CN106330819A - Cipher information secure storage method and cipher manager based on SIM card information - Google Patents

Cipher information secure storage method and cipher manager based on SIM card information Download PDF

Info

Publication number
CN106330819A
CN106330819A CN201510345430.1A CN201510345430A CN106330819A CN 106330819 A CN106330819 A CN 106330819A CN 201510345430 A CN201510345430 A CN 201510345430A CN 106330819 A CN106330819 A CN 106330819A
Authority
CN
China
Prior art keywords
password
user
sim
information
binding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510345430.1A
Other languages
Chinese (zh)
Other versions
CN106330819B (en
Inventor
崔晓瑜
汤帜
俞银燕
吕肖庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China news publishing research institute
Peking University
Original Assignee
China news publishing research institute
Peking University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China news publishing research institute, Peking University filed Critical China news publishing research institute
Priority to CN201510345430.1A priority Critical patent/CN106330819B/en
Publication of CN106330819A publication Critical patent/CN106330819A/en
Application granted granted Critical
Publication of CN106330819B publication Critical patent/CN106330819B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a cipher information secure storage method and cipher manager based on SIM card information. The method is applied to an electronic device comprising an SIM card. The method comprises the steps of 1), detecting effectiveness of the SIM card in the electronic device; 2), for the effective SIM card, extracting unique identification information of the SIM card; 3), binding the unique identification information of the SIM card with cipher information of a network resource of a user; and 4), locally storing a binding result generated in the step 3). The cipher manager comprises a cipher collection module, a cipher management module, a cipher binding module and a cipher unbinding module. According to the method and the cipher manager, hardware binding is carried out on the cipher information of the network resource of the user and the SIM card information, the convenient and usable cipher management service is provided for the user, and the security of the cipher information of the user is ensured well.

