CN105959277A - Method of locking/unlocking computer screen based on NFC terminal - Google Patents
Method of locking/unlocking computer screen based on NFC terminal Download PDFInfo
- Publication number
- CN105959277A CN105959277A CN201610268254.0A CN201610268254A CN105959277A CN 105959277 A CN105959277 A CN 105959277A CN 201610268254 A CN201610268254 A CN 201610268254A CN 105959277 A CN105959277 A CN 105959277A
- Authority
- CN
- China
- Prior art keywords
- steps
- screen
- enter
- module
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Abstract
The invention discloses a method of locking/unlocking computer screen based on NFC terminal, comprising the following steps: 101) connecting an NFC reader; 102) setting up a local server; 103) binding an NFC terminal; 104) accessing information configured by a user; 105) establishing a cloud server; and 106) initiating the locking/unlocking of screen. According to the invention, the method has following advantages: 1) NFC terminal used as a key to locking/unlocking a PC screen; when it is used to unlock, all a user needs to do is put the NFC terminal close to a computer NFC recognizer; with it, the screen becomes unlocked. 2) extra layers of security protection to make up loopholes facing computer safety and convenient operations; 3) availability of emergency mode for more secure, more convenient identity identification and computer unlocking; 4) using an active protection mode for the system, and based on used scenes, the protection is set to be automatic, hidden in a bottom layer seldom felt by the user, so that protection becomes silent.
Description
Technical field
The present invention relates to field of information security technology, particularly to one based on NFC terminal lock locking/unlocking electricity
The method of brain screen.
Background technology
At present when using PC, it is frequently encountered and needs situation away from keyboard.General user can be straight
Connect and leave, will not screen locking, now, be easiest to occur computer data stolen, destroyed, cause individual or public affairs
Privacy and the secret of department are revealed;Some user can use Windows or other related softwares, hard
Part mode, lock-screen.
But all there are the following problems:
Use software scenario: must manually input password or drafting the unlocking pattern could unlock screen,
Troublesome poeration.And if password and locking pattern arrange excessively simple, are easily cracked;If it is the most complicated,
The memory cost of user is the highest, is also easy to forget;
Hardware is used to make scheme: majority Appropriate application stock assets user of postponing cannot use habit
Used, use learning cost huge;
Only one layer locking protection, it is impossible to meet the demand of user Geng Gao safety.
The involved part technical term of the present invention:
NFC (Near Field Communication, near-field communication): be the radio skill of a kind of short distance high frequency
Art, the compatible equipment in 13.56MHz frequency with 20 cm distance is identified and data exchange.NFC
There is following two mode of operation.
Mode card (Card emulation): this pattern is the most just comparable to one and uses RFID technique
IC-card.Can substitute substantial amounts of IC-card (including the credit card) occasion market swipe the card, mass transit card, gate inhibition
Control, ticket, admission ticket etc..Under this kind of mode, there is a great advantage, that is, card is by non-
The RF territory of contact card reader powers, even if host's equipment (such as mobile phone) does not has electricity to work.
Ad hoc mode (P2P mode): this pattern and infrared ray are similar, can be used for data exchange,
Simply transmission range is shorter, and transmission creates speed, transmission speed the most hurry up, (bluetooth also class low in energy consumption
Like).By two linking of devices possessing NFC function, data point-to-point transmission can be realized, as down-load music,
Exchange picture or synchronizer address book.
Summary of the invention
The present invention is directed to the defect of prior art, it is provided that a kind of based on NFC terminal lock locking/unlocking computer screen
The method of curtain, can effectively solve the problem that the problem that above-mentioned prior art exists.
A kind of method based on NFC terminal lock locking/unlocking computer screen, comprises the following steps:
101: connect NFC reader, described NFC reader includes: identification module, processing module,
Communication module, radio-frequency antenna;
102: set up local service end, described local service end includes: memory module, authentication module, screen
Curtain locking module, mouse-keyboard monitoring module, time monitoring module;
103: connect NFC terminal and NFC reader, obtain NFC terminal ID and terminal uniquely identifies
Number information, after encryption, writes local service end memory module;
104: obtaining information-setting by user, then encryption is stored in the memory module of local service end;Described
Information-setting by user includes: urgent password, safe email, lock screen automatically time, secondary verification password and the
Tripartite authorizes account;
105: set up cloud server terminal, cloud server terminal is used for encrypting in storage 104 steps, the peace of user setup
Full mailbox and user computer identifier information;
When cloud server terminal obtain user side send the information that forgets Password time, it is judged that confirm user, then to
The safe email set is sent out the envelope mail with the identifying code resetting urgent password;Identifying code obtains checking
By rear, the screen locking module of cloud server terminal notice local service end unlocks screen, and memory module is deleted tight
Anxious password;
106: enable screen locking/unblock.
As preferably, in described step 101, identification module is for periodically at mode card and ad hoc mode
Between switch over, under mode card, identify the ID of the NFC terminal of analog radio frequency card and terminal only
One identifier;Under ad hoc mode, identify ID and the terminal unique identifier of NFC terminal;
Described processing module is for being converted into data signal by the ID recognized and terminal unique identifier;
Described communication module for being sent to local service end screen lock by the digital signal that processing module exports
Cover half block;
Described radio-frequency antenna is used for using 13.56MHz frequency, is mainly used in sensing NFC terminal and transmits
ID and the analogue signal of terminal unique identifier.
As preferably, memory module described in described step 102 is used for encrypting storage NFC terminal ID and end
End unique identifier information, the urgent password of user setup and safe email, third party's account of user's binding
Etc. information, and obtain high in the clouds instruction when being necessary, revise relevant information;
Described authentication module is for obtaining the information that NFC reader communication module transmits, with storage mould
Identity information reserved in block is compared, and provides judged result;
Described screen locking module is used for obtaining window screen locking authority, sends screen locking, unlocks instruction;
Described mouse-keyboard monitoring module is used for monitoring mouse-keyboard activity situation;
Described time monitoring module is idle for monitoring the time after a certain instruction performs;Exceed Preset Time long
Degree, sends instruction.
As preferably, in described step 104, urgent password is for cannot be carried out the situation of NFC terminal checking
Under, unlock screen;
In the case of safe email is used for forgetting urgent password, obtains safety verification code by mailbox and carry out screen-unblocking
Curtain, and reset urgent password;
Locking screen automatically the mouse-keyboard free time without operation of time user permission, overtime, by automatically
Screen locking;
Secondary verification password testing after the NFC terminal of the user setup of higher demand for security is verified
Card password;
Third party authorizes account to be used for user by binding other open third party's accounts, realizes third party
Account mandate unlocks.
As preferably, the detailed step of described step 106 is as follows:
201: during start, start screen locking;
202: read NFC terminal information, by NFC reader, read NFC terminal ID and terminal
Unique identifier;
203: in the NFC terminal information that will read in 202, with local service end memory module, information is entered
Row comparison;It is verified, then enters 204 steps;Checking is not passed through, then enter 205 steps;
204: obtain user's configuration information before this, if it has, then enter 213 steps;If it is not,
Enter 212 steps;
205: start local service end, carry out third party's account binding validatation;If binding, then enter 206
Step;If unbound, then enter 207 steps;
206: show interested third party account logentry, if barcode scanning then shows Quick Response Code, if
Account number cipher input logs in, then show user name Password Input frame and associated verification Password Input frame;Input
208 steps are entered after one-tenth;
207: show urgent Password Input frame, enter 209 steps;
208: by third party's account open platform, checking authorizes;Mandate is passed through, then enter 204 steps;
Do not pass through, then enter 207 steps;
209: start local service end authentication module, checking that the urgent password got is compared;Test
Card passes through, then enter 204 steps;Checking is not passed through, then enter 210 steps;
210: obtain user computer identifier, by cloud server terminal, send safety verification code to user computer
The appointment mailbox that identifier is corresponding;211 steps are entered after completing;
211: the safety verification code of checking local service end subscriber input is the truest, is verified, then enters
Enter 204 steps;Checking is not passed through, then enter 201 steps;
212: local service end screen locking module obtains and unlocks instruction, unlocks screen;
213: obtain the two-pass cipher of user's input, enter 214 steps;
214: the two-pass cipher of checking local service end subscriber input is the truest, is verified, then enters
212 steps;Checking is not passed through, then enter 201 steps;
215: judge user's whether manual locking computer screen, if it is, enter 216 steps;If it does not,
Enter 217 steps;
216: start local service end screen locking module, lock-screen;
217: enable local service end mouse-keyboard monitoring module: monitor mouse-keyboard activity situation;If
There is operation, then enter 218 steps;Without operation, then enter 219 steps;
218: keep screen not lock-out state;
219: enable local service end time monitoring module: if mouse-keyboard silence period length not less than
Predetermined time period, enters 218 steps;If it does, enter 216 steps.
