CN101064535A - Intelligent authentication method and system based on close range wireless communication handset - Google Patents

Intelligent authentication method and system based on close range wireless communication handset Download PDF

Info

Publication number
CN101064535A
CN101064535A CN 200710039403 CN200710039403A CN101064535A CN 101064535 A CN101064535 A CN 101064535A CN 200710039403 CN200710039403 CN 200710039403 CN 200710039403 A CN200710039403 A CN 200710039403A CN 101064535 A CN101064535 A CN 101064535A
Authority
CN
China
Prior art keywords
subsystem
password
interface
mobile phone
near field
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200710039403
Other languages
Chinese (zh)
Other versions
CN101064535B (en
Inventor
韩伟力
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fudan University
Original Assignee
Fudan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fudan University filed Critical Fudan University
Priority to CN2007100394037A priority Critical patent/CN101064535B/en
Publication of CN101064535A publication Critical patent/CN101064535A/en
Application granted granted Critical
Publication of CN101064535B publication Critical patent/CN101064535B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an attestation method and system which are based on close quarter's wireless communication mobile telephone, and provides an intelligent attestation method for computer system. The intelligent attestation method uses mobile telephone to store the characteristic information of computer system logging on interface, when user is logged; the mobile telephone validates the stored characteristic information to insure the validity of logging interface; by detecting the effective close quarter's wireless communication signal to realize the function of 'locking up by people away'. The intelligent attestation system includes: (1) countersign managing sub system; (2) attestation information receiving/sending sub system; (3) interface character obtaining sub system; (4) user name countersign filling sub system of computer logging interface; (5) intelligent locking sub system which is based on weakness of signal. The method and system can manage user names and countersigns of several computers; protects the countersigns stored in mobile telephone; authenticates the logged interface to avoid fishing attack.

