CN106446684B - A kind of network account guard method and system based on password control - Google Patents
A kind of network account guard method and system based on password control Download PDFInfo
- Publication number
- CN106446684B CN106446684B CN201610841169.9A CN201610841169A CN106446684B CN 106446684 B CN106446684 B CN 106446684B CN 201610841169 A CN201610841169 A CN 201610841169A CN 106446684 B CN106446684 B CN 106446684B
- Authority
- CN
- China
- Prior art keywords
- module
- modules
- live streaming
- program
- application program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 230000002159 abnormal effect Effects 0.000 claims abstract description 40
- 238000001914 filtration Methods 0.000 claims abstract description 16
- 230000006870 function Effects 0.000 claims description 32
- 238000001514 detection method Methods 0.000 claims description 24
- 230000008569 process Effects 0.000 claims description 24
- 238000012544 monitoring process Methods 0.000 claims description 23
- 238000011835 investigation Methods 0.000 claims description 15
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of network account guard method and system based on password control are related to network account protection field.Steps of the method are: all normal modules to be loaded are needed when obtaining live streaming safety operation of applied program, all normal modules are saved to form white list;All modules loaded when timing acquisition live streaming application program operation;In all modules, after filtering out all normal modules in white list, the remaining module in addition to the module in white list is obtained;Judge whether each remaining module is hook program respectively, if so, determining that current block is abnormal module, otherwise determines that current block is normal mode block.The present invention can periodically detect whether the operation of live streaming application program is safe, and the account for significantly reducing live streaming application program usurps rate, ensure that main broadcaster uses the safety of live streaming application program.
Description
Technical field
The present invention relates to network accounts to protect field, and in particular to a kind of network account guard method based on password control
And system.
Background technique
Currently, live streaming platform can be provided on PC (personal computer, personal computer) it is a kind of for main broadcaster be broadcast live
Software (application program), the software is for acquiring main broadcaster's video content and be broadcast live.When main broadcaster uses the software, need defeated
Enter itself unique account and corresponding password is logged in.
Currently, the operating system program of PC generally uses Windows, and Windows provides a kind of Hook Mechanism, wherein
Including keyboard hook program, which can be prior to getting all keyboard operations before application program.Therefore, if using straight
Keyboard hook program is opened in the case where " ignorant " while broadcasting application program, then the publisher of hook program can obtain
Know the account and password of the main broadcaster using current PC computer.
Therefore, the existing live streaming application program being installed on PC using when often there is the risk of steal-number, main broadcaster's makes
It is difficult to ensure with safety.
Summary of the invention
In view of the deficiencies in the prior art, present invention solves the technical problem that are as follows: detection live streaming application program operation
When the abnormal module that loads.Whether safely the present invention can periodically detect the operation of live streaming application program, significantly reduce live streaming and answer
Rate is usurped with the account of program, ensure that main broadcaster uses the safety of live streaming application program.
To achieve the above objectives, the network account guard method provided by the invention based on password control, including following step
It is rapid:
S1: needing all normal modules to be loaded when obtaining live streaming safety operation of applied program, and all normal modules are protected
It deposits to form white list, goes to S2;
S2: all modules loaded when timing acquisition live streaming application program operation go to S3;
S3: it in all modules, after filtering out all normal modules in white list, obtains arranging except white list
Remaining module except module in table, goes to S4;
S4: judge whether each remaining module is hook program respectively, if so, determining that current block is abnormal module, turn
To S5;Otherwise determine that current block is normal mode block, goes to S5;
S5: judging whether current live application program runs and finish, if so, terminating, otherwise continues to execute S2.
