CN105959277A - Method of locking/unlocking computer screen based on NFC terminal - Google Patents

Method of locking/unlocking computer screen based on NFC terminal Download PDF

Info

Publication number
CN105959277A
CN105959277A CN201610268254.0A CN201610268254A CN105959277A CN 105959277 A CN105959277 A CN 105959277A CN 201610268254 A CN201610268254 A CN 201610268254A CN 105959277 A CN105959277 A CN 105959277A
Authority
CN
China
Prior art keywords
steps
screen
enter
module
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610268254.0A
Other languages
Chinese (zh)
Inventor
梁效宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SICHUAN XLY INFORMATION SAFETY TECHNOLOGY Co Ltd
Original Assignee
SICHUAN XLY INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SICHUAN XLY INFORMATION SAFETY TECHNOLOGY Co Ltd filed Critical SICHUAN XLY INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority to CN201610268254.0A priority Critical patent/CN105959277A/en
Publication of CN105959277A publication Critical patent/CN105959277A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The invention discloses a method of locking/unlocking computer screen based on NFC terminal, comprising the following steps: 101) connecting an NFC reader; 102) setting up a local server; 103) binding an NFC terminal; 104) accessing information configured by a user; 105) establishing a cloud server; and 106) initiating the locking/unlocking of screen. According to the invention, the method has following advantages: 1) NFC terminal used as a key to locking/unlocking a PC screen; when it is used to unlock, all a user needs to do is put the NFC terminal close to a computer NFC recognizer; with it, the screen becomes unlocked. 2) extra layers of security protection to make up loopholes facing computer safety and convenient operations; 3) availability of emergency mode for more secure, more convenient identity identification and computer unlocking; 4) using an active protection mode for the system, and based on used scenes, the protection is set to be automatic, hidden in a bottom layer seldom felt by the user, so that protection becomes silent.