Description

Intelligent authentication method and system based on the wireless near field communication mobile phone
Technical field
The invention belongs to wireless communication technology field, be specifically related to a kind of password management and intelligent authentication method and system, especially utilize wireless near field communication means and mobile phone to realize the method and system of the management and the realization intelligent authentication of username-password.
Background technology
Occur the security attack (such as phishing, man-in-the-middle attack, password cracking etc.) at user password in the current computer system, making becomes a hot issue of computer safety field to the research of password protection and authentification of user.The main means of computer network security mechanism comprise safety certification at present, be that the user is before the log into thr computer system comprises web station system, whether server end authenticates to determine consistent with the authentication information that is stored in server at server end after obtaining log-on message (as the user name and password) from user side earlier.If consistent, then allow this user to enter computer system, otherwise the refusal login.
Username-password computing system authentication techniques are simple and comparatively safe and widely vast calculating user accepts with it.Yet use username-password to login and have a lot of defectives, especially in some information systems higher (as bank system of web) to security requirement, these systems often require password to have certain length, and different computer systems is provided with different passwords.The defective of existing username-password login system mainly comprises the memory difficulty of password, the input difficulty of password, the safe storage difficulty of password.
1. the memory difficulty of password is meant that the user is difficult to remember the password of oneself, in case forget then need a large amount of resource of consumption calculations machine and adopt complicated processing procedure in order to recover password;
2. the input difficulty of password is meant that the user inputs password easily by mistake and causes system that the true identity of validated user is judged by accident;
More existing username-password management softwares are managed these username-password, but have some problems.Wherein the most outstanding these management softwares that are operate on the PC, in case PC is controlled by rogue program, then all username-password might be leaked to the assailant fully.
The solution of another kind of secured user's name password is the dynamic token system, typical SecureID as RSA company, the general order of company of Netease etc.The characteristics of these systems are to utilize the hardware of special portable regularly dynamically to generate a password, are input to conduct authentication key element in the password frame, combine the fail safe that can increase substantially system authentication with other authentication key element.Yet this solution has solved the password memory difficulty, but does not solve the difficulty that the user enters password.Simultaneously, this scheme needs system to change authentication mode, and relatively difficulty is revised by system.In addition, this scheme needs special hardware, and the cost of deployment is higher relatively, though that this hardware designs gets is smaller, still need additionally carry these hardware.
More than these schemes all have no idea people and computer log are linked together, also be that the people is when leaving system, system should automatically lock or log off, otherwise work as validated user when leaving the computer system of having logined, other people can malice pretend to be validated user to carry out illegal operation in system.
Summary of the invention
The object of the present invention is to provide that a kind of fail safe is good, password memory and input be easily based on the authentication method and the system of wireless near field communication mobile phone, and a kind of technical scheme of intelligent authentication is provided for computer system.
The intelligent authentication method that the present invention proposes, be that the mobile phone that will store authentication information is determined user identity as the authentication key element, concrete steps are as follows: elder generation is by the characteristic information at mobile phone storage computation machine system login interface, verify according to the characteristic information of storage in advance by mobile phone when the user logins, determine the legitimacy of login interface; Determining under the legal situation in interface,, by wireless near field communication the user name and password is being sent to the computer system log-in interface, and fills in automatically, realizing user's authentication by mobile phone storage the user name and password; By detecting the power of effective wireless near field communication signal, realization " people is from i.e. locking " authen session intelligence is kept.
Intelligent authentication of the present invention system realizes above-mentioned intelligent authentication method, and system comprises: (1) is based on the password management subsystem of mobile phone; (2) based on the authentication information reception/transmission subsystem of wireless near field communication; (3) interface feature obtains subsystem; (4) username-password of computer system login interface is filled in subsystem; (5) based on the intelligent locking subsystem of wireless near field communication signal power.This method and system can manage the user name and password of a plurality of computers effectively; The password that is stored on the mobile phone is effectively protected; Interface to login authenticates to prevent phishing attack.
Mobile phone can be stored many class boundaries face feature and corresponding username-password information thereof.Among the present invention, mobile phone operating system is supported Symbian, Windows Mobile, built-in Linux etc.The wireless near field communication means comprise Bluetooth communication, infrared communication, WLAN (wireless local area network) IEEE 802.11 a/b/g agreements and other wireless near field communication means.The mobile phone end is by the legitimacy at the interface feature authenticating computer system login interface of collecting in advance, and these interface features comprise: NIC address, the URL address in the browser Verification System, webpage hashed value and the digital certificate hashed value of operating system version number, place computer.
The authentication key element comprises username-password among the present invention, and password comprises static password and dynamic password.