Description

Encrypted message method for secure storing based on SIM card information and code management device
Technical field
The invention belongs to technical field of network security, be specifically related to a kind of encrypted message method for secure storing based on SIM card information, And one code management device, it is adaptable to comprise the electronic installation of SIM, such as smart mobile phone etc..
Background technology
At present, the mode of the many employings of known network resource security " user name+password " ensures the safety of user profile, but Along with becoming increasingly popular of network, the use of Internet resources is also become increasingly abundant and increases by people, and the thing followed is exactly Internet resources The problem of management of password.If the Internet resources password of user is all consistent, the safety of user profile " single-point breakthrough " will be there is Risk;Whereas if user uses different Internet resources passwords, there is the most again the problem that password is difficult to memory more.
In order to solve the problems referred to above, currently mainly having two big schemes, one is online code management device, such as LastPass.This The feature of scheme is to store on server by the all-network resource password of user, and user only need to remember a main password, It is responsible for automatically generating and remembering the password of heterogeneous networks resource by code management device, and Auto-writing is to login interface.This scheme Although solving the problem of management of numerous password, different Internet resources passwords is also randomly generated, and security intensity is higher, But owing to being centralized management pattern, so being easily subject to assault, equally exist the risk of " single point failure ".And Whether user trusts cloud server is also often to suffer from a problem that.First scheme is offline cryptogram manager, as KeePass.This kind of code management device is the password preserving management user in this locality, does not have whether user trusts cloud server Problem.And popularizing along with mobile Internet, the most common offline cryptogram manager is all proposed smart mobile phone version, solves The ease of use issues that code management device of having determined is cross-platform, but encrypted message is asked at the local storage problem of mobile phone and secure access Topic is but the weak spot of this kind of scheme.The high private information of a lot of user has been bound at present, such as bank card, payment on smart mobile phone Information and above-mentioned Internet resources encrypted message etc..For this category information, on smart mobile phone, how safety stores, by illegally How user's malice prevents from being cracked after obtaining, and current universal method is " soft binding ", it is simply that application software is produced by self Key, then uses AES to be responsible for self and uses the safety of resource information.But this mode is broken in current numerous violences Solve security intensity in face of software the highest.Additionally, a kind of mode is the positioning service using mobile phone (" searches me such as Fructus Mali pumilae IPhone application program " and " the Android device manager " of Google) solve to deposit on mobile phone after smart mobile phone is lost The safety of the data of storage, but the premise of this method is to need the mobile phone moment lost the most just can complete, and basic prevention is not Disabled user is to the reading of sensitive data file on mobile phone.
Summary of the invention
The invention provides a kind of user based on SIM card information being applicable to the electronic installation that smart mobile phone etc. comprises SIM close Code secure information storage method, and a kind of code management device.While being supplied to the Password management services that user is easy to use, Encrypted message is stored file and SIM uniquely identifies and carries out " binding firmly ", even if thus making people's malice obtain close Code information storage file, also cannot crack this document to obtain related clear data encrypted message.Meanwhile, this code management device is being used Time, the most also to check that the SIM of current smart mobile phone is whether effective, thus make when after user's lost mobile phone, Ke Yitong Ensure the ineffectivity of code management device on lost mobile phone after the SIM reporting the loss oneself in time, thus reach to protect self close The safety of code information.
Specifically, the technical solution used in the present invention is as follows:
A kind of user password information method for secure storing based on SIM card information, it is adaptable to comprise SIM electronic installation (as Smart mobile phone etc.), comprise the steps:
1) effectiveness of SIM in described electronic installation is checked;
2) for effective SIM, the unique identification information of SIM is extracted;
3) encrypted message of the unique identification information of SIM with the Internet resources of user is bound;
4) by step 3) binding result that generates carries out locally stored.
Further, step 3) it is encrypted operation when being bound by the encrypted message of the unique identification information of SIM with user, Generate ciphertext password, and carry out network resource identifier and corresponding ciphertext code data writing file operation, form message in cipher Breath file also stores.
Further, when user inquires about the user cipher of Internet resources, first pass through encrypted message file checking user input Network resource identifier is the most effective, if effectively, extracts the ciphertext corresponding to network resource identifier from encrypted message file Password;Then extract the unique identifier of SIM, use this unique identifier to carry out ciphertext password solving binding decryption oprerations, Obtain clear-text passwords, and this clear-text passwords is returned to user's query interface.
A kind of code management device based on SIM card information using said method, it is adaptable to comprise SIM electronic installation (as Smart mobile phone etc.), as it is shown in figure 1, include password acquisition module, Password Management module, cryptographic binding module and the binding of password solution Module, the workflow of each module is as follows:
(1) check that current SIM card is the most effective
The most whether the SIM that the Password Management module check of code management device is current can be used, can carry out over the mobile network Communication.If it is valid, normally enter code management device;Otherwise prompting user's SIM is illegal, it is impossible to use code management device.
(2) the Internet resources encrypted message of user is collected
User needs the identifier of each Internet resources of record and corresponding user cipher by the interface input of code management device, These information are arranged by password acquisition module and are sent to Password Management module with certain format.
(3) user bound Internet resources encrypted message
After Password Management module receives password relevant information data, extract the code data of wherein each Internet resources, these are close Code data pass to cryptographic binding module.
Cryptographic binding module receives after binding data, extracts the unique identification information of current smart mobile phone SIM, then makes Carry out binding cryptographic operation with this unique identification information and code data, generate ciphertext password.Then cryptographic binding module is by ciphertext Password returns to Password Management module.
(4) encrypted message file is generated
Network resource identifier and corresponding ciphertext code data are write by Password Management module according to the form of encrypted message file Enter file operation, form encrypted message file, then carry out locally stored.Fig. 2 is the structure of the encrypted message file of the present invention Exemplary plot.
(5) user cipher of Internet resources is inquired about
User's legal entrance code management device, inputs network resource identifier, and Password Management module first passes through encrypted message file Check that this identifier is the most effective, if invalid, the most directly return and inquire about unsuccessfully information;Otherwise, from encrypted message file Ciphertext password corresponding to middle extraction network resource identifier, is then sent to password solution binding module by this ciphertext password.
After password solution binding module receives ciphertext password, first extract the SIM unique identifier of current smart mobile phone, use Ciphertext password is carried out solving binding decryption oprerations by this unique identifier, it is thus achieved that clear-text passwords, then returns to close by this clear-text passwords Code management module.
Clear-text passwords information is returned to user's query interface by Password Management module.
(6) renewal of encrypted message file
User's legal entrance code management device, increases, deletes, revises Internet resources password record.
Increase operation
Password Management module sends acquisition to password acquisition module, password acquisition module gather new network resource identifier With corresponding user cipher, then new for Password Management new-added item is sent to Password Management module;
After Password Management module receives the new new-added item of Password Management, first increase newly according to locally stored encrypted message file checking Network resource identifier is the most legal.After legitimacy is passed through, clear-text passwords corresponding for this network resource identifier is sent to password Binding module;
Cryptographic binding module extracts the unique identification information of current smart mobile phone SIM, then by this unique identification information and plaintext Password carries out binding cryptographic operation, generates ciphertext password, then ciphertext password is returned to Password Management module;
The information such as newly-increased network resource identifier, ciphertext password are write by Password Management module according to the form of encrypted message file Existing encrypted message file, and carry out locally stored.
Deletion action
After Password Management module receives the deletion action of Password Management, item deleted by password user chosen, and passes through encrypted message The corresponding code data of Search and Orientation of file, forms new encrypted message file after deleting.
Amendment operation
After Password Management module receives the amendment operation of Password Management, send to password acquisition module and gather new Password Management item Instruction, and by searching encrypted message document alignment secret data item to be replaced, then password acquisition module is sent the Xinmi City of coming Code data are sent to cryptographic binding module, the bindings of request SIM;
Cryptographic binding module extracts the unique identification information of current smart mobile phone SIM, then by this unique identification information and plaintext Password carries out binding cryptographic operation, generates ciphertext code data, then ciphertext code data is returned to Password Management module;
Password Management module uses new ciphertext code data to replace old ciphertext code data, and forms new encrypted message file.
(7) derivation of encrypted message file and importing
Encrypted message file can be exported to carry out backup storage on other medium from mobile phone by user.Owing to the network of user provides Source pin information all " is bound " firmly with SIM card information, is therefore not required to worry the safety of the encrypted message file of derivation.
The encrypted message file of backup can also be imported in mobile phone from other medium by user, owing to this document is and SIM Binding, as long as SIM is constant, then the encrypted message file imported can be used easily.Replacing mobile phone behaviour as user Do not affect the normal use of encrypted message file.
(8) deletion certainly of encrypted message file
In order to ensure the safety of encrypted message file further, can force when checking current SIM card and being invalid, password pipe Local password message file on mobile phone is deleted, to prevent disabled user's acquisition to Cryptogram Information Data by reason software automatically.
Further, for making the present invention have more preferable effect, it is also possible to there is a following additional technical feature:
(1) Password Management software can not preserve the direct password of Internet resources, but preserves information, strengthens further The safety of encrypted message;
(2) encrypted message file can be carried out segmentation stand alone type " binding firmly " encryption, it is ensured that the user of each Internet resources The binding encryption key that password uses is the most all separate, so can improve the safety of code management device further. Because user uses code management device to be to look at the user cipher of certain Internet resources every time, unified key encryption and decryption can add The risk that large user's password is revealed.Therefore the encrypted message of each Internet resources is carried out independent encryption and decryption and can reduce use further The disclosure risk of family private data;
(3) unique identifier of SIM can be written in encrypted message file with ciphertext form, thus can meet After user's legal replacing SIM, the encrypted message file bound by old SIM is updated to use the binding of new SIM. But while bringing user's ease for use, also reduce the safety of encrypted message file to a certain extent.Mobile phone can be used User Identity symbol (such as subscriber phone number), or higher PIN code is encrypted place to SIM unique identifier Reason, to make up the security risk that above-mentioned bindings again is brought;
(4) code management device can be set software in various degree and use password, further to the password sensitive information of user Strengthen security protection;