The network account based on password control provided by the invention for realizing the above method protects system, including white list column
Table obtains module, timing detection module, abnormal filtering module, abnormal investigation module and program use state monitoring module;
White list obtains module and is used for: needing all normal modes to be loaded when obtaining live streaming safety operation of applied program
All normal modules are saved to form white list by block, detect signal to timing detection module transmission timing;
Timing detection module is used for: after receiving timing detection signal, what timing acquisition live streaming application program loaded when running
All modules, Xiang Yichang filtering module send abnormal trap signal;
Abnormal filtering module is used for: after receiving abnormal trap signal, in all modules, filtering out white list
In all normal modules after, obtain the remaining module in addition to the module in white list, sent to abnormal investigation module
Abnormal investigation signal;
Abnormal investigation module is used for: after receiving abnormal investigation signal, judging whether each remaining module is hook journey respectively
Sequence, if so, determining that current block is abnormal module, Xiang Chengxu use state monitoring module sends program use state monitoring letter
Number;Otherwise determine that current block is normal mode block, Xiang Chengxu use state monitoring module sends program use state monitoring signal;
Program use state monitoring module is used for: after receiving program use state monitoring signal, judging timing detection module
Whether the live streaming application program of detection, which runs, finishes, if so, terminating, otherwise detects signal to timing detection module transmission timing.
Compared with the prior art, the advantages of the present invention are as follows:
All modules for the loading when present invention understands timing acquisition live streaming application program operation, after filtering safe module, to surplus
Remaining each module carries out detecting whether that there are hook programs, if so, proving that the module is abnormal module.Therefore, with it is existing
Live streaming application program in technology there are steal-number risk is compared, and the present invention can periodically detect whether live streaming application program operation is pacified
Entirely, the account for significantly reducing live streaming application program usurps rate, ensure that main broadcaster uses the safety of live streaming application program.
Detailed description of the invention
Fig. 1 is the flow chart of the network account guard method based on password control in the embodiment of the present invention.
Specific embodiment
Invention is further described in detail with reference to the accompanying drawings and embodiments.
It is shown in Figure 1, the network account guard method based on password control in the embodiment of the present invention, including following step
It is rapid:
S1: needing all normal modules to be loaded when obtaining live streaming safety operation of applied program, and all normal modules are protected
It deposits to form white list, goes to S2.
The acquisition process of all normal modules to be loaded is needed when safety operation of applied program being broadcast live in S1 are as follows: safety in advance
A PC is authenticated, the operation live streaming application program on the PC obtains all modules of live streaming application program load, as normal mode
Block (module that live streaming application program is loaded when running on the PC of safety, centainly need normal module to be loaded).
S2: add when application program operation is broadcast live by Windows api function EnumProcessModules timing acquisition
All modules carried, go to S3.
S3: in all modules that S2 is obtained, filtering out all normal modules in white list, obtains except white list
Remaining module except module in list, is further detected to go to S4.
S4: judging whether each remaining module is hook program respectively, if so, determining that current block is abnormal module, hair
S5 is gone to after alarm (such as prompting the user whether to carry out checking and killing virus etc.) out, otherwise determines that current block is normal mode block, directly
It is switched to S5.Since hook program inherently uses the function in Windows module User32.dll
SetWindowsHookEx, therefore whether the present invention uses function SetWindowsHookEx by the remaining module of detection, if
It is then to prove that current block is abnormal module, otherwise proves that current block is normal mode block.
S5: judging whether current live application program runs and finish, if so, terminating, otherwise continues to execute S2.
The detailed process of all modules loaded when live streaming application program operation is obtained in S2 are as follows:
S201: the handle hProcess of process corresponding with live streaming application program is obtained:
HANDLE hProcess=GetCurrentProcess ();
Wherein GetCurrentProcess represents the acquisition process handle API of Windows offer.
S202: according to the handle of process in S201, the handle of all modules of process load is obtained
EnumProcessModules:
EnumProcessModules(
HANDLE hProcess,
HMODULE*lphModule,
DWORD cb,
LPDWORD lpcbNeeded);
Wherein parameter hProcess inserts the handle of the process obtained in S201, and parameter lphModule, which is represented, to be used to save
The module handle list got, parameter cb represent the number of handles that lphModule can be stored;Parameter lpcbNeeded is represented
The number of handles actually got.
S203: the corresponding module title of each handle is obtained by GetModuleFileNameEx:
GetModuleFileNameEx(
HANDLE hProcess,
HMODULE hModule,
LPTSTR lpFilename,
DWORD nSize);
Wherein parameter hProcess is identical as S202, the handle of all modules obtained in parameter hModule filling S202,
Parameter lpFilename represents the corresponding module title of each handle, and parameter nSize represents the space size of lpFilename.
The principle whether remaining module uses function SetWindowsHookEx is detected in S4 are as follows: one module of detection makes
When using which function, needs to read the importing table of the module, the function that the module uses is stored in importing table.In this base
On plinth, the detailed process whether remaining module uses function SetWindowsHookEx is detected are as follows:
S401: according to the handle (hMoudle) of remaining module, obtaining the DOS head (DosHeader) of current residual module,
The NT head (NtHeader) of current residual module is obtained according to DOS:
PIMAGE_DOS_HEADER pDosHeader=(PIMAGE_DOS_HEADER) hMoudle;
PIMAGE_NT_HEADERS pNtHeader=(PIMAGE_NT_HEADERS) (hMoudle+pDosHeader- >
e_lfanew)。
S402: the importing table index (MAGE_DIRECTORY_ENTRY_IMPORT) of current residual module is determined, according to this
Index obtains the importing table of current residual module;Determine starting of the importing table relative to the current residual module stored in NT
The offset (dwIat) of memory address:
DWORD=pNtHeader- > OptionalHeader.DataDirectory [IMAGE_DIRECTORY_ENTRY_
IMP ORT].VirtualAddress。
S403: the current memory address (pImport) for importing table is determined according to dwIat:
PIMAGE_IMPORT_DESCRIPTOR pImport=(PIMAGE_IMPORT_DESCRIPTOR) (hMoudle+
dwIat)。
S404: the function used that current residual module uses is obtained in importing table, judges to whether there is in all functions
Otherwise function SetWindowsHookEx proves to work as if so, proving that current block uses function SetWindowsHookEx
Function SetWindowsHookEx is not used in front module.
The network account based on password control provided by the invention for realizing the above method protects system, including white list column
Table obtains module, timing detection module, abnormal filtering module, abnormal investigation module and program use state monitoring module.
White list obtains module and is used for: needing all normal modes to be loaded when obtaining live streaming safety operation of applied program
(one PC of advanced security authentication, the operation live streaming application program on the PC, obtains all moulds of live streaming application program load to block
Block), all normal modules are saved to form white list, detect signal to timing detection module transmission timing.
Timing detection module is used for: after receiving timing detection signal, what timing acquisition live streaming application program loaded when running
All modules (obtain the handle of process corresponding with live streaming application program;According to the handle of the process, process load is obtained
The handle of all modules;Obtain the corresponding module title of each handle), Xiang Yichang filtering module sends abnormal trap signal.
Abnormal filtering module is used for: after receiving abnormal trap signal, in all modules, filtering out white list
In all normal modules after, obtain the remaining module in addition to the module in white list, sent to abnormal investigation module
Abnormal investigation signal.
Abnormal investigation module is used for: after receiving abnormal investigation signal, judging whether each remaining module is hook journey respectively
Whether sequence (uses function SetWindowsHookEx), if so, determining that current block is abnormal module, issues Xiang Cheng after alarm
Sequence use state monitoring module sends program use state monitoring signal;Otherwise determine that current block is normal mode block, Xiang Chengxu
Use state monitoring module sends program use state monitoring signal;Detailed process are as follows:
According to the handle of remaining module, the DOS head of current residual module is obtained, according to DOS acquisition current residual modules
NT head, storage has the starting memory address of current residual module in NT;Determine the importing table index of current residual module, root
The importing table of current residual module is obtained according to the index;Determine starting memory address of the importing table relative to current residual module
Offset;
According to offset of the table relative to the starting memory address of current residual module is imported, the current memory for importing table is determined
Address;The function used that current residual module uses is obtained in importing table, is judged in all functions with the presence or absence of function
Otherwise SetWindowsHookEx proves current mould if so, proving that current block uses function SetWindowsHookEx
Function SetWindowsHookEx is not used in block.