Compared with prior art it is an advantage of the current invention that:
1. using NFC terminal (such as the smart mobile phone of band NFC function) as lock locking/unlocking PC screen
The key of curtain: when using for the first time, NFC terminal is bound with computer;During unblock, user has only to
By NFC terminal near computer NFC evaluator, so that it may be unlocked the operation of screen;
2., on above protection, increase multi-level safety protective layer, such as third party's account authority checking, secondary
Password authentification etc.:
Third party's account authority checking: use third party's account mandate to log in and carry out secondary identity authentication;
Two-pass cipher is verified: after being verified by NFC terminal, carry out preset password checking;
These safety protective layers compensate for NFC terminal lose, stolen when, computer security defence
Leak;And using third party's account mandate to log in and carry out authentication, operation is same convenient.
3. offer emergency mode is safer, more convenient carries out authentication and unlocks computer.
Urgent password/safe email is set: convenient lose, stolen etc. under special emergency in NFC terminal,
Also computer can be unlocked safely.
4. use system actively protected mode, according to the scene used, protection setting is become automatically, is hidden in
User's perception less than bottom, accomplish to protect noiseless.
Accompanying drawing explanation
Fig. 1 is the main flow chart of the embodiment of the present invention;
Fig. 2 is the detail flowchart of step 106 in the embodiment of the present invention.
Detailed description of the invention
For making the purpose of the present invention, technical scheme and advantage clearer, by the following examples, to this
Invention is described in further details.
As it is shown in figure 1, a kind of method based on NFC terminal lock locking/unlocking computer screen, including following step
Rapid:
101: connect NFC reader, described NFC reader includes: identification module, processing module,
Communication module, radio-frequency antenna;
Described identification module: periodically at mode card (Card emulation) and ad hoc mode (P2P
Mode) switch between.Under mode card (Card emulation), identify analog radio frequency card
The ID of NFC terminal and terminal unique identifier;Under ad hoc mode (P2P mode), identify
The ID of NFC terminal and terminal unique identifier;
Described processing module: the ID recognized and terminal unique identifier are converted into data signal;
Described communication module: the digital signal that processing module exports is sent to local service end screen locking mould
Block;
Described radio-frequency antenna: use 13.56MHz frequency, is mainly used in sensing what NFC terminal transmitted
ID and the analogue signal of terminal unique identifier.
102: set up local service end, described local service end includes: memory module, authentication module, screen
Curtain locking module, mouse-keyboard monitoring module, time monitoring module;
Described memory module: encryption storage NFC terminal ID and terminal unique identifier information, user setup
Urgent password and safe email, the information such as third party's account of user's binding, and obtain when being necessary
High in the clouds instructs, and revises relevant information;
Described authentication module: obtain the information that NFC reader communication module transmits, with memory module
In reserved identity information compare, provide judged result;
Described screen locking module: obtain window screen locking authority, sends screen locking, unlocks instruction;
Described mouse-keyboard monitoring module: monitoring mouse-keyboard activity situation;
Described time monitoring module: monitor the time after a certain instruction performs idle;Exceed predetermined time period,
Send instruction.
103: binding NFC terminal.
Connect NFC terminal and NFC reader, obtain NFC terminal ID and terminal unique identifier information,
After encryption, write local service end memory module;
104: obtaining information-setting by user, then encryption is stored in the memory module of local service end;
Described information-setting by user includes:
Urgent password: in the case of being used for cannot be carried out NFC terminal checking, unlock screen;
Safe email: in the case of being used for forgetting urgent password, obtains safety verification code by mailbox and unlocks
Screen, and reset urgent password;
Lock screen automatically the time: the mouse-keyboard that user allows without the free time of operation, overtime, will be from
Dynamic screen locking;
Secondary verification password: the NFC terminal of the user setup of higher demand for security be verified after checking
Password;
Third party authorizes account: user by bind other open third party's accounts (as wechat, QQ,
Microblogging), realize third party's account mandate and unlock.
105: set up cloud server terminal, cloud server terminal is used for encrypting in storage 104 steps, the peace of user setup
Full mailbox and user computer identifier information;
When cloud server terminal obtain user side send the information that forgets Password time, it is judged that confirm user, then to
The safe email set is sent out the envelope mail with the identifying code resetting urgent password;Identifying code obtains checking
By rear, the screen locking module of cloud server terminal notice local service end unlocks screen, and memory module is deleted tight
Anxious password;
106: enable screen locking/unblock.
As in figure 2 it is shown, the detailed step of described step 106 is as follows:
201: during start, start screen locking;
202: read NFC terminal information, by NFC reader, read NFC terminal ID and terminal
Unique identifier;
203: in the NFC terminal information that will read in 202, with local service end memory module, information is entered
Row comparison;It is verified, then enters 204 steps;Checking is not passed through, then enter 205 steps;
204: obtain user's configuration information before this, if it has, then enter 213 steps;If it is not,
Enter 212 steps;
205: start local service end, carry out third party's account binding validatation;If binding, then enter 206
Step;If unbound, then enter 207 steps;
206: show interested third party account logentry, if barcode scanning then shows Quick Response Code, if
Account number cipher input logs in, then show user name Password Input frame and associated verification Password Input frame;Input
208 steps are entered after one-tenth;
207: show urgent Password Input frame, enter 209 steps;
208: by third party's account open platform, checking authorizes;Mandate is passed through, then enter 204 steps;
Do not pass through, then enter 207 steps;
209: start local service end authentication module, checking that the urgent password got is compared;Test
Card passes through, then enter 204 steps;Checking is not passed through, then enter 210 steps;
210: obtain user computer identifier, by cloud server terminal, send safety verification code to user computer
The appointment mailbox that identifier is corresponding;211 steps are entered after completing;
211: the safety verification code of checking local service end subscriber input is the truest, is verified, then enters
Enter 204 steps;Checking is not passed through, then enter 201 steps;
212: local service end screen locking module obtains and unlocks instruction, unlocks screen;
213: obtain the two-pass cipher of user's input, enter 214 steps;
214: the two-pass cipher of checking local service end subscriber input is the truest, is verified, then enters
212 steps;Checking is not passed through, then enter 201 steps;
215: judge user's whether manual locking computer screen, if it is, enter 216 steps;If it does not,
Enter 217 steps;
216: start local service end screen locking module, lock-screen;
217: enable local service end mouse-keyboard monitoring module: monitor mouse-keyboard activity situation;If
There is operation, then enter 218 steps;Without operation, then enter 219 steps;
218: keep screen not lock-out state;
219: enable local service end time monitoring module: if mouse-keyboard silence period length not less than
Predetermined time period, then enter 218 steps;If it does, then enter 216 steps.
Those of ordinary skill in the art is it will be appreciated that embodiment described here is to aid in reader's reason
Solve the implementation of the present invention, it should be understood that protection scope of the present invention is not limited to such the oldest
State and embodiment.Those of ordinary skill in the art can make according to these technology disclosed by the invention enlightenment
Various other various concrete deformation and combinations without departing from essence of the present invention, these deformation and combination are still at this
In the protection domain of invention.
Claims (5)
1. a method based on NFC terminal lock locking/unlocking computer screen, it is characterised in that include following step
Rapid:
101: connect NFC reader, described NFC reader includes: identification module, processing module,
Communication module, radio-frequency antenna;
102: set up local service end, described local service end includes: memory module, authentication module, screen
Curtain locking module, mouse-keyboard monitoring module, time monitoring module;
103: connect NFC terminal and NFC reader, obtain NFC terminal ID and terminal uniquely identifies
Number information, after encryption, writes local service end memory module;
104: obtaining information-setting by user, then encryption is stored in the memory module of local service end;Described
Information-setting by user includes: urgent password, safe email, lock screen automatically time, secondary verification password and the
Tripartite authorizes account;
105: set up cloud server terminal, cloud server terminal is used for encrypting in storage 104 steps, the peace of user setup
Full mailbox and user computer identifier information;
When cloud server terminal obtain user side send the information that forgets Password time, it is judged that confirm user, then to
The safe email set is sent out the envelope mail with the identifying code resetting urgent password;Identifying code obtains checking
By rear, the screen locking module of cloud server terminal notice local service end unlocks screen, and memory module is deleted tight
Anxious password;
106: enable screen locking/unblock.
A kind of method based on NFC terminal lock locking/unlocking computer screen the most according to claim 1,
It is characterized in that: in described step 101, identification module is for periodically at mode card and ad hoc mode
Between switch over, under mode card, identify the ID of the NFC terminal of analog radio frequency card and terminal only
One identifier;Under ad hoc mode, identify ID and the terminal unique identifier of NFC terminal;
Described processing module is for being converted into data signal by the ID recognized and terminal unique identifier;
Described communication module for being sent to local service end screen lock by the digital signal that processing module exports
Cover half block;
Described radio-frequency antenna is used for using 13.56MHz frequency, is mainly used in sensing NFC terminal and transmits
ID and the analogue signal of terminal unique identifier.
A kind of method based on NFC terminal lock locking/unlocking computer screen the most according to claim 2,
It is characterized in that: memory module described in described step 102 is used for encrypting storage NFC terminal ID and terminal
Unique identifier information, the urgent password of user setup and safe email, third party's account etc. of user's binding
Information, and obtain high in the clouds instruction when being necessary, revise relevant information;
Described authentication module is for obtaining the information that NFC reader communication module transmits, with storage mould
Identity information reserved in block is compared, and provides judged result;
Described screen locking module is used for obtaining window screen locking authority, sends screen locking, unlocks instruction;
Described mouse-keyboard monitoring module is used for monitoring mouse-keyboard activity situation;
Described time monitoring module is idle for monitoring the time after a certain instruction performs;Exceed Preset Time long
Degree, sends instruction.
A kind of method based on NFC terminal lock locking/unlocking computer screen the most according to claim 3,
It is characterized in that: in the case of in described step 104, urgent password is used for cannot be carried out NFC terminal checking,
Unlock screen;
In the case of safe email is used for forgetting urgent password, obtains safety verification code by mailbox and carry out screen-unblocking
Curtain, and reset urgent password;
Locking screen automatically the mouse-keyboard free time without operation of time user permission, overtime, by automatically
Screen locking;
Secondary verification password testing after the NFC terminal of the user setup of higher demand for security is verified
Card password;
Third party authorizes account to be used for user by binding other open third party's accounts, realizes third party
Account mandate unlocks.