(5) unique identifier of SIM can be freestanding, it is also possible to is knockdown.As long as meeting uniqueness and having Effect property, all can carry out " binding firmly " to the Internet resources encrypted message of user.In actual applications, multiple SIM can be extracted Effective unique information of card, is combined encapsulation, ultimately generates a unique identifier and bind with encrypted message file. Additionally, for a machine plurality of SIM cards situation, one or more SIM can be selected same according to the actually used situation of user Shi Jinhang " binding firmly " operation.
The beneficial effects of the present invention is: first, the Internet resources encrypted message of user is carried out with the SIM card information of smart mobile phone Hardware binding, while providing the user and facilitating easy-to-use Password management services, has ensured the peace of user password information well Quan Xing;Secondly, the most effective by checking the SIM of current smart mobile phone, ensure the safe handling of code management device, enter One step protection user password information data;Further, encrypted message file is bound with SIM, changes the feelings of mobile phone user Under condition, do not affect the use of existing Password Management, improve the ease for use of user;Finally, the Internet resources encrypted message to user Carry out segmentation separate bind operation, the safety of encrypted message can be strengthened further and crack difficulty.
Accompanying drawing explanation
Fig. 1 is the code management device structure chart of the present invention.
Fig. 2 is the encrypted message file structure figure of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawings the detailed description of the invention of the present invention is further described.Embodiment 1 is that user uses code management device Newly-increased Internet resources code data, embodiment 2 is that user uses code management device to inquire about the encrypted message of certain Internet resources.
Embodiment 1:
The embodiment 1 that the present invention provides is that the IMSI using SIM increases password newly as the code management device of unique identification information Management item flow scheme.Specifically include following steps:
(1) effectiveness of SIM is checked
User inputs code management device and uses password, enters code management device software.
Code management device checks mobile network's whether successful connection of current phone SIM, successful then carry out next step;Otherwise, Access the encrypted message file that mobile phone is locally stored, if file exists, the most directly delete.Be then back to " SIM is illegal, Current password manager software cannot be used!" etc. information;
(2) newly-increased Internet resources Password Management information
After cellphone subscriber's legal entrance code management device, by the user network resource mark that the newly-increased interface typing of code management device is new Know symbol NewWebsiteID and corresponding user cipher NewWebsitePW.After user confirms, first code management device obtains this The encrypted message file of ground storage, if it is not, directly carry out next step;
Code management device accesses the inquiry table of encrypted message file, checks that the newest network resource identifier exists the most.As Fruit exists, returns informations such as " current network resources password set ";Otherwise, next step is carried out;
(3) binding Internet resources encrypted message
First code management device generates management ID, the then IMSI of reading SIM card for newly-increased Password Management item, uses IMSI Newly-increased Internet resources password NewWebsitePW is carried out binding encryption, obtains cryptographic binding encrypted result NewCipherPW:
NewCipherPW=E (NewWebsitePW, IMSI);
(4) new encrypted message file is generated
Code management device is by newly-increased Password Management item information: management ID, NewWebsiteID and NewCipherPW are written to close Code message file, and carry out the local preservation of encrypted message file.
Embodiment 2:
The embodiment 2 that the present invention provides is the IMSI the using SIM code management device password for inquiry as unique identification information The flow scheme of management item.Specifically include following steps:
(1) effectiveness of SIM is checked
User inputs code management device and uses password, enters code management device software.
Code management device checks mobile network's whether successful connection of current phone SIM, successful then carry out next step;Otherwise, Access the encrypted message file that mobile phone is locally stored, if file exists, the most directly delete.Be then back to " SIM is illegal, Current password manager software cannot be used!" etc. information;
(2) network resource identifier to be checked is inputted
After user's legal entrance code management device, input network resource identifier WebsiteID to be inquired about.
Code management device obtains locally stored encrypted message file, and therefrom inquires about WebsiteID, if inquiring about unsuccessfully, then returns Return informations such as " without this Password Management items ";Successful inquiring, carries out next step;
(3) Internet resources encrypted message is obtained
Code management device reads corresponding Internet resources cryptographic binding result according to network resource identifier WebsiteID CipherPW。
The IMSI of code management device reading SIM card, uses IMSI to carry out CipherPW solving binding decryption oprerations, obtains close The solution binding result WebsitePW of code information:
WebsitePW=D (CipherPW, IMSI).
WebsitePW is returned to user's query interface by code management device.
It can be seen that the present invention has the effect that from above-described embodiment
1. the unique identification information of the encrypted message of user network resource Yu SIM is carried out " binding firmly " by code management device, both Facilitating user effectively to manage oneself Internet resources password, the sensitive information data to user provide safer guarantor simultaneously Protect measure;
2. the code management device inspection to SIM effectiveness, can improve the security accessing user password information further and arrange Execute, disabled user's reading to user password information after effectively preventing user mobile phone from losing;
3. encrypted message and the binding of SIM, do not affect the replacing of user mobile phone, can preferably meet user raw in reality Application in work;
4. code management device carries out the binding of segmentation stand alone type can to strengthen user further close the encrypted message of each Internet resources The safety of code information data, that strengthens disabled user cracks difficulty.
Above example is only limited in order to technical scheme to be described, those of ordinary skill in the art can Technical scheme is modified or equivalent, without departing from the spirit and scope of the present invention, the guarantor of the present invention The scope of protecting should be as the criterion with described in claims.

Claims (10)

1. a user password information method for secure storing based on SIM card information, it is adaptable to comprise the electronic installation of SIM, its Being characterised by, the method comprises the steps:
1) effectiveness of SIM in electronic installation is checked;
2) for effective SIM, the unique identification information of SIM is extracted;
3) encrypted message of the unique identification information of SIM with the Internet resources of user is bound;
4) by step 3) binding result that generates carries out locally stored.
2. the method for claim 1, it is characterised in that: step 3) close by the unique identification information of SIM and user It is encrypted operation during code information binding, generates ciphertext password, and by network resource identifier and corresponding ciphertext code data Carry out writing file operation, form encrypted message file and store.
3. method as claimed in claim 2, it is characterised in that: when user inquires about the user cipher of Internet resources, first pass through close Code message file checks that the network resource identifier of user's input is the most effective, if effectively, extracts from encrypted message file Ciphertext password corresponding to network resource identifier;Then extract the unique identification information of SIM, use this uniquely to identify Ciphertext password is carried out solving binding decryption oprerations by information, it is thus achieved that clear-text passwords, and this clear-text passwords is returned to user inquires about boundary Face.
4. method as claimed in claim 3, it is characterised in that: the user cipher of each Internet resources is used separate key Deciphering during binding is conciliate in encryption when binding.
5. method as claimed in claim 2, it is characterised in that: step 3) unique identification information of SIM is write with ciphertext form Entering in encrypted message file, after user's legal replacing SIM, the encrypted message file bound by old SIM updates For using the encrypted message file of new SIM binding.
6. the method as according to any one of Claims 1 to 5, it is characterised in that: step 3) described encrypted message is that Internet resources are straight The password connect, or the information of this password.
7. the method as according to any one of Claims 1 to 5, it is characterised in that step 2) unique identification information of described SIM, It is the unique identification information of single SIM, or is combined only by the unique identification information of at least two SIM One identification information.
8. the method as according to any one of Claims 1 to 5, it is characterised in that: when checking current SIM card and being invalid, automatically Described encrypted message file is deleted, to prevent disabled user from obtaining Cryptogram Information Data.
9. a code management device based on SIM card information, it is adaptable to comprise the electronic installation of SIM, it is characterised in that include Password acquisition module, Password Management module, cryptographic binding module and password solution binding module;
The current SIM of described Password Management module check is the most effective, if effectively, making user normally enter Password Management Device, otherwise prompting user's SIM is illegal, makes user can not use code management device;Described password acquisition module collection is used The identifier of each Internet resources of family input and corresponding user cipher, and it is sent to described Password Management module;Described close Code binding module obtains the code data of user from described Password Management module, and it is uniquely identified letter with current SIM card Breath carries out binding cryptographic operation, generates ciphertext password, and is sent to described Password Management module;Described Password Management module will Network resource identifier and corresponding ciphertext code data carry out writing file operation, form encrypted message file;
When user inquires about the user cipher of Internet resources, described Password Management module is defeated by encrypted message file checking user The network resource identifier entered is the most effective, if effectively, extracts corresponding to network resource identifier from encrypted message file Ciphertext password, then this ciphertext password is sent to described password solution binding module;Described password solution binding module receives After ciphertext password, extract the unique identification information of current SIM card, use this unique identification information that ciphertext password is solved Binding decryption oprerations, it is thus achieved that clear-text passwords, then returns to described Password Management module, described password pipe by this clear-text passwords Clear-text passwords information is returned to user's query interface by reason module.
10. code management device as claimed in claim 9, it is characterised in that: described Password Management module, password acquisition module, close Code binding module and password solution binding module be additionally operable to realize user to the increase of Internet resources password record, delete and revise behaviour Make.
CN201510345430.1A 2015-06-19 2015-06-19 Encrypted message method for secure storing and code management device based on SIM card information Active CN106330819B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510345430.1A CN106330819B (en) 2015-06-19 2015-06-19 Encrypted message method for secure storing and code management device based on SIM card information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510345430.1A CN106330819B (en) 2015-06-19 2015-06-19 Encrypted message method for secure storing and code management device based on SIM card information

Publications (2)

Publication Number Publication Date
CN106330819A true CN106330819A (en) 2017-01-11
CN106330819B CN106330819B (en) 2019-04-30

Family

ID=57727529

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510345430.1A Active CN106330819B (en) 2015-06-19 2015-06-19 Encrypted message method for secure storing and code management device based on SIM card information

Country Status (1)

Country Link
CN (1) CN106330819B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101568119A (en) * 2008-04-24 2009-10-28 鸿富锦精密工业(深圳)有限公司 Mobile terminal with antitheft function and antitheft method thereof
CN101677442A (en) * 2008-09-17 2010-03-24 艾威梯科技(北京)有限公司 Method and equipment for automatically logging in application programs
CN101815291A (en) * 2010-03-22 2010-08-25 中兴通讯股份有限公司 Method and system for logging on client automatically
CN101895513A (en) * 2009-05-20 2010-11-24 广州盛华信息技术有限公司 Log-in authentication system for service website and implementation method
US20140177830A1 (en) * 2012-09-03 2014-06-26 Nec Europe Ltd. Method and system for providing a public key/secret key pair for encrypting and decrypting data
KR20150004955A (en) * 2013-07-03 2015-01-14 주식회사 비즈모델라인 Method for Providing Authentication Code by using End-To-End Authentication between USIM and Server

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101568119A (en) * 2008-04-24 2009-10-28 鸿富锦精密工业(深圳)有限公司 Mobile terminal with antitheft function and antitheft method thereof
CN101677442A (en) * 2008-09-17 2010-03-24 艾威梯科技(北京)有限公司 Method and equipment for automatically logging in application programs
CN101895513A (en) * 2009-05-20 2010-11-24 广州盛华信息技术有限公司 Log-in authentication system for service website and implementation method
CN101815291A (en) * 2010-03-22 2010-08-25 中兴通讯股份有限公司 Method and system for logging on client automatically
US20140177830A1 (en) * 2012-09-03 2014-06-26 Nec Europe Ltd. Method and system for providing a public key/secret key pair for encrypting and decrypting data
KR20150004955A (en) * 2013-07-03 2015-01-14 주식회사 비즈모델라인 Method for Providing Authentication Code by using End-To-End Authentication between USIM and Server

Also Published As

Publication number Publication date
CN106330819B (en) 2019-04-30

Similar Documents

Publication Publication Date Title
US9930040B2 (en) System and method for provisioning a security token
CN102497635B (en) Server, terminal and account password acquisition method
CN108989346B (en) Third-party valid identity escrow agile authentication access method based on account hiding
CN103607416B (en) A kind of method and application system of the certification of network terminal machine identity
US20140136840A1 (en) Computer system for storing and retrieval of encrypted data items using a tablet computer and computer-implemented method
CN109688133B (en) Communication method based on account login free
US20080120698A1 (en) Systems and methods for authenticating a device
CN102546664A (en) User and authority management method and system for distributed file system
CN104811428A (en) Method, device and system for verifying client identity by social relation data
KR20140042905A (en) Identity authentication and management device and method thereof
CN109151820A (en) One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 "
CN101166094A (en) A method for client to automatically log in the server via intelligent encryption mode
CN103916366A (en) Login method, maintenance terminal, data management service equipment and login system
CN101321064A (en) Information system access control method and apparatus based on digital certificate technique
CN103825863B (en) A kind of accounts management method and device
CN105656862A (en) Authentication method and device
CN106789024A (en) A kind of remote de-locking method, device and system
CN101009558A (en) Real name system and method for network access
CN105224262A (en) Data processing method
CN110995661B (en) Network card platform
CN105743883B (en) A kind of the identity attribute acquisition methods and device of network application
KR101221728B1 (en) The certification process server and the method for graphic OTP certification
US20220343025A1 (en) Process for managing the rights and assets of a user on a blockchain
CN106330819A (en) Cipher information secure storage method and cipher manager based on SIM card information
CN106570416A (en) Fingerprint-based cloud storage method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant