducting safety certification based on e-commerce platform safety certification system managed by supply chain
WO2013138954A1 (en) Computer account management system and implementation method thereof
JPH10320354A (en) Method and system capable of accessing distributed service
CN106464494A (en) Wireless device authentication and service access
CN106850693B (en) Real-name authentication method and real-name authentication system
CN110489946A (en) Copyright authentication method, apparatus, equipment and storage medium based on block chain
CN106357629A (en) Intelligent terminal identity authentication and single sign-on system and method based on digital certificate
CN106790208A (en) A kind of communication encrypting method and device
WO2019205379A1 (en) Consortium chain-based management method for public welfare economic system, device and storage medium
JP6481953B2 (en) Data management method, computer program therefor, recording medium therefor, and user client for executing data management method
CN103379093B (en) A kind of method and device for realizing account intercommunication
CN206878870U (en) A kind of safe single-sign-on accesses system
TW201004265A (en) Network user ID verification system and method
CN106529216A (en) Software authorization system based on public storage platforms and software authorization method
TW201014313A (en) Method of confirming hardware password
CN111274572A (en) User login authentication system based on online banking safety management
CN101378386B (en) Safety authentication method and apparatus for transferring screen by a palm terminal using virtual technology
TW201011587A (en) Computer tied-in system and its method
KR101861441B1 (en) Finance service providing method using simple login and server performing the same

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees