CN101064535A - Intelligent authentication method and system based on close range wireless communication handset - Google Patents
Intelligent authentication method and system based on close range wireless communication handset Download PDFInfo
- Publication number
- CN101064535A CN101064535A CN 200710039403 CN200710039403A CN101064535A CN 101064535 A CN101064535 A CN 101064535A CN 200710039403 CN200710039403 CN 200710039403 CN 200710039403 A CN200710039403 A CN 200710039403A CN 101064535 A CN101064535 A CN 101064535A
- Authority
- CN
- China
- Prior art keywords
- subsystem
- password
- interface
- mobile phone
- near field
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses an attestation method and system which are based on close quarter's wireless communication mobile telephone, and provides an intelligent attestation method for computer system. The intelligent attestation method uses mobile telephone to store the characteristic information of computer system logging on interface, when user is logged; the mobile telephone validates the stored characteristic information to insure the validity of logging interface; by detecting the effective close quarter's wireless communication signal to realize the function of 'locking up by people away'. The intelligent attestation system includes: (1) countersign managing sub system; (2) attestation information receiving/sending sub system; (3) interface character obtaining sub system; (4) user name countersign filling sub system of computer logging interface; (5) intelligent locking sub system which is based on weakness of signal. The method and system can manage user names and countersigns of several computers; protects the countersigns stored in mobile telephone; authenticates the logged interface to avoid fishing attack.
Description
Technical field
The invention belongs to wireless communication technology field, be specifically related to a kind of password management and intelligent authentication method and system, especially utilize wireless near field communication means and mobile phone to realize the method and system of the management and the realization intelligent authentication of username-password.
Background technology
Occur the security attack (such as phishing, man-in-the-middle attack, password cracking etc.) at user password in the current computer system, making becomes a hot issue of computer safety field to the research of password protection and authentification of user.The main means of computer network security mechanism comprise safety certification at present, be that the user is before the log into thr computer system comprises web station system, whether server end authenticates to determine consistent with the authentication information that is stored in server at server end after obtaining log-on message (as the user name and password) from user side earlier.If consistent, then allow this user to enter computer system, otherwise the refusal login.
Username-password computing system authentication techniques are simple and comparatively safe and widely vast calculating user accepts with it.Yet use username-password to login and have a lot of defectives, especially in some information systems higher (as bank system of web) to security requirement, these systems often require password to have certain length, and different computer systems is provided with different passwords.The defective of existing username-password login system mainly comprises the memory difficulty of password, the input difficulty of password, the safe storage difficulty of password.
1. the memory difficulty of password is meant that the user is difficult to remember the password of oneself, in case forget then need a large amount of resource of consumption calculations machine and adopt complicated processing procedure in order to recover password;
2. the input difficulty of password is meant that the user inputs password easily by mistake and causes system that the true identity of validated user is judged by accident;
More existing username-password management softwares are managed these username-password, but have some problems.Wherein the most outstanding these management softwares that are operate on the PC, in case PC is controlled by rogue program, then all username-password might be leaked to the assailant fully.
The solution of another kind of secured user's name password is the dynamic token system, typical SecureID as RSA company, the general order of company of Netease etc.The characteristics of these systems are to utilize the hardware of special portable regularly dynamically to generate a password, are input to conduct authentication key element in the password frame, combine the fail safe that can increase substantially system authentication with other authentication key element.Yet this solution has solved the password memory difficulty, but does not solve the difficulty that the user enters password.Simultaneously, this scheme needs system to change authentication mode, and relatively difficulty is revised by system.In addition, this scheme needs special hardware, and the cost of deployment is higher relatively, though that this hardware designs gets is smaller, still need additionally carry these hardware.
More than these schemes all have no idea people and computer log are linked together, also be that the people is when leaving system, system should automatically lock or log off, otherwise work as validated user when leaving the computer system of having logined, other people can malice pretend to be validated user to carry out illegal operation in system.
Summary of the invention
The object of the present invention is to provide that a kind of fail safe is good, password memory and input be easily based on the authentication method and the system of wireless near field communication mobile phone, and a kind of technical scheme of intelligent authentication is provided for computer system.
The intelligent authentication method that the present invention proposes, be that the mobile phone that will store authentication information is determined user identity as the authentication key element, concrete steps are as follows: elder generation is by the characteristic information at mobile phone storage computation machine system login interface, verify according to the characteristic information of storage in advance by mobile phone when the user logins, determine the legitimacy of login interface; Determining under the legal situation in interface,, by wireless near field communication the user name and password is being sent to the computer system log-in interface, and fills in automatically, realizing user's authentication by mobile phone storage the user name and password; By detecting the power of effective wireless near field communication signal, realization " people is from i.e. locking " authen session intelligence is kept.
Intelligent authentication of the present invention system realizes above-mentioned intelligent authentication method, and system comprises: (1) is based on the password management subsystem of mobile phone; (2) based on the authentication information reception/transmission subsystem of wireless near field communication; (3) interface feature obtains subsystem; (4) username-password of computer system login interface is filled in subsystem; (5) based on the intelligent locking subsystem of wireless near field communication signal power.This method and system can manage the user name and password of a plurality of computers effectively; The password that is stored on the mobile phone is effectively protected; Interface to login authenticates to prevent phishing attack.
Mobile phone can be stored many class boundaries face feature and corresponding username-password information thereof.Among the present invention, mobile phone operating system is supported Symbian, Windows Mobile, built-in Linux etc.The wireless near field communication means comprise Bluetooth communication, infrared communication, WLAN (wireless local area network) IEEE 802.11 a/b/g agreements and other wireless near field communication means.The mobile phone end is by the legitimacy at the interface feature authenticating computer system login interface of collecting in advance, and these interface features comprise: NIC address, the URL address in the browser Verification System, webpage hashed value and the digital certificate hashed value of operating system version number, place computer.
The authentication key element comprises username-password among the present invention, and password comprises static password and dynamic password.
Computer system login interface described in the present invention comprises computer operating system login interfaces such as Windows, Linux and based on the website log interface of browser.
The authen session intelligence of " people from i.e. locking " of the present invention is kept, and wherein main frame is according to judging that regularly the validity of wireless near field communication judges whether the user leaves main frame.Validity is judged can not transmit data based on signal weakening to pre-set threshold or wireless near field communication.Main frame promptly locks main frame after judging that the user leaves; Main frame is being judged the effective wireless near field communication channel that rebulids in effective time, i.e. login automatically.
Among the present invention, subsystem 1 is realized registration, the storage of authentication key element.Subsystem 2 is realized wireless short-distance communication.Subsystem 3 is realized the feature extraction of computer system login interface.The username-password of realization computer system login interface is filled in automatically.The authen session intelligence of realization " people is from i.e. locking " is kept method.
The advantage of this method and system is:
1. solved user's password memory difficulty.The user does not need to remember password voluntarily and only password need be stored in and gets final product in the mobile phone;
2. solved the difficulty that the user enters password.System can judge legal interface automatically and the user name and password is input to the interface;
3. lower deployment cost is lower.Growing along with mobile phone technique, computing capability and communication capacity that mobile phone can carry are more and more stronger, wireless near field communication such as Bluetooth communication etc. are equipped in the novel mobile phone widely, and our designed system is the application software that operates in these medium-to-high grade mobile phones, so lower deployment cost is very low.Our system does not need to change the authentication protocol of original computer system simultaneously, and the cost of therefore revising original computer system is also lower;
4. can realize the anti-phishing attack.Discern legal inputting interface by the interface feature that mobile phone is stored in advance, stop username-password is input to illegal interface, thereby realize the anti-phishing attack.
5. can realize " people is from i.e. locking " function.By identification, if the wireless near field communication signal strength signal intensity is weaker than predefined value, then locking system to wireless near field communication signal power;
Description of drawings
Fig. 1 is a system schematic of the present invention.