A kind of method based on NFC terminal lock locking/unlocking computer screen the most according to claim 4,
It is characterized in that: the detailed step of described step 106 is as follows:
201: during start, start screen locking;
202: read NFC terminal information, by NFC reader, read NFC terminal ID and terminal
Unique identifier;
203: in the NFC terminal information that will read in 202, with local service end memory module, information is entered
Row comparison;It is verified, then enters 204 steps;Checking is not passed through, then enter 205 steps;
204: obtain user's configuration information before this, if it has, then enter 213 steps;If it is not,
Enter 212 steps;
205: start local service end, carry out third party's account binding validatation;If binding, then enter 206
Step;If unbound, then enter 207 steps;
206: show interested third party account logentry, if barcode scanning then shows Quick Response Code, if
Account number cipher input logs in, then show user name Password Input frame and associated verification Password Input frame;Input
208 steps are entered after one-tenth;
207: show urgent Password Input frame, enter 209 steps;
208: by third party's account open platform, checking authorizes;Mandate is passed through, then enter 204 steps;
Do not pass through, then enter 207 steps;
209: start local service end authentication module, checking that the urgent password got is compared;Test
Card passes through, then enter 204 steps;Checking is not passed through, then enter 210 steps;
210: obtain user computer identifier, by cloud server terminal, send safety verification code to user computer
The appointment mailbox that identifier is corresponding;211 steps are entered after completing;
211: the safety verification code of checking local service end subscriber input is the truest, is verified, then enters
Enter 204 steps;Checking is not passed through, then enter 201 steps;
212: local service end screen locking module obtains and unlocks instruction, unlocks screen;
213: obtain the two-pass cipher of user's input, enter 214 steps;
214: the two-pass cipher of checking local service end subscriber input is the truest, is verified, then enters
212 steps;Checking is not passed through, then enter 201 steps;
215: judge user's whether manual locking computer screen, if it is, enter 216 steps;If it does not,
Enter 217 steps;
216: start local service end screen locking module, lock-screen;
217: enable local service end mouse-keyboard monitoring module: monitor mouse-keyboard activity situation;If
There is operation, then enter 218 steps;Without operation, then enter 219 steps;
218: keep screen not lock-out state;
219: enable local service end time monitoring module: if mouse-keyboard silence period length not less than
Predetermined time period, enters 218 steps;If it does, enter 216 steps.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610268254.0A CN105959277A (en) | 2016-04-27 | 2016-04-27 | Method of locking/unlocking computer screen based on NFC terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610268254.0A CN105959277A (en) | 2016-04-27 | 2016-04-27 | Method of locking/unlocking computer screen based on NFC terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105959277A true CN105959277A (en) | 2016-09-21 |
Family
ID=56915578
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610268254.0A Pending CN105959277A (en) | 2016-04-27 | 2016-04-27 | Method of locking/unlocking computer screen based on NFC terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105959277A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107665527A (en) * | 2017-09-01 | 2018-02-06 | 广州三星通信技术研究有限公司 | The method and apparatus that the vehicles are unlocked in portable terminal |
CN108427879A (en) * | 2018-03-22 | 2018-08-21 | 平安科技(深圳)有限公司 | Account safety management method, device, computer equipment and storage medium |
CN110111472A (en) * | 2019-05-16 | 2019-08-09 | 广州小鹏汽车科技有限公司 | Vehicle key control method and device |
WO2019154236A1 (en) * | 2018-02-06 | 2019-08-15 | 阿里巴巴集团控股有限公司 | Electronic device and unlocking method, service server, platform server and client |
CN112277878A (en) * | 2019-07-11 | 2021-01-29 | 魏立江 | Keyless entry system |
WO2022052780A1 (en) * | 2020-09-10 | 2022-03-17 | 华为技术有限公司 | Identity verification method and apparatus, and device and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101131720A (en) * | 2006-08-23 | 2008-02-27 | 联想(北京)有限公司 | Radio recognizing computer security locking authentication system and method thereof |
CN103258154A (en) * | 2012-02-19 | 2013-08-21 | 上海博路信息技术有限公司 | NFC (negative feedback circuit) terminal based locking and unlocking method |
US20130237190A1 (en) * | 2012-01-17 | 2013-09-12 | Entrust, Inc. | Method and apparatus for remote portable wireless device authentication |
CN103514392A (en) * | 2013-09-24 | 2014-01-15 | 亚太宝龙科技(湖南)有限公司 | Login authentication device and method of computer operation system |
CN103927806A (en) * | 2014-04-28 | 2014-07-16 | 深圳市康凯斯信息技术有限公司 | Unlocking system and method for performing password verification based on wireless communication module pairing |
CN103995572A (en) * | 2014-05-14 | 2014-08-20 | 苏州三星电子电脑有限公司 | Computer unlocking method and computer with unlocking module |
CN104598826A (en) * | 2013-10-31 | 2015-05-06 | 鸿富锦精密工业(武汉)有限公司 | Computer privacy management system and method |
-
2016
- 2016-04-27 CN CN201610268254.0A patent/CN105959277A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101131720A (en) * | 2006-08-23 | 2008-02-27 | 联想(北京)有限公司 | Radio recognizing computer security locking authentication system and method thereof |
US20130237190A1 (en) * | 2012-01-17 | 2013-09-12 | Entrust, Inc. | Method and apparatus for remote portable wireless device authentication |
CN103258154A (en) * | 2012-02-19 | 2013-08-21 | 上海博路信息技术有限公司 | NFC (negative feedback circuit) terminal based locking and unlocking method |
CN103514392A (en) * | 2013-09-24 | 2014-01-15 | 亚太宝龙科技(湖南)有限公司 | Login authentication device and method of computer operation system |
CN104598826A (en) * | 2013-10-31 | 2015-05-06 | 鸿富锦精密工业(武汉)有限公司 | Computer privacy management system and method |
CN103927806A (en) * | 2014-04-28 | 2014-07-16 | 深圳市康凯斯信息技术有限公司 | Unlocking system and method for performing password verification based on wireless communication module pairing |
CN103995572A (en) * | 2014-05-14 | 2014-08-20 | 苏州三星电子电脑有限公司 | Computer unlocking method and computer with unlocking module |
Non-Patent Citations (1)
Title |
---|
陈丹丹: "互联网通行证系统的设计与实现", 《中国优秀硕士学位论文全文数据库·信息科技辑》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107665527A (en) * | 2017-09-01 | 2018-02-06 | 广州三星通信技术研究有限公司 | The method and apparatus that the vehicles are unlocked in portable terminal |
WO2019154236A1 (en) * | 2018-02-06 | 2019-08-15 | 阿里巴巴集团控股有限公司 | Electronic device and unlocking method, service server, platform server and client |
CN108427879A (en) * | 2018-03-22 | 2018-08-21 | 平安科技(深圳)有限公司 | Account safety management method, device, computer equipment and storage medium |
CN110111472A (en) * | 2019-05-16 | 2019-08-09 | 广州小鹏汽车科技有限公司 | Vehicle key control method and device |
CN112277878A (en) * | 2019-07-11 | 2021-01-29 | 魏立江 | Keyless entry system |
WO2022052780A1 (en) * | 2020-09-10 | 2022-03-17 | 华为技术有限公司 | Identity verification method and apparatus, and device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11405781B2 (en) | System and method for mobile identity protection for online user authentication | |
CN105959277A (en) | Method of locking/unlocking computer screen based on NFC terminal | |
CN100498690C (en) | Secure device, terminal device, gate device, system and method | |
US7616091B2 (en) | Actuating a security system using a wireless device | |
US20180359635A1 (en) | Securitization of Temporal Digital Communications Via Authentication and Validation for Wireless User and Access Devices | |
US8839380B2 (en) | Method for the temporary personalization of a communication device | |
CN105893802A (en) | Method for locking/unlocking computer screen based on Bluetooth | |
CN104517338A (en) | Remote door access control system based on wireless network and realization method of remote door access control system | |
JP5167835B2 (en) | User authentication system, method, program, and medium | |
CN101422058A (en) | Method of securing access to a proximity communication module in a mobile terminal | |
CN104363589A (en) | Identity authentication method, device and terminal | |
KR20120112598A (en) | Implementing method, system of universal card system and smart card | |
CN101714216B (en) | Semiconductor element, biometric authentication method, biometric authentication system and mobile terminal | |
EA036443B1 (en) | System and method for communicating credentials | |
WO2014180345A1 (en) | User identity verification and authorization system | |
US9705861B2 (en) | Method of authorizing a person, an authorizing architecture and a computer program product | |
US20130340073A1 (en) | Identification to Access Portable Computing Device | |
JP4390817B2 (en) | Authentication processing system, mobile communication terminal, and authentication processing method | |
JP2007308873A (en) | System for managing entry into room | |
CN114613047A (en) | Access control system, offline cloud authorization system and method for access control, and medium | |
KR102295480B1 (en) | User authentication system and method for authenticating access to an industrial control system | |
CN105975841A (en) | Method for locking/ unlocking computer screen on the basis of softdog | |
US10645070B2 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
CN105956450A (en) | Method for locking/unlocking computer screen based on non-contact IC card | |
CN110766840A (en) | Access control password setting method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160921 |
|
RJ01 | Rejection of invention patent application after publication |