Computer system login interface described in the present invention comprises computer operating system login interfaces such as Windows, Linux and based on the website log interface of browser.
The authen session intelligence of " people from i.e. locking " of the present invention is kept, and wherein main frame is according to judging that regularly the validity of wireless near field communication judges whether the user leaves main frame.Validity is judged can not transmit data based on signal weakening to pre-set threshold or wireless near field communication.Main frame promptly locks main frame after judging that the user leaves; Main frame is being judged the effective wireless near field communication channel that rebulids in effective time, i.e. login automatically.
Among the present invention, subsystem 1 is realized registration, the storage of authentication key element.Subsystem 2 is realized wireless short-distance communication.Subsystem 3 is realized the feature extraction of computer system login interface.The username-password of realization computer system login interface is filled in automatically.The authen session intelligence of realization " people is from i.e. locking " is kept method.
The advantage of this method and system is:
1. solved user's password memory difficulty.The user does not need to remember password voluntarily and only password need be stored in and gets final product in the mobile phone;
2. solved the difficulty that the user enters password.System can judge legal interface automatically and the user name and password is input to the interface;
3. lower deployment cost is lower.Growing along with mobile phone technique, computing capability and communication capacity that mobile phone can carry are more and more stronger, wireless near field communication such as Bluetooth communication etc. are equipped in the novel mobile phone widely, and our designed system is the application software that operates in these medium-to-high grade mobile phones, so lower deployment cost is very low.Our system does not need to change the authentication protocol of original computer system simultaneously, and the cost of therefore revising original computer system is also lower;
4. can realize the anti-phishing attack.Discern legal inputting interface by the interface feature that mobile phone is stored in advance, stop username-password is input to illegal interface, thereby realize the anti-phishing attack.
5. can realize " people is from i.e. locking " function.By identification, if the wireless near field communication signal strength signal intensity is weaker than predefined value, then locking system to wireless near field communication signal power;
Description of drawings
Fig. 1 is a system schematic of the present invention.
Fig. 2 is a system architecture diagram of the present invention.
Number in the figure 1 expression this end of mobile phone (PH); 2 expression these ends of computer system (HOST).3 expressions realize interpolation, modification and delete function to many groups username-password based on the password management subsystem of mobile phone; 4 expression authentication information reception/transmission subsystems are realized the wireless near field communication function; 5 expression interface features obtain subsystem, realize the function of obtaining to computer system login interface characteristic information; 6 expression username-password are filled in subsystem, realize the information that receives is filled up to automatically the function of computer system login interface; 7 expression intelligent locking subsystems are realized the intelligent locking function based on the wireless near field communication signal strength signal intensity.
Embodiment
Suppose to have a user, have user name: UN, password: PWD.There is department of computer science to unify platform in the applied environment: HOST, one of mobile phone: PH.With this user and applied environment thereof is four enforcement subprocess of example explanation native system:
1. authentication registration information: (1) obtains the login interface feature that subsystem 5 is collected HOST by interface feature, and the feature that operating system need be collected comprises the network interface card card number at operating system version number, system place; The website log system need collect the hashed value of URL address, web page contents, the digital certificate hashed value of current sessions; (2) information is sent to the password management subsystem 3 of mobile phone end PH by authentication information reception/transmission subsystem 4; (3) if operating system, the then user name UN of User Interface feature correspondence and password PWD and storage in password management subsystem 3; If the website log system, then obtain and input user name UN and password PWD in the subsystem 5 and send to the subsystem 3 of mobile phone end PH, and store by subsystem 3 by subsystem 4 at interface feature; (4) ending said process.
2. authentication login interface: (1) initiates this function by HOST; (2) collected the login interface feature of HOST by subsystem 5, the feature that operating system need be collected comprises the network interface card card number at operating system version number, system place; The website log system need collect the hashed value of URL address, web page contents, the digital certificate hashed value of current sessions; (3) by subsystem 4 information is sent to mobile phone end PH subsystem 3; (4) in subsystem 3, search this interface feature and whether exist, if there is no, point out the possibility whether phishing attack had been revised or taken place at the interface, ending said process; (5) if interface feature in native system, exist and fit like a glove then; (6) set up secure authentication session and ending said process.
3. send and fill in username-password: (1) sends user name UN and the password PWD mobile phone end PH to subsystem 4 by subsystem 3; (2) the mobile phone end PH encrypting user name UN of subsystem 4 and password PWD and be delivered to the HOST end of subsystem 4 by wireless near field communication; (3) HOST of subsystem 4 holds decrypted user name UN and password PWD, and is sent to subsystem 6.; (4) subsystem 6 is filled in user name UN and password PWD to corresponding computing system login interface input frame; (5) if login successfully then send message to subsystem 4, otherwise the prompting error message.Ending said process;
4. intelligent locking authen session: (1) subsystem 4 is received the message of subsystem 6 authentication successs, then the current authentication session information is sent to subsystem 7; (2) in a single day subsystem 7 was regularly surveyed the validity of wireless near field communication every 5 seconds, if be lower than predefined signal strength signal intensity or do not have signal, then locked HOST; (3) if subsystem 7 detects in the session of locking wireless near field communication once again effectively then login HOST automatically again.