Description

A kind of method based on NFC terminal lock locking/unlocking computer screen
Technical field
The present invention relates to field of information security technology, particularly to one based on NFC terminal lock locking/unlocking electricity The method of brain screen.
Background technology
At present when using PC, it is frequently encountered and needs situation away from keyboard.General user can be straight Connect and leave, will not screen locking, now, be easiest to occur computer data stolen, destroyed, cause individual or public affairs Privacy and the secret of department are revealed;Some user can use Windows or other related softwares, hard Part mode, lock-screen.
But all there are the following problems:
Use software scenario: must manually input password or drafting the unlocking pattern could unlock screen, Troublesome poeration.And if password and locking pattern arrange excessively simple, are easily cracked;If it is the most complicated, The memory cost of user is the highest, is also easy to forget;
Hardware is used to make scheme: majority Appropriate application stock assets user of postponing cannot use habit Used, use learning cost huge;
Only one layer locking protection, it is impossible to meet the demand of user Geng Gao safety.
The involved part technical term of the present invention:
NFC (Near Field Communication, near-field communication): be the radio skill of a kind of short distance high frequency Art, the compatible equipment in 13.56MHz frequency with 20 cm distance is identified and data exchange.NFC There is following two mode of operation.
Mode card (Card emulation): this pattern is the most just comparable to one and uses RFID technique IC-card.Can substitute substantial amounts of IC-card (including the credit card) occasion market swipe the card, mass transit card, gate inhibition Control, ticket, admission ticket etc..Under this kind of mode, there is a great advantage, that is, card is by non- The RF territory of contact card reader powers, even if host's equipment (such as mobile phone) does not has electricity to work.
Ad hoc mode (P2P mode): this pattern and infrared ray are similar, can be used for data exchange, Simply transmission range is shorter, and transmission creates speed, transmission speed the most hurry up, (bluetooth also class low in energy consumption Like).By two linking of devices possessing NFC function, data point-to-point transmission can be realized, as down-load music, Exchange picture or synchronizer address book.
Summary of the invention
The present invention is directed to the defect of prior art, it is provided that a kind of based on NFC terminal lock locking/unlocking computer screen The method of curtain, can effectively solve the problem that the problem that above-mentioned prior art exists.
A kind of method based on NFC terminal lock locking/unlocking computer screen, comprises the following steps:
101: connect NFC reader, described NFC reader includes: identification module, processing module, Communication module, radio-frequency antenna;
102: set up local service end, described local service end includes: memory module, authentication module, screen Curtain locking module, mouse-keyboard monitoring module, time monitoring module;
103: connect NFC terminal and NFC reader, obtain NFC terminal ID and terminal uniquely identifies Number information, after encryption, writes local service end memory module;
104: obtaining information-setting by user, then encryption is stored in the memory module of local service end;Described Information-setting by user includes: urgent password, safe email, lock screen automatically time, secondary verification password and the Tripartite authorizes account;
105: set up cloud server terminal, cloud server terminal is used for encrypting in storage 104 steps, the peace of user setup Full mailbox and user computer identifier information;
When cloud server terminal obtain user side send the information that forgets Password time, it is judged that confirm user, then to The safe email set is sent out the envelope mail with the identifying code resetting urgent password;Identifying code obtains checking By rear, the screen locking module of cloud server terminal notice local service end unlocks screen, and memory module is deleted tight Anxious password;
106: enable screen locking/unblock.
As preferably, in described step 101, identification module is for periodically at mode card and ad hoc mode Between switch over, under mode card, identify the ID of the NFC terminal of analog radio frequency card and terminal only One identifier;Under ad hoc mode, identify ID and the terminal unique identifier of NFC terminal;
Described processing module is for being converted into data signal by the ID recognized and terminal unique identifier;
Described communication module for being sent to local service end screen lock by the digital signal that processing module exports Cover half block;
Described radio-frequency antenna is used for using 13.56MHz frequency, is mainly used in sensing NFC terminal and transmits ID and the analogue signal of terminal unique identifier.
As preferably, memory module described in described step 102 is used for encrypting storage NFC terminal ID and end End unique identifier information, the urgent password of user setup and safe email, third party's account of user's binding Etc. information, and obtain high in the clouds instruction when being necessary, revise relevant information;
Described authentication module is for obtaining the information that NFC reader communication module transmits, with storage mould Identity information reserved in block is compared, and provides judged result;
Described screen locking module is used for obtaining window screen locking authority, sends screen locking, unlocks instruction;
Described mouse-keyboard monitoring module is used for monitoring mouse-keyboard activity situation;
Described time monitoring module is idle for monitoring the time after a certain instruction performs;Exceed Preset Time long Degree, sends instruction.
As preferably, in described step 104, urgent password is for cannot be carried out the situation of NFC terminal checking Under, unlock screen;
In the case of safe email is used for forgetting urgent password, obtains safety verification code by mailbox and carry out screen-unblocking Curtain, and reset urgent password;
Locking screen automatically the mouse-keyboard free time without operation of time user permission, overtime, by automatically Screen locking;
Secondary verification password testing after the NFC terminal of the user setup of higher demand for security is verified Card password;
Third party authorizes account to be used for user by binding other open third party's accounts, realizes third party Account mandate unlocks.
As preferably, the detailed step of described step 106 is as follows:
201: during start, start screen locking;
202: read NFC terminal information, by NFC reader, read NFC terminal ID and terminal Unique identifier;
203: in the NFC terminal information that will read in 202, with local service end memory module, information is entered Row comparison;It is verified, then enters 204 steps;Checking is not passed through, then enter 205 steps;
204: obtain user's configuration information before this, if it has, then enter 213 steps;If it is not, Enter 212 steps;
205: start local service end, carry out third party's account binding validatation;If binding, then enter 206 Step;If unbound, then enter 207 steps;
206: show interested third party account logentry, if barcode scanning then shows Quick Response Code, if Account number cipher input logs in, then show user name Password Input frame and associated verification Password Input frame;Input 208 steps are entered after one-tenth;
207: show urgent Password Input frame, enter 209 steps;
208: by third party's account open platform, checking authorizes;Mandate is passed through, then enter 204 steps; Do not pass through, then enter 207 steps;
209: start local service end authentication module, checking that the urgent password got is compared;Test Card passes through, then enter 204 steps;Checking is not passed through, then enter 210 steps;
210: obtain user computer identifier, by cloud server terminal, send safety verification code to user computer The appointment mailbox that identifier is corresponding;211 steps are entered after completing;
211: the safety verification code of checking local service end subscriber input is the truest, is verified, then enters Enter 204 steps;Checking is not passed through, then enter 201 steps;
212: local service end screen locking module obtains and unlocks instruction, unlocks screen;
213: obtain the two-pass cipher of user's input, enter 214 steps;
214: the two-pass cipher of checking local service end subscriber input is the truest, is verified, then enters 212 steps;Checking is not passed through, then enter 201 steps;
215: judge user's whether manual locking computer screen, if it is, enter 216 steps;If it does not, Enter 217 steps;
216: start local service end screen locking module, lock-screen;
217: enable local service end mouse-keyboard monitoring module: monitor mouse-keyboard activity situation;If There is operation, then enter 218 steps;Without operation, then enter 219 steps;
218: keep screen not lock-out state;
219: enable local service end time monitoring module: if mouse-keyboard silence period length not less than Predetermined time period, enters 218 steps;If it does, enter 216 steps.
Compared with prior art it is an advantage of the current invention that:
1. using NFC terminal (such as the smart mobile phone of band NFC function) as lock locking/unlocking PC screen The key of curtain: when using for the first time, NFC terminal is bound with computer;During unblock, user has only to By NFC terminal near computer NFC evaluator, so that it may be unlocked the operation of screen;
2., on above protection, increase multi-level safety protective layer, such as third party's account authority checking, secondary Password authentification etc.:
Third party's account authority checking: use third party's account mandate to log in and carry out secondary identity authentication;
Two-pass cipher is verified: after being verified by NFC terminal, carry out preset password checking;
These safety protective layers compensate for NFC terminal lose, stolen when, computer security defence Leak;And using third party's account mandate to log in and carry out authentication, operation is same convenient.
3. offer emergency mode is safer, more convenient carries out authentication and unlocks computer.
Urgent password/safe email is set: convenient lose, stolen etc. under special emergency in NFC terminal, Also computer can be unlocked safely.
4. use system actively protected mode, according to the scene used, protection setting is become automatically, is hidden in User's perception less than bottom, accomplish to protect noiseless.
Accompanying drawing explanation
Fig. 1 is the main flow chart of the embodiment of the present invention;
Fig. 2 is the detail flowchart of step 106 in the embodiment of the present invention.
Detailed description of the invention
For making the purpose of the present invention, technical scheme and advantage clearer, by the following examples, to this Invention is described in further details.
As it is shown in figure 1, a kind of method based on NFC terminal lock locking/unlocking computer screen, including following step Rapid:
101: connect NFC reader, described NFC reader includes: identification module, processing module, Communication module, radio-frequency antenna;
Described identification module: periodically at mode card (Card emulation) and ad hoc mode (P2P Mode) switch between.Under mode card (Card emulation), identify analog radio frequency card The ID of NFC terminal and terminal unique identifier;Under ad hoc mode (P2P mode), identify The ID of NFC terminal and terminal unique identifier;
Described processing module: the ID recognized and terminal unique identifier are converted into data signal;
Described communication module: the digital signal that processing module exports is sent to local service end screen locking mould Block;
Described radio-frequency antenna: use 13.56MHz frequency, is mainly used in sensing what NFC terminal transmitted ID and the analogue signal of terminal unique identifier.
102: set up local service end, described local service end includes: memory module, authentication module, screen Curtain locking module, mouse-keyboard monitoring module, time monitoring module;
Described memory module: encryption storage NFC terminal ID and terminal unique identifier information, user setup Urgent password and safe email, the information such as third party's account of user's binding, and obtain when being necessary High in the clouds instructs, and revises relevant information;
Described authentication module: obtain the information that NFC reader communication module transmits, with memory module In reserved identity information compare, provide judged result;
Described screen locking module: obtain window screen locking authority, sends screen locking, unlocks instruction;
Described mouse-keyboard monitoring module: monitoring mouse-keyboard activity situation;
Described time monitoring module: monitor the time after a certain instruction performs idle;Exceed predetermined time period, Send instruction.
103: binding NFC terminal.
Connect NFC terminal and NFC reader, obtain NFC terminal ID and terminal unique identifier information, After encryption, write local service end memory module;
104: obtaining information-setting by user, then encryption is stored in the memory module of local service end;
Described information-setting by user includes:
Urgent password: in the case of being used for cannot be carried out NFC terminal checking, unlock screen;
Safe email: in the case of being used for forgetting urgent password, obtains safety verification code by mailbox and unlocks Screen, and reset urgent password;
Lock screen automatically the time: the mouse-keyboard that user allows without the free time of operation, overtime, will be from Dynamic screen locking;
Secondary verification password: the NFC terminal of the user setup of higher demand for security be verified after checking Password;
Third party authorizes account: user by bind other open third party's accounts (as wechat, QQ, Microblogging), realize third party's account mandate and unlock.
105: set up cloud server terminal, cloud server terminal is used for encrypting in storage 104 steps, the peace of user setup Full mailbox and user computer identifier information;
When cloud server terminal obtain user side send the information that forgets Password time, it is judged that confirm user, then to The safe email set is sent out the envelope mail with the identifying code resetting urgent password;Identifying code obtains checking By rear, the screen locking module of cloud server terminal notice local service end unlocks screen, and memory module is deleted tight Anxious password;
106: enable screen locking/unblock.
As in figure 2 it is shown, the detailed step of described step 106 is as follows:
201: during start, start screen locking;
202: read NFC terminal information, by NFC reader, read NFC terminal ID and terminal Unique identifier;
203: in the NFC terminal information that will read in 202, with local service end memory module, information is entered Row comparison;It is verified, then enters 204 steps;Checking is not passed through, then enter 205 steps;
204: obtain user's configuration information before this, if it has, then enter 213 steps;If it is not, Enter 212 steps;
205: start local service end, carry out third party's account binding validatation;If binding, then enter 206 Step;If unbound, then enter 207 steps;
206: show interested third party account logentry, if barcode scanning then shows Quick Response Code, if Account number cipher input logs in, then show user name Password Input frame and associated verification Password Input frame;Input 208 steps are entered after one-tenth;
207: show urgent Password Input frame, enter 209 steps;
208: by third party's account open platform, checking authorizes;Mandate is passed through, then enter 204 steps; Do not pass through, then enter 207 steps;
209: start local service end authentication module, checking that the urgent password got is compared;Test Card passes through, then enter 204 steps;Checking is not passed through, then enter 210 steps;
210: obtain user computer identifier, by cloud server terminal, send safety verification code to user computer The appointment mailbox that identifier is corresponding;211 steps are entered after completing;
211: the safety verification code of checking local service end subscriber input is the truest, is verified, then enters Enter 204 steps;Checking is not passed through, then enter 201 steps;
212: local service end screen locking module obtains and unlocks instruction, unlocks screen;
213: obtain the two-pass cipher of user's input, enter 214 steps;
214: the two-pass cipher of checking local service end subscriber input is the truest, is verified, then enters 212 steps;Checking is not passed through, then enter 201 steps;
215: judge user's whether manual locking computer screen, if it is, enter 216 steps;If it does not, Enter 217 steps;
216: start local service end screen locking module, lock-screen;
217: enable local service end mouse-keyboard monitoring module: monitor mouse-keyboard activity situation;If There is operation, then enter 218 steps;Without operation, then enter 219 steps;
218: keep screen not lock-out state;
219: enable local service end time monitoring module: if mouse-keyboard silence period length not less than Predetermined time period, then enter 218 steps;If it does, then enter 216 steps.
Those of ordinary skill in the art is it will be appreciated that embodiment described here is to aid in reader's reason Solve the implementation of the present invention, it should be understood that protection scope of the present invention is not limited to such the oldest State and embodiment.Those of ordinary skill in the art can make according to these technology disclosed by the invention enlightenment Various other various concrete deformation and combinations without departing from essence of the present invention, these deformation and combination are still at this In the protection domain of invention.

Claims (5)

1. a method based on NFC terminal lock locking/unlocking computer screen, it is characterised in that include following step Rapid:
101: connect NFC reader, described NFC reader includes: identification module, processing module, Communication module, radio-frequency antenna;
102: set up local service end, described local service end includes: memory module, authentication module, screen Curtain locking module, mouse-keyboard monitoring module, time monitoring module;
103: connect NFC terminal and NFC reader, obtain NFC terminal ID and terminal uniquely identifies Number information, after encryption, writes local service end memory module;
104: obtaining information-setting by user, then encryption is stored in the memory module of local service end;Described Information-setting by user includes: urgent password, safe email, lock screen automatically time, secondary verification password and the Tripartite authorizes account;
105: set up cloud server terminal, cloud server terminal is used for encrypting in storage 104 steps, the peace of user setup Full mailbox and user computer identifier information;
When cloud server terminal obtain user side send the information that forgets Password time, it is judged that confirm user, then to The safe email set is sent out the envelope mail with the identifying code resetting urgent password;Identifying code obtains checking By rear, the screen locking module of cloud server terminal notice local service end unlocks screen, and memory module is deleted tight Anxious password;
106: enable screen locking/unblock.
A kind of method based on NFC terminal lock locking/unlocking computer screen the most according to claim 1, It is characterized in that: in described step 101, identification module is for periodically at mode card and ad hoc mode Between switch over, under mode card, identify the ID of the NFC terminal of analog radio frequency card and terminal only One identifier;Under ad hoc mode, identify ID and the terminal unique identifier of NFC terminal;
Described processing module is for being converted into data signal by the ID recognized and terminal unique identifier;
Described communication module for being sent to local service end screen lock by the digital signal that processing module exports Cover half block;
Described radio-frequency antenna is used for using 13.56MHz frequency, is mainly used in sensing NFC terminal and transmits ID and the analogue signal of terminal unique identifier.
A kind of method based on NFC terminal lock locking/unlocking computer screen the most according to claim 2, It is characterized in that: memory module described in described step 102 is used for encrypting storage NFC terminal ID and terminal Unique identifier information, the urgent password of user setup and safe email, third party's account etc. of user's binding Information, and obtain high in the clouds instruction when being necessary, revise relevant information;
Described authentication module is for obtaining the information that NFC reader communication module transmits, with storage mould Identity information reserved in block is compared, and provides judged result;
Described screen locking module is used for obtaining window screen locking authority, sends screen locking, unlocks instruction;
Described mouse-keyboard monitoring module is used for monitoring mouse-keyboard activity situation;
Described time monitoring module is idle for monitoring the time after a certain instruction performs;Exceed Preset Time long Degree, sends instruction.
A kind of method based on NFC terminal lock locking/unlocking computer screen the most according to claim 3, It is characterized in that: in the case of in described step 104, urgent password is used for cannot be carried out NFC terminal checking, Unlock screen;
In the case of safe email is used for forgetting urgent password, obtains safety verification code by mailbox and carry out screen-unblocking Curtain, and reset urgent password;
Locking screen automatically the mouse-keyboard free time without operation of time user permission, overtime, by automatically Screen locking;
Secondary verification password testing after the NFC terminal of the user setup of higher demand for security is verified Card password;
Third party authorizes account to be used for user by binding other open third party's accounts, realizes third party Account mandate unlocks.
A kind of method based on NFC terminal lock locking/unlocking computer screen the most according to claim 4, It is characterized in that: the detailed step of described step 106 is as follows:
201: during start, start screen locking;
202: read NFC terminal information, by NFC reader, read NFC terminal ID and terminal Unique identifier;
203: in the NFC terminal information that will read in 202, with local service end memory module, information is entered Row comparison;It is verified, then enters 204 steps;Checking is not passed through, then enter 205 steps;
204: obtain user's configuration information before this, if it has, then enter 213 steps;If it is not, Enter 212 steps;
205: start local service end, carry out third party's account binding validatation;If binding, then enter 206 Step;If unbound, then enter 207 steps;
206: show interested third party account logentry, if barcode scanning then shows Quick Response Code, if Account number cipher input logs in, then show user name Password Input frame and associated verification Password Input frame;Input 208 steps are entered after one-tenth;
207: show urgent Password Input frame, enter 209 steps;
208: by third party's account open platform, checking authorizes;Mandate is passed through, then enter 204 steps; Do not pass through, then enter 207 steps;
209: start local service end authentication module, checking that the urgent password got is compared;Test Card passes through, then enter 204 steps;Checking is not passed through, then enter 210 steps;
210: obtain user computer identifier, by cloud server terminal, send safety verification code to user computer The appointment mailbox that identifier is corresponding;211 steps are entered after completing;
211: the safety verification code of checking local service end subscriber input is the truest, is verified, then enters Enter 204 steps;Checking is not passed through, then enter 201 steps;
212: local service end screen locking module obtains and unlocks instruction, unlocks screen;
213: obtain the two-pass cipher of user's input, enter 214 steps;
214: the two-pass cipher of checking local service end subscriber input is the truest, is verified, then enters 212 steps;Checking is not passed through, then enter 201 steps;
215: judge user's whether manual locking computer screen, if it is, enter 216 steps;If it does not, Enter 217 steps;
216: start local service end screen locking module, lock-screen;
217: enable local service end mouse-keyboard monitoring module: monitor mouse-keyboard activity situation;If There is operation, then enter 218 steps;Without operation, then enter 219 steps;
218: keep screen not lock-out state;
219: enable local service end time monitoring module: if mouse-keyboard silence period length not less than Predetermined time period, enters 218 steps;If it does, enter 216 steps.
CN201610268254.0A 2016-04-27 2016-04-27 Method of locking/unlocking computer screen based on NFC terminal Pending CN105959277A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610268254.0A CN105959277A (en) 2016-04-27 2016-04-27 Method of locking/unlocking computer screen based on NFC terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610268254.0A CN105959277A (en) 2016-04-27 2016-04-27 Method of locking/unlocking computer screen based on NFC terminal

Publications (1)

Publication Number Publication Date
CN105959277A true CN105959277A (en) 2016-09-21

Family

ID=56915578

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610268254.0A Pending CN105959277A (en) 2016-04-27 2016-04-27 Method of locking/unlocking computer screen based on NFC terminal

Country Status (1)

Country Link
CN (1) CN105959277A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107665527A (en) * 2017-09-01 2018-02-06 广州三星通信技术研究有限公司 The method and apparatus that the vehicles are unlocked in portable terminal
CN108427879A (en) * 2018-03-22 2018-08-21 平安科技(深圳)有限公司 Account safety management method, device, computer equipment and storage medium
CN110111472A (en) * 2019-05-16 2019-08-09 广州小鹏汽车科技有限公司 Vehicle key control method and device
WO2019154236A1 (en) * 2018-02-06 2019-08-15 阿里巴巴集团控股有限公司 Electronic device and unlocking method, service server, platform server and client
CN112277878A (en) * 2019-07-11 2021-01-29 魏立江 Keyless entry system
WO2022052780A1 (en) * 2020-09-10 2022-03-17 华为技术有限公司 Identity verification method and apparatus, and device and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101131720A (en) * 2006-08-23 2008-02-27 联想(北京)有限公司 Radio recognizing computer security locking authentication system and method thereof
CN103258154A (en) * 2012-02-19 2013-08-21 上海博路信息技术有限公司 NFC (negative feedback circuit) terminal based locking and unlocking method
US20130237190A1 (en) * 2012-01-17 2013-09-12 Entrust, Inc. Method and apparatus for remote portable wireless device authentication
CN103514392A (en) * 2013-09-24 2014-01-15 亚太宝龙科技(湖南)有限公司 Login authentication device and method of computer operation system
CN103927806A (en) * 2014-04-28 2014-07-16 深圳市康凯斯信息技术有限公司 Unlocking system and method for performing password verification based on wireless communication module pairing
CN103995572A (en) * 2014-05-14 2014-08-20 苏州三星电子电脑有限公司 Computer unlocking method and computer with unlocking module
CN104598826A (en) * 2013-10-31 2015-05-06 鸿富锦精密工业(武汉)有限公司 Computer privacy management system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101131720A (en) * 2006-08-23 2008-02-27 联想(北京)有限公司 Radio recognizing computer security locking authentication system and method thereof
US20130237190A1 (en) * 2012-01-17 2013-09-12 Entrust, Inc. Method and apparatus for remote portable wireless device authentication
CN103258154A (en) * 2012-02-19 2013-08-21 上海博路信息技术有限公司 NFC (negative feedback circuit) terminal based locking and unlocking method
CN103514392A (en) * 2013-09-24 2014-01-15 亚太宝龙科技(湖南)有限公司 Login authentication device and method of computer operation system
CN104598826A (en) * 2013-10-31 2015-05-06 鸿富锦精密工业(武汉)有限公司 Computer privacy management system and method
CN103927806A (en) * 2014-04-28 2014-07-16 深圳市康凯斯信息技术有限公司 Unlocking system and method for performing password verification based on wireless communication module pairing
CN103995572A (en) * 2014-05-14 2014-08-20 苏州三星电子电脑有限公司 Computer unlocking method and computer with unlocking module

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈丹丹: "互联网通行证系统的设计与实现", 《中国优秀硕士学位论文全文数据库·信息科技辑》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107665527A (en) * 2017-09-01 2018-02-06 广州三星通信技术研究有限公司 The method and apparatus that the vehicles are unlocked in portable terminal
WO2019154236A1 (en) * 2018-02-06 2019-08-15 阿里巴巴集团控股有限公司 Electronic device and unlocking method, service server, platform server and client
CN108427879A (en) * 2018-03-22 2018-08-21 平安科技(深圳)有限公司 Account safety management method, device, computer equipment and storage medium
CN110111472A (en) * 2019-05-16 2019-08-09 广州小鹏汽车科技有限公司 Vehicle key control method and device
CN112277878A (en) * 2019-07-11 2021-01-29 魏立江 Keyless entry system
WO2022052780A1 (en) * 2020-09-10 2022-03-17 华为技术有限公司 Identity verification method and apparatus, and device and storage medium

Similar Documents

Publication Publication Date Title
US11405781B2 (en) System and method for mobile identity protection for online user authentication
CN105959277A (en) Method of locking/unlocking computer screen based on NFC terminal
CN100498690C (en) Secure device, terminal device, gate device, system and method
US7616091B2 (en) Actuating a security system using a wireless device
US20180359635A1 (en) Securitization of Temporal Digital Communications Via Authentication and Validation for Wireless User and Access Devices
US8839380B2 (en) Method for the temporary personalization of a communication device
CN105893802A (en) Method for locking/unlocking computer screen based on Bluetooth
CN104517338A (en) Remote door access control system based on wireless network and realization method of remote door access control system
JP5167835B2 (en) User authentication system, method, program, and medium
CN101422058A (en) Method of securing access to a proximity communication module in a mobile terminal
CN104363589A (en) Identity authentication method, device and terminal
KR20120112598A (en) Implementing method, system of universal card system and smart card
CN101714216B (en) Semiconductor element, biometric authentication method, biometric authentication system and mobile terminal
EA036443B1 (en) System and method for communicating credentials
WO2014180345A1 (en) User identity verification and authorization system
US9705861B2 (en) Method of authorizing a person, an authorizing architecture and a computer program product
US20130340073A1 (en) Identification to Access Portable Computing Device
JP4390817B2 (en) Authentication processing system, mobile communication terminal, and authentication processing method
JP2007308873A (en) System for managing entry into room
CN114613047A (en) Access control system, offline cloud authorization system and method for access control, and medium
KR102295480B1 (en) User authentication system and method for authenticating access to an industrial control system
CN105975841A (en) Method for locking/ unlocking computer screen on the basis of softdog
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN105956450A (en) Method for locking/unlocking computer screen based on non-contact IC card
CN110766840A (en) Access control password setting method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160921

RJ01 Rejection of invention patent application after publication