Fig. 2 is a system architecture diagram of the present invention.
Number in the figure 1 expression this end of mobile phone (PH); 2 expression these ends of computer system (HOST).3 expressions realize interpolation, modification and delete function to many groups username-password based on the password management subsystem of mobile phone; 4 expression authentication information reception/transmission subsystems are realized the wireless near field communication function; 5 expression interface features obtain subsystem, realize the function of obtaining to computer system login interface characteristic information; 6 expression username-password are filled in subsystem, realize the information that receives is filled up to automatically the function of computer system login interface; 7 expression intelligent locking subsystems are realized the intelligent locking function based on the wireless near field communication signal strength signal intensity.
Embodiment
Suppose to have a user, have user name: UN, password: PWD.There is department of computer science to unify platform in the applied environment: HOST, one of mobile phone: PH.With this user and applied environment thereof is four enforcement subprocess of example explanation native system:
1. authentication registration information: (1) obtains the login interface feature that subsystem 5 is collected HOST by interface feature, and the feature that operating system need be collected comprises the network interface card card number at operating system version number, system place; The website log system need collect the hashed value of URL address, web page contents, the digital certificate hashed value of current sessions; (2) information is sent to the password management subsystem 3 of mobile phone end PH by authentication information reception/transmission subsystem 4; (3) if operating system, the then user name UN of User Interface feature correspondence and password PWD and storage in password management subsystem 3; If the website log system, then obtain and input user name UN and password PWD in the subsystem 5 and send to the subsystem 3 of mobile phone end PH, and store by subsystem 3 by subsystem 4 at interface feature; (4) ending said process.
2. authentication login interface: (1) initiates this function by HOST; (2) collected the login interface feature of HOST by subsystem 5, the feature that operating system need be collected comprises the network interface card card number at operating system version number, system place; The website log system need collect the hashed value of URL address, web page contents, the digital certificate hashed value of current sessions; (3) by subsystem 4 information is sent to mobile phone end PH subsystem 3; (4) in subsystem 3, search this interface feature and whether exist, if there is no, point out the possibility whether phishing attack had been revised or taken place at the interface, ending said process; (5) if interface feature in native system, exist and fit like a glove then; (6) set up secure authentication session and ending said process.
3. send and fill in username-password: (1) sends user name UN and the password PWD mobile phone end PH to subsystem 4 by subsystem 3; (2) the mobile phone end PH encrypting user name UN of subsystem 4 and password PWD and be delivered to the HOST end of subsystem 4 by wireless near field communication; (3) HOST of subsystem 4 holds decrypted user name UN and password PWD, and is sent to subsystem 6.; (4) subsystem 6 is filled in user name UN and password PWD to corresponding computing system login interface input frame; (5) if login successfully then send message to subsystem 4, otherwise the prompting error message.Ending said process;
4. intelligent locking authen session: (1) subsystem 4 is received the message of subsystem 6 authentication successs, then the current authentication session information is sent to subsystem 7; (2) in a single day subsystem 7 was regularly surveyed the validity of wireless near field communication every 5 seconds, if be lower than predefined signal strength signal intensity or do not have signal, then locked HOST; (3) if subsystem 7 detects in the session of locking wireless near field communication once again effectively then login HOST automatically again.
Claims (4)
1. intelligent authentication method based on the wireless near field communication mobile phone, the mobile phone that it is characterized in that storing authentication information is determined user's identity as the authentication key element, concrete steps are as follows: elder generation is by the characteristic information at mobile phone storage computation machine system login interface, verify according to the characteristic information of storage in advance by mobile phone when the user logins, determine the legitimacy of login interface; Determining to store the user name and password by mobile phone under the legal situation in interface, by wireless near field communication the user name and password is sent to the computer system log-in interface, and fills in automatically, realize user's authentication; By detecting the power of effective wireless near field communication signal, realization " people is from i.e. locking " authen session intelligence is kept.
2. intelligent authentication method according to claim 1 is characterized in that:
Described mobile phone can be stored many class boundaries face feature and corresponding username-password information thereof, and mobile phone operating system is supported Symbian, Windows Mobile, built-in Linux;
The wireless near field communication means comprise Bluetooth communication, infrared communication, WLAN (wireless local area network) IEEE 802.11a/b/g agreement;
The mobile phone end is by the legitimacy at the interface feature authenticating computer system login interface of collecting in advance, and these interface features comprise: operating system version number, the NIC address of place computer, the URL address in the browser Verification System, webpage hashed value, digital certificate hashed value;
Described authentication key element comprises username-password, and password comprises static password and dynamic password;
Described computer system login interface comprises Windows, Linux computer operating system login interface and based on the website log interface of browser;
The authen session intelligence of described " people is from i.e. locking " is kept, wherein main frame is according to regularly judging the validity of wireless near field communication judges whether the user leaves main frame, and validity is judged can not transmit data based on signal weakening to pre-set threshold or wireless near field communication; Main frame promptly locks main frame after judging that the user leaves; Main frame is being judged the effective wireless near field communication channel that rebulids in effective time, i.e. login automatically.
3. intelligent authentication system based on the wireless near field communication mobile phone, it is characterized in that system comprises: based on the password management subsystem (3) of mobile phone, authentication information reception/transmission subsystem (4) based on wireless near field communication, interface feature obtains subsystem (5), and the username-password of computer system login interface is filled in subsystem (6) and based on the intelligent locking subsystem (7) of wireless near field communication signal power.
4. the intelligent authentication method based on the wireless near field communication mobile phone according to claim 1 is used the described intelligent authentication of claim 2 system, and detailed process is as follows:
(1). authentication registration information: 1. obtain the login interface feature that subsystem (5) is collected HOST by interface feature, the feature that operating system is collected comprises the network interface card card number at operating system version number, system place; The website log system collects URL address, the hashed value of web page contents, the digital certificate hashed value of current sessions;
2. by authentication information reception/transmission subsystem (4) information is sent to the password management subsystem (3) of mobile phone end PH;
3. if operating system, the then user name UN of User Interface feature correspondence and password PWD and storage in password management subsystem (3); If the website log system, then obtain and input user name UN and password PWD in the subsystem (5) and send to the subsystem (3) of mobile phone end PH, and store by subsystem (3) by subsystem (4) at interface feature;
4. ending said process;
(2). the authentication login interface:
1. initiate this function by HOST;
2. collected the login interface feature of HOST by subsystem (5), the feature that operating system is collected comprises the network interface card card number at operating system version number, system place; The website log system collects URL address, the hashed value of web page contents, the digital certificate hashed value of current sessions;
3. by subsystem (4) information is sent to mobile phone end PH subsystem (3);
4. in subsystem (3), search this interface feature and whether exist, if there is no, point out the possibility whether phishing attack had been revised or taken place at the interface, ending said process;
If 5. interface feature exists in native system and fits like a glove, then:
6. set up secure authentication session and ending said process;
(3). send and fill in username-password:
1. send user name UN and password PWD mobile phone end PH by subsystem (3) to subsystem (4);
2. the mobile phone end PH encrypting user name UN of subsystem (4) and password PWD and be delivered to the HOST end of subsystem (4) by wireless near field communication;
3. the HOST of subsystem (4) holds decrypted user name UN and password PWD, and is sent to subsystem (6);
4. subsystem (6) is filled in user name UN and password PWD to corresponding computing system login interface input frame;
If 5. login successfully then send message to subsystem (4), otherwise the prompting error message, ending said process;
(4). the intelligent locking authen session:
1. subsystem (4) is received the message of subsystem (6) authentication success, then the current authentication session information is sent to subsystem (7);
2. in a single day subsystem (7) was regularly surveyed the validity of wireless near field communication every 5 seconds, if be lower than predefined signal strength signal intensity or do not have signal, then locked HOST;
If 3. subsystem (7) detects in the session of locking wireless near field communication once again effectively then login HOST automatically again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007100394037A CN101064535B (en) | 2007-04-12 | 2007-04-12 | Intelligent authentication method and system based on close range wireless communication handset |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007100394037A CN101064535B (en) | 2007-04-12 | 2007-04-12 | Intelligent authentication method and system based on close range wireless communication handset |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101064535A true CN101064535A (en) | 2007-10-31 |
CN101064535B CN101064535B (en) | 2011-12-07 |
Family
ID=38965306
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2007100394037A Expired - Fee Related CN101064535B (en) | 2007-04-12 | 2007-04-12 | Intelligent authentication method and system based on close range wireless communication handset |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101064535B (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101677442A (en) * | 2008-09-17 | 2010-03-24 | 艾威梯科技(北京)有限公司 | Method and equipment for automatically logging in application programs |
CN101826897A (en) * | 2010-05-12 | 2010-09-08 | 中兴通讯股份有限公司 | Method, device and system for realizing communication between mobile terminal and PC |
CN102624709A (en) * | 2012-02-27 | 2012-08-01 | 无锡华赛信息技术有限公司 | Divulgence prevention method based on Bluetooth for cloud architecture |
CN102685330A (en) * | 2012-05-15 | 2012-09-19 | 江苏中科梦兰电子科技有限公司 | Method for logging in operation system by taking cell phone as authentication tool |
CN102984149A (en) * | 2012-11-23 | 2013-03-20 | 广东欧珀移动通信有限公司 | Method and device for synchronous login of mobile terminal and a personal computer (PC) terminal |
CN103488932A (en) * | 2013-10-16 | 2014-01-01 | 重庆邮电大学 | Desktop security intercommunication system for mobile device and personal computer and implementation method thereof |
CN103488933A (en) * | 2013-09-27 | 2014-01-01 | 太仓苏易信息科技有限公司 | Non-contact type computer login protection system |
CN103516719A (en) * | 2012-06-27 | 2014-01-15 | Gn奈康有限公司 | Providing presence information in a personal communication system comprising an interface unit |
CN103684512A (en) * | 2012-09-19 | 2014-03-26 | Lg电子株式会社 | Mobile terminal and controlling method thereof |
CN103888265A (en) * | 2014-04-11 | 2014-06-25 | 上海博路信息技术有限公司 | Login system and method based on mobile terminal |
CN104009858A (en) * | 2013-02-26 | 2014-08-27 | 成都勤智数码科技股份有限公司 | Multilevel verification system based on safety management |
CN104105084A (en) * | 2013-04-15 | 2014-10-15 | 王方淇 | Information interaction method, terminal and information interaction system |
CN104992125A (en) * | 2015-06-30 | 2015-10-21 | 向岚 | Computer network security protection system |
CN105224848A (en) * | 2015-10-15 | 2016-01-06 | 京东方科技集团股份有限公司 | A kind of equipment authentication method, Apparatus and system |
CN105337937A (en) * | 2014-07-24 | 2016-02-17 | 小米科技有限责任公司 | Network verification method and device |
CN106411831A (en) * | 2016-03-11 | 2017-02-15 | 山东渔翁信息技术股份有限公司 | Office environment login system and method |
CN106716388A (en) * | 2014-09-24 | 2017-05-24 | 佳能株式会社 | Communication system, mobile terminal, method of controlling the mobile terminal, and storage medium |
CN110650110A (en) * | 2018-06-26 | 2020-01-03 | 深信服科技股份有限公司 | Login page identification method and related equipment |
CN112632526A (en) * | 2021-01-07 | 2021-04-09 | 复旦大学 | User password modeling and strength evaluation method based on comprehensive segmentation |
CN113556739A (en) * | 2020-04-01 | 2021-10-26 | 中国长城科技集团股份有限公司 | Computer system unlocking/locking control method and device based on Bluetooth |
CN117320007A (en) * | 2023-11-27 | 2023-12-29 | 北京时代亿信科技股份有限公司 | Office system control method and system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100492966C (en) * | 2004-11-26 | 2009-05-27 | 王小矿 | Identity certifying system based on intelligent card and dynamic coding |
CN1921386A (en) * | 2006-07-11 | 2007-02-28 | 钟权 | Method for realizing associator identity identification in intelligent communication network by using mobile phone number |
-
2007
- 2007-04-12 CN CN2007100394037A patent/CN101064535B/en not_active Expired - Fee Related
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101677442A (en) * | 2008-09-17 | 2010-03-24 | 艾威梯科技(北京)有限公司 | Method and equipment for automatically logging in application programs |
CN101826897A (en) * | 2010-05-12 | 2010-09-08 | 中兴通讯股份有限公司 | Method, device and system for realizing communication between mobile terminal and PC |
CN102624709A (en) * | 2012-02-27 | 2012-08-01 | 无锡华赛信息技术有限公司 | Divulgence prevention method based on Bluetooth for cloud architecture |
CN102685330A (en) * | 2012-05-15 | 2012-09-19 | 江苏中科梦兰电子科技有限公司 | Method for logging in operation system by taking cell phone as authentication tool |
CN103516719B (en) * | 2012-06-27 | 2017-05-31 | Gn奈康有限公司 | Method, the apparatus and system of existence information are provided in the PCS Personal Communications System including interface unit |
CN103516719A (en) * | 2012-06-27 | 2014-01-15 | Gn奈康有限公司 | Providing presence information in a personal communication system comprising an interface unit |
CN103684512A (en) * | 2012-09-19 | 2014-03-26 | Lg电子株式会社 | Mobile terminal and controlling method thereof |
CN102984149A (en) * | 2012-11-23 | 2013-03-20 | 广东欧珀移动通信有限公司 | Method and device for synchronous login of mobile terminal and a personal computer (PC) terminal |
CN102984149B (en) * | 2012-11-23 | 2015-10-28 | 广东欧珀移动通信有限公司 | A kind of mobile terminal holds synchronous login method and device with PC |
CN104009858A (en) * | 2013-02-26 | 2014-08-27 | 成都勤智数码科技股份有限公司 | Multilevel verification system based on safety management |
CN104105084A (en) * | 2013-04-15 | 2014-10-15 | 王方淇 | Information interaction method, terminal and information interaction system |
CN103488933A (en) * | 2013-09-27 | 2014-01-01 | 太仓苏易信息科技有限公司 | Non-contact type computer login protection system |
CN103488932A (en) * | 2013-10-16 | 2014-01-01 | 重庆邮电大学 | Desktop security intercommunication system for mobile device and personal computer and implementation method thereof |
CN103888265A (en) * | 2014-04-11 | 2014-06-25 | 上海博路信息技术有限公司 | Login system and method based on mobile terminal |
CN103888265B (en) * | 2014-04-11 | 2017-07-25 | 上海博路信息技术有限公司 | A kind of application login system and method based on mobile terminal |
CN105337937A (en) * | 2014-07-24 | 2016-02-17 | 小米科技有限责任公司 | Network verification method and device |
CN105337937B (en) * | 2014-07-24 | 2019-07-26 | 小米科技有限责任公司 | Network verification method, device and computer readable storage medium |
US11218617B2 (en) | 2014-09-24 | 2022-01-04 | Canon Kabushiki Kaisha | Communication system, mobile terminal, method of controlling the mobile terminal, and storage medium |
CN106716388A (en) * | 2014-09-24 | 2017-05-24 | 佳能株式会社 | Communication system, mobile terminal, method of controlling the mobile terminal, and storage medium |
US10225435B2 (en) | 2014-09-24 | 2019-03-05 | Canon Kabushiki Kaisha | Communication system, mobile terminal, method of controlling the mobile terminal, and storage medium |
US11700343B2 (en) | 2014-09-24 | 2023-07-11 | Canon Kabushiki Kaisha | Communication system, mobile terminal, method of controlling the mobile terminal, and storage medium |
US10609248B2 (en) | 2014-09-24 | 2020-03-31 | Canon Kabushiki Kaisha | Communication system, mobile terminal, method of controlling the mobile terminal, and storage medium |
CN104992125A (en) * | 2015-06-30 | 2015-10-21 | 向岚 | Computer network security protection system |
CN105224848A (en) * | 2015-10-15 | 2016-01-06 | 京东方科技集团股份有限公司 | A kind of equipment authentication method, Apparatus and system |
CN106411831A (en) * | 2016-03-11 | 2017-02-15 | 山东渔翁信息技术股份有限公司 | Office environment login system and method |
CN110650110A (en) * | 2018-06-26 | 2020-01-03 | 深信服科技股份有限公司 | Login page identification method and related equipment |
CN113556739A (en) * | 2020-04-01 | 2021-10-26 | 中国长城科技集团股份有限公司 | Computer system unlocking/locking control method and device based on Bluetooth |
CN113556739B (en) * | 2020-04-01 | 2024-03-22 | 中国长城科技集团股份有限公司 | Bluetooth-based computer system unlocking/locking control method and device |
CN112632526A (en) * | 2021-01-07 | 2021-04-09 | 复旦大学 | User password modeling and strength evaluation method based on comprehensive segmentation |
CN112632526B (en) * | 2021-01-07 | 2022-04-12 | 复旦大学 | User password modeling and strength evaluation method based on comprehensive segmentation |
CN117320007A (en) * | 2023-11-27 | 2023-12-29 | 北京时代亿信科技股份有限公司 | Office system control method and system |
CN117320007B (en) * | 2023-11-27 | 2024-02-09 | 北京时代亿信科技股份有限公司 | Office system control method and system |
Also Published As
Publication number | Publication date |
---|---|
CN101064535B (en) | 2011-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101064535B (en) | Intelligent authentication method and system based on close range wireless communication handset | |
Razouk et al. | A new security middleware architecture based on fog computing and cloud to support IoT constrained devices | |
CN100380356C (en) | Device authentication system | |
CN102047262B (en) | Authentication for distributed secure content management system | |
CN103607385B (en) | Method and apparatus for security detection based on browser | |
EP1339199A1 (en) | Dynamic user authentication | |
US20120324545A1 (en) | Automated security privilege setting for remote system users | |
CN103067338A (en) | Third party application centralized safety management method and system and corresponding communication system | |
CN1993921A (en) | Enhanced security using service provider authentication | |
Jaidhar | Enhanced mutual authentication scheme for cloud architecture | |
CN103546432A (en) | Method and system for realizing cross-domain jumping, browser and domain name servers | |
CN102868702B (en) | System login device and system login method | |
CN103825863B (en) | A kind of accounts management method and device | |
CN111027035A (en) | Multi-identity authentication method and system based on block chain | |
CN101083659A (en) | Security policy and environment for portable equipment | |
Mohsin et al. | Two factor vs multi-factor, an authentication battle in mobile cloud computing environments | |
CN101883106A (en) | Network access authentication method and server based on digital certificate | |
CN106982221A (en) | A kind of network authentication method, system and intelligent terminal | |
CN106534071A (en) | Internet-of-vehicles link security authentication method and system based on device whitelist management | |
CN113037736B (en) | Authentication method, device, system and computer storage medium | |
CN104883342A (en) | Account authority management system, account authority management method and device thereof | |
CN104917737B (en) | User account protection method and device | |
KR101133210B1 (en) | Mobile Authentication System and Central Control System | |
CN102202291B (en) | Card-free terminal, service access method and system thereof, terminal with card and bootstrapping server function (BSF) | |
WO2017153990A1 (en) | System and method for device authentication using hardware and software identifiers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20111207 Termination date: 20140412 |