Program use state monitoring module is used for: after receiving program use state monitoring signal, judging timing detection module
Whether the live streaming application program of detection, which runs, finishes, if so, terminating, otherwise detects signal to timing detection module transmission timing.
The present invention is not limited to the above-described embodiments, for those skilled in the art, is not departing from
Under the premise of the principle of the invention, several improvements and modifications can also be made, these improvements and modifications are also considered as protection of the invention
Within the scope of.The content being not described in detail in this specification belongs to the prior art well known to professional and technical personnel in the field.
Claims (10)
1. a kind of network account guard method based on password control, which is characterized in that method includes the following steps:
S1: needing all normal modules to be loaded when obtaining live streaming safety operation of applied program, and all normal modules are saved shape
At white list, S2 is gone to;
S2: all modules loaded when timing acquisition live streaming application program operation go to S3;
S3: it in all modules, after filtering out all normal modules in white list, obtains except in white list
Module except remaining module, go to S4;
S4: judging whether each remaining module is keyboard hook program respectively, if the remaining module of judgement is keyboard hook program,
It then determines that current block is abnormal module, goes to S5 after issuing alarm;If the remaining module of judgement is not keyboard hook program,
It determines that current block is normal mode block, goes to S5;
S5: Xiang Chengxu use state monitoring module sends program use state monitoring signal, for judging that application program, which is broadcast live, is
No operation finishes, if so, terminating, otherwise continues to execute S2.
2. as described in claim 1 based on the network account guard method of password control, it is characterised in that: be broadcast live described in S1
The acquisition process of all normal modules to be loaded is needed when safety operation of applied program are as follows: one PC of pre-authentication, on the PC
Operation live streaming application program, obtains all modules of live streaming application program load, all modules are normal module.
3. as described in claim 1 based on the network account guard method of password control, it is characterised in that: obtained described in S2
The detailed process of all modules loaded when live streaming application program operation are as follows:
S201: the handle of process corresponding with live streaming application program is obtained;
S202: according to the handle of the process, the handle of all modules of process load is obtained;
S203: the corresponding module title of each handle is obtained.
4. as described in claim 1 based on the network account guard method of password control, it is characterised in that: the detailed process of S4
Are as follows: detect whether each remaining module uses function SetWindowsHookEx respectively, if so, determining that current block is different
Otherwise norm block determines that current block is normal mode block.
5. as claimed in claim 4 based on the network account guard method of password control, it is characterised in that: detected described in S4
Whether each residue module uses the detailed process of function SetWindowsHookEx are as follows:
S401: according to the handle of remaining module, the DOS head of current residual module is obtained, according to DOS acquisition current residual modules
NT head, storage has the starting memory address of current residual module in NT;
S402: determining the importing table index of current residual module, and the importing table of current residual module is obtained according to the index;It determines
Offset of the importing table relative to the starting memory address of current residual module;
S403: according to offset of the table relative to the starting memory address of current residual module is imported, the interior of current importing table is determined
Deposit address;
S404: all functions that current residual module uses are obtained in importing table, are judged in all functions with the presence or absence of function
Otherwise SetWindowsHookEx proves current mould if so, proving that current block uses function SetWindowsHookEx
Function SetWindowsHookEx is not used in block.
6. a kind of network account protection system based on password control for realizing any one of claim 1 to 5 the method, special
Sign is, the system include white list obtain module, timing detection module, abnormal filtering module, abnormal investigation module and
Program use state monitoring module;
White list obtains module and is used for: all normal modules to be loaded are needed when obtaining live streaming safety operation of applied program,
All normal modules are saved to form white list, detect signal to timing detection module transmission timing;
Timing detection module is used for: after receiving timing detection signal, timing acquisition live streaming application program loads all when running
Module, Xiang Yichang filtering module send abnormal trap signal;
Abnormal filtering module is used for: after receiving abnormal trap signal, in all modules, being filtered out in white list
After all normal modules, the remaining module in addition to the module in white list is obtained, is sent to abnormal investigation module abnormal
Check signal;
Abnormal investigation module is used for: after receiving abnormal investigation signal, judging whether each remaining module is keyboard hook journey respectively
Sequence, if the remaining module of judgement is keyboard hook program, it is determined that current block is abnormal module, the monitoring of Xiang Chengxu use state
Module sends program use state monitoring signal;If the remaining module of judgement is not keyboard hook program, it is determined that current block
For normal mode block, Xiang Chengxu use state monitoring module sends program use state monitoring signal;
Program use state monitoring module is used for: after receiving program use state monitoring signal, judging that timing detection module detects
Live streaming application program whether run and finish, if so, terminating, otherwise detect signal to timing detection module transmission timing.
7. the network account based on password control protects system as claimed in claim 6, it is characterised in that: the white list column
Table obtains the workflow that all normal modules to be loaded are needed when module obtains live streaming safety operation of applied program are as follows: recognizes in advance
A PC is demonstrate,proved, the operation live streaming application program on the PC obtains all modules of live streaming application program load, all modules
It is normal module.
8. the network account based on password control protects system as claimed in claim 6, it is characterised in that: the timing detection
The detailed process of all modules loaded when live streaming application program operation is obtained in module are as follows: obtain corresponding with live streaming application program
The handle of process;According to the handle of the process, the handle of all modules of process load is obtained;It is corresponding to obtain each handle
Module title.
9. the network account based on password control protects system as claimed in claim 6, it is characterised in that: the abnormal investigation
The specific workflow of module are as follows: detect whether each remaining module uses function SetWindowsHookEx respectively, if so,
It then determines that current block is abnormal module, otherwise determines that current block is normal mode block.
10. the network account based on password control protects system as claimed in claim 9, it is characterised in that: the abnormal row
It looks into module and detects the detailed process whether each remaining module uses function SetWindowsHookEx are as follows:
According to the handle of remaining module, the DOS head of current residual module is obtained, the NT of current residual module is obtained according to DOS
Head, storage has the starting memory address of current residual module in NT;The importing table index for determining current residual module, according to this
Index obtains the importing table of current residual module;Determine that the importing table originates the inclined of memory address relative to current residual module
It moves;
According to offset of the table relative to the starting memory address of current residual module is imported, with determining the current memory for importing table
Location;All functions that current residual module uses are obtained in importing table, are judged in all functions with the presence or absence of function
Otherwise SetWindowsHookEx proves current mould if so, proving that current block uses function SetWindowsHookEx
Function SetWindowsHookEx is not used in block.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610841169.9A CN106446684B (en) | 2016-09-22 | 2016-09-22 | A kind of network account guard method and system based on password control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610841169.9A CN106446684B (en) | 2016-09-22 | 2016-09-22 | A kind of network account guard method and system based on password control |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106446684A CN106446684A (en) | 2017-02-22 |
CN106446684B true CN106446684B (en) | 2019-12-03 |
Family
ID=58167345
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610841169.9A Expired - Fee Related CN106446684B (en) | 2016-09-22 | 2016-09-22 | A kind of network account guard method and system based on password control |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106446684B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102663318A (en) * | 2012-03-22 | 2012-09-12 | 百度在线网络技术(北京)有限公司 | Browser and client |
CN102999726A (en) * | 2012-12-14 | 2013-03-27 | 北京奇虎科技有限公司 | File macro virus immunization method and device |
CN103034809A (en) * | 2012-12-14 | 2013-04-10 | 北京奇虎科技有限公司 | Method and device for immunizing file macro virus |
CN104536981A (en) * | 2014-12-05 | 2015-04-22 | 北京奇虎科技有限公司 | Browser safety achieving method, browser client-side and device |
CN105844146A (en) * | 2016-03-16 | 2016-08-10 | 北京金山安全软件有限公司 | Method and device for protecting driver and electronic equipment |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101114323A (en) * | 2006-07-28 | 2008-01-30 | 上海山丽信息安全有限公司 | Device for monitoring keyboard hook |
US20080247746A1 (en) * | 2007-04-05 | 2008-10-09 | David Law | Tripod Mounting, Stand, or Support Attachment, Accessory, or Mechanism for Cameras and Similar Devices or Objects |
CN101483658B (en) * | 2009-01-09 | 2012-11-28 | 招商银行股份有限公司 | System and method for input content protection of browser |
CN102866893B (en) * | 2012-09-24 | 2014-11-26 | 南京工业大学 | Legacy software structure extracting method based on intermediate language IL |
CN103034800B (en) * | 2012-12-14 | 2017-06-20 | 北京奇虎科技有限公司 | Device and a method for intercepting pop-up windows |
CN105069351A (en) * | 2015-07-23 | 2015-11-18 | 浪潮电子信息产业股份有限公司 | Apparatus and method for preventing stealing of login information of application program |
-
2016
- 2016-09-22 CN CN201610841169.9A patent/CN106446684B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102663318A (en) * | 2012-03-22 | 2012-09-12 | 百度在线网络技术(北京)有限公司 | Browser and client |
CN102999726A (en) * | 2012-12-14 | 2013-03-27 | 北京奇虎科技有限公司 | File macro virus immunization method and device |
CN103034809A (en) * | 2012-12-14 | 2013-04-10 | 北京奇虎科技有限公司 | Method and device for immunizing file macro virus |
CN104536981A (en) * | 2014-12-05 | 2015-04-22 | 北京奇虎科技有限公司 | Browser safety achieving method, browser client-side and device |
CN105844146A (en) * | 2016-03-16 | 2016-08-10 | 北京金山安全软件有限公司 | Method and device for protecting driver and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106446684A (en) | 2017-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11914693B2 (en) | Fingerprint recognition method and apparatus, and touchscreen terminal | |
CN102624677B (en) | Method and server for monitoring network user behavior | |
CN102413221B (en) | Method for protecting privacy information and mobile terminal | |
CN109829297A (en) | Monitoring device, method and its computer storage medium | |
CN107792009A (en) | Vehicle starting method and device based on driver identity certification | |
EP2278523A3 (en) | Network access protection | |
CN109413091A (en) | A kind of network security monitoring method and apparatus based on internet-of-things terminal | |
CN106656455B (en) | Website access method and device | |
CN102413220B (en) | Method for controlling right of using connection function and mobile terminal | |
CN105589647A (en) | Unlocking system and method | |
CN104063642A (en) | Intelligent terminal safety authentication method and device based on pressure sensor | |
CN105184135A (en) | Fingerprint recognition method and fingerprint recognition system | |
CN101561855B (en) | Method and system for controlling computer to access USB device | |
CN105701386A (en) | Security certification method and device | |
WO2019071810A1 (en) | Device unlocking control method, apparatus, device and storage medium | |
CN105530637A (en) | Method for protecting subscriber privacy of intelligent terminal and intelligent terminal | |
CN106446684B (en) | A kind of network account guard method and system based on password control | |
CN106598661A (en) | Method and system for dynamically updating plug-in | |
CN106599843A (en) | Fingerprint authentication method and device | |
CN109284636A (en) | A kind of webpage tamper resistant systems and method | |
CN104754574A (en) | SIM card, anti-cloning method thereof and device | |
CN102968588B (en) | Intelligent terminal system | |
CN104937602B (en) | Privacy protection method and electronic equipment | |
CN111212041B (en) | Mobile storage medium illegal external connection alarm system and method | |
CN103916391B (en) | A kind of method and system preventing illegal external connection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20191203 |