Claims (4)

1. intelligent authentication method based on the wireless near field communication mobile phone, the mobile phone that it is characterized in that storing authentication information is determined user's identity as the authentication key element, concrete steps are as follows: elder generation is by the characteristic information at mobile phone storage computation machine system login interface, verify according to the characteristic information of storage in advance by mobile phone when the user logins, determine the legitimacy of login interface; Determining to store the user name and password by mobile phone under the legal situation in interface, by wireless near field communication the user name and password is sent to the computer system log-in interface, and fills in automatically, realize user's authentication; By detecting the power of effective wireless near field communication signal, realization " people is from i.e. locking " authen session intelligence is kept.
2. intelligent authentication method according to claim 1 is characterized in that:
Described mobile phone can be stored many class boundaries face feature and corresponding username-password information thereof, and mobile phone operating system is supported Symbian, Windows Mobile, built-in Linux;
The wireless near field communication means comprise Bluetooth communication, infrared communication, WLAN (wireless local area network) IEEE 802.11a/b/g agreement;
The mobile phone end is by the legitimacy at the interface feature authenticating computer system login interface of collecting in advance, and these interface features comprise: operating system version number, the NIC address of place computer, the URL address in the browser Verification System, webpage hashed value, digital certificate hashed value;
Described authentication key element comprises username-password, and password comprises static password and dynamic password;
Described computer system login interface comprises Windows, Linux computer operating system login interface and based on the website log interface of browser;
The authen session intelligence of described " people is from i.e. locking " is kept, wherein main frame is according to regularly judging the validity of wireless near field communication judges whether the user leaves main frame, and validity is judged can not transmit data based on signal weakening to pre-set threshold or wireless near field communication; Main frame promptly locks main frame after judging that the user leaves; Main frame is being judged the effective wireless near field communication channel that rebulids in effective time, i.e. login automatically.
3. intelligent authentication system based on the wireless near field communication mobile phone, it is characterized in that system comprises: based on the password management subsystem (3) of mobile phone, authentication information reception/transmission subsystem (4) based on wireless near field communication, interface feature obtains subsystem (5), and the username-password of computer system login interface is filled in subsystem (6) and based on the intelligent locking subsystem (7) of wireless near field communication signal power.
4. the intelligent authentication method based on the wireless near field communication mobile phone according to claim 1 is used the described intelligent authentication of claim 2 system, and detailed process is as follows:
(1). authentication registration information: 1. obtain the login interface feature that subsystem (5) is collected HOST by interface feature, the feature that operating system is collected comprises the network interface card card number at operating system version number, system place; The website log system collects URL address, the hashed value of web page contents, the digital certificate hashed value of current sessions;
2. by authentication information reception/transmission subsystem (4) information is sent to the password management subsystem (3) of mobile phone end PH;
3. if operating system, the then user name UN of User Interface feature correspondence and password PWD and storage in password management subsystem (3); If the website log system, then obtain and input user name UN and password PWD in the subsystem (5) and send to the subsystem (3) of mobile phone end PH, and store by subsystem (3) by subsystem (4) at interface feature;
4. ending said process;
(2). the authentication login interface:
1. initiate this function by HOST;
2. collected the login interface feature of HOST by subsystem (5), the feature that operating system is collected comprises the network interface card card number at operating system version number, system place; The website log system collects URL address, the hashed value of web page contents, the digital certificate hashed value of current sessions;
3. by subsystem (4) information is sent to mobile phone end PH subsystem (3);
4. in subsystem (3), search this interface feature and whether exist, if there is no, point out the possibility whether phishing attack had been revised or taken place at the interface, ending said process;
If 5. interface feature exists in native system and fits like a glove, then:
6. set up secure authentication session and ending said process;
(3). send and fill in username-password:
1. send user name UN and password PWD mobile phone end PH by subsystem (3) to subsystem (4);
2. the mobile phone end PH encrypting user name UN of subsystem (4) and password PWD and be delivered to the HOST end of subsystem (4) by wireless near field communication;
3. the HOST of subsystem (4) holds decrypted user name UN and password PWD, and is sent to subsystem (6);
4. subsystem (6) is filled in user name UN and password PWD to corresponding computing system login interface input frame;
If 5. login successfully then send message to subsystem (4), otherwise the prompting error message, ending said process;
(4). the intelligent locking authen session:
1. subsystem (4) is received the message of subsystem (6) authentication success, then the current authentication session information is sent to subsystem (7);
2. in a single day subsystem (7) was regularly surveyed the validity of wireless near field communication every 5 seconds, if be lower than predefined signal strength signal intensity or do not have signal, then locked HOST;
If 3. subsystem (7) detects in the session of locking wireless near field communication once again effectively then login HOST automatically again.
CN2007100394037A 2007-04-12 2007-04-12 Intelligent authentication method and system based on close range wireless communication handset Expired - Fee Related CN101064535B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007100394037A CN101064535B (en) 2007-04-12 2007-04-12 Intelligent authentication method and system based on close range wireless communication handset

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007100394037A CN101064535B (en) 2007-04-12 2007-04-12 Intelligent authentication method and system based on close range wireless communication handset

Publications (2)

Publication Number Publication Date
CN101064535A true CN101064535A (en) 2007-10-31
CN101064535B CN101064535B (en) 2011-12-07

Family

ID=38965306

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007100394037A Expired - Fee Related CN101064535B (en) 2007-04-12 2007-04-12 Intelligent authentication method and system based on close range wireless communication handset

Country Status (1)

