CN101551837B - Method for switching user accounts and computer - Google Patents

Method for switching user accounts and computer Download PDF

Info

Publication number
CN101551837B
CN101551837B CN2008101030988A CN200810103098A CN101551837B CN 101551837 B CN101551837 B CN 101551837B CN 2008101030988 A CN2008101030988 A CN 2008101030988A CN 200810103098 A CN200810103098 A CN 200810103098A CN 101551837 B CN101551837 B CN 101551837B
Authority
CN
China
Prior art keywords
user account
module
user
information
biological information
Prior art date
Application number
CN2008101030988A
Other languages
Chinese (zh)
Other versions
CN101551837A (en
Inventor
徐琳
伍军
Original Assignee
联想(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 联想(北京)有限公司 filed Critical 联想(北京)有限公司
Priority to CN2008101030988A priority Critical patent/CN101551837B/en
Publication of CN101551837A publication Critical patent/CN101551837A/en
Application granted granted Critical
Publication of CN101551837B publication Critical patent/CN101551837B/en

Links

Abstract

The invention discloses a method for switching user accounts, solving the problem that the operating system is unsecured and the user operation is inconvenient. The method comprises the following steps: triggering a user account management module; obtaining biological information to be verified; comparing the biological information to be verified with preset verifying information; and controlling the switch of a user account from a low-right user account to a high-right user account by the user account management module if the biological information to be verified is the same as the preset verifying information. The invention also provides a computer capable of switching user account rights by shortcut keys on a keyboard or software triggering and combining the biological information, suchas fingerprints or figures, and the like so that a user wanting to intensively finish a lot of operations with high rights can rapidly switch the user account from the low-right user account to the h igh-right user account and can automatically switch the high-right user account to the low-right user account when the operations are finished, thereby greatly improving the efficiency for the user tooperate the computer.

Description

A kind of method of switching user accounts and a kind of computing machine
Technical field
The present invention relates to the computer security technique field, particularly relate to a kind of method and a kind of computing machine of switching user accounts.
Background technology
The safety problem of operating system becomes the problem that industry is more and more paid close attention to, and the developer of operating system takes the whole bag of tricks to improve the security of operating system.For example, on operating system Windows Vista of new generation, increased the user account control new security function of (User Account Control is called for short UAC).UAC can the user use a computer carry out setting of change system or install software etc. have influence on security of system, stability operation the time; Eject a dialog box; The prompting user import username and password, when the checking through after just allow the user proceed the operation.Like this, some Malwares just can't be as previous generation operating system Windows XP automatic acquisition administrator right, thereby reduce the possibility that rogue program is attacked.
But the shortcoming of UAC security control is the complicacy that has increased user's operation, has reduced service efficiency.Because if the user will use some operation that needs administrator right or software, Vista can eject dialog box and confirm inquiry, and requires input system keeper's number of the account and password.
Also have the method for a kind of Vista of use to be, the UAC control function of user's manual unlocking or shutoff operation system.Temporary close UAC when needs are done the higher operation of a large amount of level of securitys is when complete operation is opened UAC later on again.
But this mode also has problems: the first, and the switch motion more complicated of UAC; The second, for non-professional user, do not know to close UAC and can make things convenient for its operation, do not know how this closes and open UAC yet, therefore higher to customer requirements; The 3rd, the user is after closing UAC, if forget and open UAC, system is in does not have the state of protection, causes certain risk to system easily.
In sum, also there is not simple effective method at present, promptly user-friendly, can guarantee the security of operating system again.
Summary of the invention
Technical matters to be solved by this invention provides a kind of method and a kind of computing machine of switching user accounts, with solve can also be user-friendly when guaranteeing operating system security problem.
For solving the problems of the technologies described above,, the invention discloses following technical scheme according to specific embodiment provided by the invention:
A kind of method of switching user accounts comprises:
Trigger user account management module;
Obtain biological information to be verified;
Said biological information to be verified and predefined authorization information are compared, obtain a comparative result;
When said comparative result represented that said security information is identical with said information to be verified, said user account supervisory routine was switched the user account of paramount authority from the user account of low rights based on said comparative result control user account.
Preferably, said biological information to be verified is the figure information that the finger print information that obtains through finger print input device or cam device obtain.
Preferably, said triggering is to trigger or software trigger through keyboard shortcut.
Preferably,,, the user account of low rights also comprises: detect current operation task, produce a testing result after switching the user account of paramount authority at said user account; When said testing result represented that said current operation task is accomplished, then said user account management module control user account switched back the user account of said low rights from the user account of said high authority.
Preferably, after the said triggering user account management module, also comprise: judge whether apparatus for obtaining oxygen-saturation information loads completion, produce a judgement information; When the said apparatus for obtaining oxygen-saturation information of said judgement information representation does not load, load said apparatus for obtaining oxygen-saturation information.
Preferably, also comprise: indicate the state of active user's account, and upgrade said indication information according to the switching of said account status.
A kind of computing machine comprises:
Trigger module is used to produce a trigger command;
The biological information acquisition module is used to obtain biological information to be verified;
The biological information identification module is connected with said biological information acquisition module, is used for said biological information to be verified and predefined authorization information are compared, and obtains a comparative result;
User account management module is connected with said trigger module, said biological information acquisition module and said biological information identification module respectively, is used for receiving said comparative result based on said trigger command from said biological information identification module; When said comparative result represented that said security information is identical with said biological information to be verified, the control user account switched the user account of paramount authority from the user account of low rights.
Preferably, said biological information acquisition module is specially finger print input device or cam device.
Preferably, said trigger module is specially keyboard input devices or software trigger module.
Preferably, said computing machine also comprises: monitoring module, be connected with said user account management module, and be used at said user account after the user account of low rights switches the user account of paramount authority, detecting current operation task, produce a testing result; When said testing result represented that said current operation task is accomplished, said user account management module control user account switched back the user account of said low rights from the user account of said high authority.
Preferably, said computing machine also comprises: the state indicating module is used to indicate the state of active user's account, and according to said user account management module said indication information is upgraded in the switching of account status.
According to specific embodiment provided by the invention, the invention discloses following technique effect:
At first; The method of a kind of switching user accounts provided by the invention; Through shortcut on the keyboard or software trigger; And combine biological informations such as fingerprint or figure information just can carry out the switching of user account authority, and make the user when wanting to concentrate the more operation that needs higher-rights of completion, can promptly the user account of operating system be switched the user account of paramount authority from the user account of low rights; When user's complete operation later on again can be automatically switches back the user account of low rights with the user account of operating system from the user account of high authority, improved the efficient of user's operational computations machine greatly.
When the user is computed, all only have the authority of domestic consumer, the power of domestic consumer is limited.When if the software code of virus or malice will be installed or destroy in user's operating system, the authority of this domestic consumer of its meeting invoke user is installed so, because the authority of domestic consumer can not install software.When the user needs install software perhaps to change being provided with of operating system; Switch to the promoting of authority of the such operating system of user account of a high authority through said method; And the backstage of operating system can be closed, so the whole process of said method all is safe.
Secondly, the present invention combines fingerprint recognition or portrait recognition technology with keyboard shortcut (or software), not only easy to operate, and uses fingerprint or these biological characteristics of portrait, and is unique and be difficult to forge, so use this programme is as safe as a house.
Once more, the operating system user account is switched high user account to authority from the user account of low rights, promptly start monitoring user's operation when detecting the method for user through shortcut (or software) adding fingerprint identification or Identification of Images; When monitoring after user operation is finished; Find that perhaps the user is not when a very long time operates; Automatically the user account with operating system switches back the user account of low rights from the user account of high authority, thereby has guaranteed the security of operating system.
At last, this programme not only can be used for the control of operating system security, can also be used for other to the safety operation that has certain requirements.For example, open the hard disk of an encryption, the storage area of perhaps encrypting on the access hard disk etc.
Description of drawings
Fig. 1 is the method flow diagram of the embodiment of the invention one said a kind of switching user accounts;
Fig. 2 is the structural drawing of the embodiment of the invention one said a kind of computing machine;
Fig. 3 is the structural drawing of the embodiment of the invention two said a kind of computing machines;
Fig. 4 is the user account changing method process flow diagram of corresponding diagram 3 said computing machines;
Fig. 5 is to the improved changing method process flow diagram of Fig. 4;
Fig. 6 is the structural drawing of the embodiment of the invention three said a kind of computing machines.
Embodiment
For make above-mentioned purpose of the present invention, feature and advantage can be more obviously understandable, below in conjunction with accompanying drawing and embodiment the present invention done further detailed explanation.
To present safety of computer operating system problem; The invention provides a kind of method of switching user accounts; Through fingerprint recognition or portrait recognition technology are combined with keyboard shortcut (or software), can be when guaranteeing operating system security, user friendly operation.And said method not only can be used for the control of operating system security, can also be used for other to the safety operation that has certain requirements.For example, open the hard disk of an encryption, the storage area of perhaps encrypting on the access hard disk etc.
With reference to Fig. 1, be the method flow diagram of the embodiment of the invention one said a kind of switching user accounts.
Step 101 triggers user account management module;
User account management module is used for the operating right to operating system of user account is switched, and user account management module can be passed through hardware trigger, and for example the keyboard shortcut mode also can be passed through software trigger.
Step 102 is obtained biological information to be verified;
Said biological information is meant the biological characteristic with uniqueness, and for example therefore the information that can't forge such as fingerprint, portrait, vocal print can be used as the authorization information that user account switches.If said biological information is a finger print information, then obtain through finger print input device; If said biological information is a portrait information, then obtain through cam device.
Step 103 compares said biological information to be verified and predefined security information;
Step 104, if identical, then said user account management module control user account switches the user account of paramount authority from the user account of low rights.If different, then said blocked operation failure.
Preferably; At said user account after the user account of low rights switches the user account of paramount authority; Said method also comprises: detect current operation task; When said current operation task was accomplished, said user account management module control user account switched back the user account of said low rights from the user account of said high authority.
To said method, the embodiment of the invention also provides a kind of computing machine.With reference to Fig. 2, be the structural drawing of said computing machine.Said computing machine mainly comprises trigger module 201, biological information acquisition module 202, biological information identification module 203, user account management module 204.Wherein, biological information acquisition module 202 is connected with biological information identification module 203, and user account management module 204 is connected respectively with trigger module 201, biological information acquisition module 202 and biological information identification module 203 respectively.
Said trigger module 201 is used to trigger the order of user account management module; Biological information acquisition module 202 is used to obtain biological information to be verified; Biological information identification module 203 is used for said biological information to be verified and predefined authorization information are compared; If identical, then user account management module 204 is used for receiving comparative result based on trigger command from the biological information identification module, and switches the user account of paramount authority from the user account of low rights according to comparative result control user account.
Wherein, if said biological information is a finger print information, then said biological information acquisition module 202 is a finger print input device; If said biological information is a portrait information, then said biological information acquisition module 202 is a cam device.Said trigger module 201 is keyboard input devices or software trigger module.
Preferably; Said computing machine can also comprise monitoring module; Be used for when said user account after the user account of low rights switches the user account of paramount authority, detect current operation task, when said current operation task is accomplished; Notify said user account management module, said user account management module control user account switches back the user account of said low rights from the user account of said high authority.
To be that example describes below with the UAC security control of computer operating system.The embodiment of the invention two provides a kind of computing machine, and said computing machine mainly comprises the part that relates to the UAC function in hardware input equipment, Drive Layer, application layer and the computer operating system.
With reference to Fig. 3, the structural drawing of the embodiment of the invention two said a kind of computing machines.Embodiment two described computing machines mainly combine fingerprint recognition to come the switching to the user account of operating system different operation authority through keyboard shortcut.
As shown in the figure, in the present embodiment, said hardware input equipment comprises keyboard 11 and EC (EmbeddedController; Embedded controller) 12; Relevant hardware drives---and VPC (Virtual PC, virtual machine) driver module 13 is positioned at Drive Layer, and UAC administration module 14 is positioned at application layer.Keyboard 11 and EC 12 mutual communication, EC 12 and VPC driver module 13 mutual communication, VPC driver module 13 and UAC administration module 14 mutual communication, the UAC functional module mutual communication in UAC administration module 14 and the operating system.In addition, VPC driver module 13 can also transmit information mutually with the UAC functional module in the operating system.
Keyboard 11 in the hardware input equipment is mainly used in the input of shortcut, and said shortcut is predefined button or key combination.The EC 12 that links to each other with keyboard 11 can detect the key information of user through keyboard 11 inputs; When detecting key information that keyboard 11 imported when identical with predefined shortcut, EC 12 can report the UAC administration module 14 of giving upper level applications through VPC driver module 13.
VPC driver module 13 is between hardware and upper level applications, and the input information that is used to transmit keyboard 11 also can send the instruction of UAC administration module 14 and accomplish certain operations to hardware to UAC administration module 14.
Said hardware input equipment also comprises finger print input device 21, with said finger print input device 21 supporting be fingerprint driver module 22, application layer also comprises fingerprint identification module 23.
Said finger print input device 21 is mainly used in the finger print information of gathering the user, mainly contains two kinds of push type and slidingtypes at present.Fingerprint driver module 22 also is positioned at Drive Layer, is used for the finger print information that finger print input device 21 is gathered is passed to fingerprint identification module 23, also can the instruction of fingerprint identification module 23 be sent to finger print input device 21 and accomplish certain operations.Fingerprint identification module 23 is mainly used in to be handled the fingerprint image that collects through finger print input device 21, imports the checking coupling of fingerprint and fingerprint template, and will verify that the result feeds back to UAC administration module 14 etc.
UAC administration module 14 is hard core control modules of said device, is used to realize the switching to the user account of operating system different operation authority.UAC administration module 14 not only receives shortcut information through VPC driver module 13, also links to each other with fingerprint identification module 23, is used for communicating by letter with fingerprint identification module 23 obtaining the fingerprint authentication result.If input fingerprint and fingerprint template are complementary, then UAC administration module 14 receives the checking message of successful.UAC administration module 14 shortcut be pressed and the fingerprint authentication case of successful under, just can carry out switching to the user account of operating system different operation authority; Otherwise when fingerprint authentication was failed, UAC administration module 14 sent the prompting message of fingerprint mistake.
Preferably, said UAC administration module 14 also can obtain whether ready information of finger print input device to fingerprint identification module 23 after receiving the message that VPC driver module 13 transmission is come, if be ready to, then continue to obtain said fingerprint authentication result; If be not ready to, then notify fingerprint identification module 23 to open finger print input device 21.Fingerprint identification module 23 is opened finger print input devices 21 through fingerprint driver module 22, and after the finger print information that receives verified, success or failure is sent to UAC administration module 14.
Preferably, said computing machine also is provided with UAC indicator 15, is used to indicate the user account to the operating system different operation authority.Said indicator 15 can be a pilot lamp on the computing machine, also can be a small icon on the computer task bar.Through said indicator 15, the user can check easily that which of the user account of operating system different operation authority present user account be to.Said indicator 15 directly and UAC administration modules 14, the show state of the indicator that can upgrade in time according to change to the user account of operating system different operation authority.
To computing machine shown in Figure 3, the invention provides a kind of embodiment of switching user accounts.With reference to Fig. 4, be the process flow diagram of said method.
Step 401, the user pushes button on keyboard or key combination on the other hand, and the another hand is imported finger print information with slip or the mode of pushing on the finger print input device of computing machine simultaneously.
Step 402, whether the key information that the EC that links to each other with keyboard detects user's input is identical with predefined shortcut, if identical, then send message and drives to VPC, continues step 403; If different, then withdraw from UAC and switch.Simultaneously, finger print input device also can send to the fingerprint driving to user's input fingerprint.
Step 403, VPC drives the message informing UAC manager that will receive shortcut, and fingerprint drives said input fingerprint is sent to fingerprint identification module.
Step 404, the UAC manager is communicated by letter with said fingerprint identification module, obtains whether message of successful of fingerprint authentication.And fingerprint identification module is after receiving user's input fingerprint, and whether the finger print information of the current input of checking user is complementary with the fingerprint template of registered in advance, if coupling is then sent success message to the UAC manager, and continues execution in step 405; If do not match, then send failed message, and continue execution in step 407 to the UAC manager.