Country Link
CN (1) CN101064535B (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101677442A (en) * 2008-09-17 2010-03-24 艾威梯科技(北京)有限公司 Method and equipment for automatically logging in application programs
CN101826897A (en) * 2010-05-12 2010-09-08 中兴通讯股份有限公司 Method, device and system for realizing communication between mobile terminal and PC
CN102624709A (en) * 2012-02-27 2012-08-01 无锡华赛信息技术有限公司 Divulgence prevention method based on Bluetooth for cloud architecture
CN102685330A (en) * 2012-05-15 2012-09-19 江苏中科梦兰电子科技有限公司 Method for logging in operation system by taking cell phone as authentication tool
CN102984149A (en) * 2012-11-23 2013-03-20 广东欧珀移动通信有限公司 Method and device for synchronous login of mobile terminal and a personal computer (PC) terminal
CN103488932A (en) * 2013-10-16 2014-01-01 重庆邮电大学 Desktop security intercommunication system for mobile device and personal computer and implementation method thereof
CN103488933A (en) * 2013-09-27 2014-01-01 太仓苏易信息科技有限公司 Non-contact type computer login protection system
CN103516719A (en) * 2012-06-27 2014-01-15 Gn奈康有限公司 Providing presence information in a personal communication system comprising an interface unit
CN103684512A (en) * 2012-09-19 2014-03-26 Lg电子株式会社 Mobile terminal and controlling method thereof
CN103888265A (en) * 2014-04-11 2014-06-25 上海博路信息技术有限公司 Login system and method based on mobile terminal
CN104009858A (en) * 2013-02-26 2014-08-27 成都勤智数码科技股份有限公司 Multilevel verification system based on safety management
CN104105084A (en) * 2013-04-15 2014-10-15 王方淇 Information interaction method, terminal and information interaction system
CN104992125A (en) * 2015-06-30 2015-10-21 向岚 Computer network security protection system
CN105224848A (en) * 2015-10-15 2016-01-06 京东方科技集团股份有限公司 A kind of equipment authentication method, Apparatus and system
CN105337937A (en) * 2014-07-24 2016-02-17 小米科技有限责任公司 Network verification method and device
CN106411831A (en) * 2016-03-11 2017-02-15 山东渔翁信息技术股份有限公司 Office environment login system and method
CN106716388A (en) * 2014-09-24 2017-05-24 佳能株式会社 Communication system, mobile terminal, method of controlling the mobile terminal, and storage medium
CN110650110A (en) * 2018-06-26 2020-01-03 深信服科技股份有限公司 Login page identification method and related equipment
CN112632526A (en) * 2021-01-07 2021-04-09 复旦大学 User password modeling and strength evaluation method based on comprehensive segmentation
CN113556739A (en) * 2020-04-01 2021-10-26 中国长城科技集团股份有限公司 Computer system unlocking/locking control method and device based on Bluetooth
CN117320007A (en) * 2023-11-27 2023-12-29 北京时代亿信科技股份有限公司 Office system control method and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100492966C (en) * 2004-11-26 2009-05-27 王小矿 Identity certifying system based on intelligent card and dynamic coding
CN1921386A (en) * 2006-07-11 2007-02-28 钟权 Method for realizing associator identity identification in intelligent communication network by using mobile phone number

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101677442A (en) * 2008-09-17 2010-03-24 艾威梯科技(北京)有限公司 Method and equipment for automatically logging in application programs
CN101826897A (en) * 2010-05-12 2010-09-08 中兴通讯股份有限公司 Method, device and system for realizing communication between mobile terminal and PC
CN102624709A (en) * 2012-02-27 2012-08-01 无锡华赛信息技术有限公司 Divulgence prevention method based on Bluetooth for cloud architecture
CN102685330A (en) * 2012-05-15 2012-09-19 江苏中科梦兰电子科技有限公司 Method for logging in operation system by taking cell phone as authentication tool
CN103516719B (en) * 2012-06-27 2017-05-31 Gn奈康有限公司 Method, the apparatus and system of existence information are provided in the PCS Personal Communications System including interface unit
CN103516719A (en) * 2012-06-27 2014-01-15 Gn奈康有限公司 Providing presence information in a personal communication system comprising an interface unit
CN103684512A (en) * 2012-09-19 2014-03-26 Lg电子株式会社 Mobile terminal and controlling method thereof
CN102984149A (en) * 2012-11-23 2013-03-20 广东欧珀移动通信有限公司 Method and device for synchronous login of mobile terminal and a personal computer (PC) terminal
CN102984149B (en) * 2012-11-23 2015-10-28 广东欧珀移动通信有限公司 A kind of mobile terminal holds synchronous login method and device with PC
CN104009858A (en) * 2013-02-26 2014-08-27 成都勤智数码科技股份有限公司 Multilevel verification system based on safety management
CN104105084A (en) * 2013-04-15 2014-10-15 王方淇 Information interaction method, terminal and information interaction system
CN103488933A (en) * 2013-09-27 2014-01-01 太仓苏易信息科技有限公司 Non-contact type computer login protection system
CN103488932A (en) * 2013-10-16 2014-01-01 重庆邮电大学 Desktop security intercommunication system for mobile device and personal computer and implementation method thereof
CN103888265A (en) * 2014-04-11 2014-06-25 上海博路信息技术有限公司 Login system and method based on mobile terminal
CN103888265B (en) * 2014-04-11 2017-07-25 上海博路信息技术有限公司 A kind of application login system and method based on mobile terminal
CN105337937A (en) * 2014-07-24 2016-02-17 小米科技有限责任公司 Network verification method and device
CN105337937B (en) * 2014-07-24 2019-07-26 小米科技有限责任公司 Network verification method, device and computer readable storage medium
US11218617B2 (en) 2014-09-24 2022-01-04 Canon Kabushiki Kaisha Communication system, mobile terminal, method of controlling the mobile terminal, and storage medium
CN106716388A (en) * 2014-09-24 2017-05-24 佳能株式会社 Communication system, mobile terminal, method of controlling the mobile terminal, and storage medium
US10225435B2 (en) 2014-09-24 2019-03-05 Canon Kabushiki Kaisha Communication system, mobile terminal, method of controlling the mobile terminal, and storage medium
US11700343B2 (en) 2014-09-24 2023-07-11 Canon Kabushiki Kaisha Communication system, mobile terminal, method of controlling the mobile terminal, and storage medium
US10609248B2 (en) 2014-09-24 2020-03-31 Canon Kabushiki Kaisha Communication system, mobile terminal, method of controlling the mobile terminal, and storage medium
CN104992125A (en) * 2015-06-30 2015-10-21 向岚 Computer network security protection system
CN105224848A (en) * 2015-10-15 2016-01-06 京东方科技集团股份有限公司 A kind of equipment authentication method, Apparatus and system
CN106411831A (en) * 2016-03-11 2017-02-15 山东渔翁信息技术股份有限公司 Office environment login system and method
CN110650110A (en) * 2018-06-26 2020-01-03 深信服科技股份有限公司 Login page identification method and related equipment
CN113556739A (en) * 2020-04-01 2021-10-26 中国长城科技集团股份有限公司 Computer system unlocking/locking control method and device based on Bluetooth
CN113556739B (en) * 2020-04-01 2024-03-22 中国长城科技集团股份有限公司 Bluetooth-based computer system unlocking/locking control method and device
CN112632526A (en) * 2021-01-07 2021-04-09 复旦大学 User password modeling and strength evaluation method based on comprehensive segmentation
CN112632526B (en) * 2021-01-07 2022-04-12 复旦大学 User password modeling and strength evaluation method based on comprehensive segmentation
CN117320007A (en) * 2023-11-27 2023-12-29 北京时代亿信科技股份有限公司 Office system control method and system
CN117320007B (en) * 2023-11-27 2024-02-09 北京时代亿信科技股份有限公司 Office system control method and system

Also Published As

Publication number Publication date
CN101064535B (en) 2011-12-07

Similar Documents

Publication Publication Date Title
CN101064535B (en) Intelligent authentication method and system based on close range wireless communication handset
Razouk et al. A new security middleware architecture based on fog computing and cloud to support IoT constrained devices
CN100380356C (en) Device authentication system
CN102047262B (en) Authentication for distributed secure content management system
CN103607385B (en) Method and apparatus for security detection based on browser
EP1339199A1 (en) Dynamic user authentication
US20120324545A1 (en) Automated security privilege setting for remote system users
CN103067338A (en) Third party application centralized safety management method and system and corresponding communication system
CN1993921A (en) Enhanced security using service provider authentication
Jaidhar Enhanced mutual authentication scheme for cloud architecture
CN103546432A (en) Method and system for realizing cross-domain jumping, browser and domain name servers
CN102868702B (en) System login device and system login method
CN103825863B (en) A kind of accounts management method and device
CN111027035A (en) Multi-identity authentication method and system based on block chain
CN101083659A (en) Security policy and environment for portable equipment
Mohsin et al. Two factor vs multi-factor, an authentication battle in mobile cloud computing environments
CN101883106A (en) Network access authentication method and server based on digital certificate
CN106982221A (en) A kind of network authentication method, system and intelligent terminal
CN106534071A (en) Internet-of-vehicles link security authentication method and system based on device whitelist management
CN113037736B (en) Authentication method, device, system and computer storage medium
CN104883342A (en) Account authority management system, account authority management method and device thereof
CN104917737B (en) User account protection method and device
KR101133210B1 (en) Mobile Authentication System and Central Control System
CN102202291B (en) Card-free terminal, service access method and system thereof, terminal with card and bootstrapping server function (BSF)
WO2017153990A1 (en) System and method for device authentication using hardware and software identifiers

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20111207

Termination date: 20140412