Step 405, if the fingerprint authentication success, then the UAC manager is controlled the user account that the user account of operating system is switched paramount authority from the user account of low rights based on the checking message of successful
Preferred steps 406, the UAC manager upgrades the state of UAC indicator, and said indicator is UAC pilot lamp or UAC icon.
Step 407, if the fingerprint authentication failure, then the UAC manager ejects the fingerprint mistake that prompting message notifies the user to import, this change action failure.
For example; When the UAC control function of Windows vista is open mode; If the user needs the operation of higher-rights, for example install software, open registration table, deleted file or the like when operation, just need press shortcut and import fingerprint; To the user account of the different control authorities of operating system be switched, the user account that is about to operating system in this example switches the user account of paramount authority from the user account of low rights.At this moment, UAC will can frequently not eject the information of affirmation and want the user to confirm, user's operating efficiency improves greatly after saving these to confirm step.When the user is computed, all only have the authority of domestic consumer, the power of domestic consumer is limited.When if the software code of virus or malice will be installed or destroy in user's operating system, the authority of this domestic consumer of its meeting invoke user is installed so, because the authority of domestic consumer can not install software.When the user needs install software perhaps to change being provided with of operating system; Switch to the promoting of authority of the such operating system of user account of a high authority through said method; And the backstage of operating system can be closed, so the whole process of said method all is safe.And all these operations all are the operations that the user did through safety verification, therefore can not impact security of system.
Preferably, the user account of operating system is switched the user account of paramount authority from the user account of low rights, computer system promptly starts the monitoring to user's operation task.When monitoring after user operation is finished; Find that perhaps the user is not when a very long time operates; Automatically the user account with operating system switches back the user account of low rights from the user account of high authority, thereby has guaranteed the security of operating system.
Preferably, comprise also in the said process that is detected a whether ready step of finger print input device.With reference to Fig. 5, be to the improved changing method process flow diagram of Fig. 4.
Step 501~503 are identical with above-mentioned steps 401~403.
Step 504, UAC manager at first can be obtained whether ready message of finger print input device through fingerprint identification module, if be ready to, then continue to carry out according to step 404, promptly jump to the step 507 of present embodiment; If the user is in step 501 input fingerprint, this finger print input device is not opened, and then notifies fingerprint identification module to open finger print input device, can continue to carry out preferred steps 505 then, direct execution in step 506 yet.
Preferred steps 505, for improving the security of system, after fingerprint identification module drives opening device through fingerprint, notice UAC manager, the UAC manager notifies the user in preset time section (for example 5 seconds), to re-enter fingerprint, and waits for for 5 seconds.If overtime, then withdraw from.
Step 506, fingerprint drives the finger print information that detects user's input, and said information is notified to fingerprint identification module.
Step 507~510 are identical with above-mentioned steps 404~407.
Equally; The user account of operating system is switched the user account of paramount authority as the user from the user account of low rights; Computer system promptly starts the monitoring to user's operation; After user's complete operation task, automatically the user account of operating system is switched back the user account of low rights from the user account of high authority, with protection system safety.
The present invention can also combine the keyboard input and realize the UAC handoff functionality with Identification of Images.With reference to Fig. 6, be the structural drawing of the embodiment of the invention three said a kind of computing machines.Said computer organization and Fig. 3 are similar, not only comprise keyboard 11, EC 12, VPC driver module 13 and UAC administration module 14, also comprise cam device 31, webcam driver module 32 and Identification of Images module 33.
Wherein, cam device 31 is mainly used in the figure information of gathering the user.Webcam driver module 32 is used for figure information is passed to Identification of Images module 33, also can the instruction of Identification of Images module 33 be sent to cam device 31 and accomplish certain operations.Identification of Images module 33 is used to verify that whether said figure information is complementary with the portrait template of registered in advance, and will verify that the result sends to said UAC administration module.
Function and Fig. 3 of device shown in Figure 6 are similar, and be same, also similar with the method that combines fingerprint recognition in conjunction with the method for controlling security flow process of Identification of Images, fingerprint recognition is replaced by Identification of Images gets final product, and is not described in detail in this.
The above-mentioned security control mode that fingerprint recognition or portrait recognition technology are combined with shortcut, when the user wants the control authority of switching operating system, when only needing a hand to press shortcut, other hand input fingerprint; If perhaps use the mode of shortcut+Identification of Images, the user aims at camera head with face when only need press shortcut and gets final product.All the other operations are all accomplished by computing machine provided by the invention, and therefore operation is very convenient.And, use fingerprint or these biological characteristics of portrait, unique and be difficult to forge, so use the present invention as safe as a house.
More than to method and a kind of computing machine of a kind of switching user accounts provided by the present invention; Carried out detailed introduction; Used concrete example among this paper principle of the present invention and embodiment are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, part all can change on embodiment and range of application.In sum, this description should not be construed as limitation of the present invention.

Claims (9)

1. the method for a switching user accounts is characterized in that, comprising:
Trigger user account management module;
Obtain biological information to be verified;
Said biological information to be verified and predefined security information are compared, obtain a comparative result:
When said comparative result represented that said security information is identical with said biological information to be verified, said user account management module was switched the user account of paramount authority from the user account of low rights based on said comparative result control user account;
Detect current operation task, produce a testing result;
When said testing result represented that said current operation task is accomplished, said user account management module control user account switched back the user account of said low rights from the user account of said high authority.
2. method according to claim 1 is characterized in that: said biological information to be verified is the figure information that the finger print information that obtains through finger print input device or cam device obtain.
3. method according to claim 1 is characterized in that: said triggering is to trigger or software trigger through keyboard shortcut.
4. method according to claim 1 is characterized in that, after the said triggering user account management module, also comprises:
Judge whether apparatus for obtaining oxygen-saturation information loads completion, produce a judgement information;
When the said apparatus for obtaining oxygen-saturation information of said judgement information representation does not load, load said apparatus for obtaining oxygen-saturation information.
5. method according to claim 1 is characterized in that, also comprises:
Indicate the state of active user's account, and upgrade said indication information according to the switching of said account status.
6. a computing machine is characterized in that, comprising:
Trigger module is used to produce a trigger command;
The biological information acquisition module is used to obtain biological information to be verified;
The biological information identification module is connected with said biological information acquisition module, is used for said biological information to be verified and predefined security information are compared, and obtains a comparative result;
User account management module is connected with said trigger module, said biological information acquisition module and said biological information identification module respectively, is used for receiving said comparative result based on said trigger command from said biological information identification module; When said comparative result represented that said security information is identical with said biological information to be verified, the control user account switched the user account of paramount authority from the user account of low rights;
Monitoring module is connected with said user account management module, is used at said user account after the user account of low rights switches the user account of paramount authority, detecting current operation task, produces a testing result; When said testing result represented that said current operation task is accomplished, said user account management module control user account switched back the user account of said low rights from the user account of said high authority.
7. computing machine according to claim 6 is characterized in that: said biological information acquisition module is specially finger print input device or cam device.
8. computing machine according to claim 6 is characterized in that: said trigger module is specially keyboard input devices or software trigger module.
9. computing machine according to claim 6 is characterized in that, also comprises:
The state indicating module is used to indicate the state of active user's account, and according to said user account management module said indication information is upgraded in the switching of account status.
CN2008101030988A 2008-03-31 2008-03-31 Method for switching user accounts and computer CN101551837B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008101030988A CN101551837B (en) 2008-03-31 2008-03-31 Method for switching user accounts and computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008101030988A CN101551837B (en) 2008-03-31 2008-03-31 Method for switching user accounts and computer

Publications (2)

Publication Number Publication Date
CN101551837A CN101551837A (en) 2009-10-07
CN101551837B true CN101551837B (en) 2012-01-25

Family

ID=41156082

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008101030988A CN101551837B (en) 2008-03-31 2008-03-31 Method for switching user accounts and computer

Country Status (1)

Country Link
CN (1) CN101551837B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103218557A (en) * 2013-04-16 2013-07-24 深圳市中兴移动通信有限公司 Biological-recognition-based system theme recognition method and device
CN104346119B (en) 2013-08-09 2017-12-29 联想(北京)有限公司 The method and electronic equipment of display
CN104199697A (en) * 2014-08-27 2014-12-10 北京金山安全软件有限公司 Pre-installed software management method, device and terminal
CN104463025B (en) * 2014-12-19 2018-04-10 宇龙计算机通信科技(深圳)有限公司 System switching method, system switching device and terminal
CN106302342B (en) * 2015-05-26 2020-10-27 北京小米移动软件有限公司 User account switching method and device
CN105635093B (en) * 2015-05-28 2019-06-11 宇龙计算机通信科技(深圳)有限公司 A kind of access method, wearable smart machine, method for authenticating and terminal
CN105389203B (en) 2015-10-19 2017-11-17 广东欧珀移动通信有限公司 A kind of call method of fingerprint identification device, device and mobile terminal
CN105808999A (en) * 2016-03-03 2016-07-27 北京小米移动软件有限公司 Permission determining method and device
CN105812375A (en) * 2016-03-31 2016-07-27 中国银联股份有限公司 Payment authentication device and payment authentication method
CN107277408A (en) * 2017-06-23 2017-10-20 成都合能智发科技有限公司 Crime scene investigation device control method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001009845A1 (en) * 1999-08-03 2001-02-08 Siemens Aktiengesellschaft Biometric recognition method
CN1929382A (en) * 2006-09-28 2007-03-14 中山大学 Device and method for control digital household electrical appliance calling limits of authority
CN101005353A (en) * 2006-12-29 2007-07-25 北京飞天诚信科技有限公司 Intelligent key device for realizing positioning and navigation function

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001009845A1 (en) * 1999-08-03 2001-02-08 Siemens Aktiengesellschaft Biometric recognition method
CN1929382A (en) * 2006-09-28 2007-03-14 中山大学 Device and method for control digital household electrical appliance calling limits of authority
CN101005353A (en) * 2006-12-29 2007-07-25 北京飞天诚信科技有限公司 Intelligent key device for realizing positioning and navigation function

Also Published As

Publication number Publication date
CN101551837A (en) 2009-10-07

Similar Documents

Publication Publication Date Title
US10467832B2 (en) Configurable digital badge holder
US9262616B2 (en) Simplified multi-factor authentication
US9372977B2 (en) Screen unlocking method, device and terminal
US9787393B2 (en) Method for realizing bluetooth-binding between smart key device and mobile device
US7000249B2 (en) Pre-boot authentication system
CN105844749B (en) A kind of Automobile handset system for unlocking and its unlocking method
EP2827279A1 (en) Electro-mechanic USB locking device
US6070240A (en) Computer access control
EP2658302B1 (en) Method, apparatus, and system for password control
US9769161B2 (en) Event driven second factor credential authentication
JP4086740B2 (en) Terminal user monitoring system
US8561138B2 (en) System and method to provide added security to a platform using locality-based data
US7797729B2 (en) Pre-boot authentication system
CN102693381B (en) Method, device and system for anti-theft of portable computer equipment
US7424611B2 (en) Authentication system and method
US20130125218A1 (en) Method, apparatus and system for remote management of mobile devices
US8183980B2 (en) Device authentication using a unidirectional protocol
CN103838992A (en) Fingerprint identifying method and terminal
CN103400434B (en) The control method of sound state coded lock and control device
US20080148350A1 (en) System and method for implementing security features and policies between paired computing devices
US20040199769A1 (en) Provision of commands to computing apparatus
CN101159551B (en) Multifunctional information safety equipment and method of use thereof
CN101719826B (en) Dynamic token having function of updating seed key and updating method for seed key thereof
CN101901318B (en) Trusted hardware equipment and using method thereof
US9563794B2 (en) Method for upgrading RFID readers in situ

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant