CN106789848A - A kind of user key storage method and server - Google Patents
A kind of user key storage method and server Download PDFInfo
- Publication number
- CN106789848A CN106789848A CN201510819162.2A CN201510819162A CN106789848A CN 106789848 A CN106789848 A CN 106789848A CN 201510819162 A CN201510819162 A CN 201510819162A CN 106789848 A CN106789848 A CN 106789848A
- Authority
- CN
- China
- Prior art keywords
- key
- user
- server
- user terminal
- key management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a kind of user key management method.Key Management server receives the key storage request for coming from user terminal first, and the temporary authentication token in asking key storage is authenticated, because temporary authentication token is that user is issued to user terminal after authentication server is logged in by authentication server, if therefore temporary authentication token authentication passes through, Key Management server in itself corresponding with user key storage space of inquiry, and can be stored ID is corresponding with key information into key storage space.So as to without setting the storage that special purpose interface realizes user key between servers again, greatly simplify development process and reduce development cost, and development efficiency is improve while guaranteeing safety.
Description
Technical field
The application is related to communication technical field, more particularly to a kind of user key storage method.The application is same
When further relate to a kind of server.
Background technology
With continuing to develop for Internet technology, people can complete various oneself institute by internet now
The thing of needs.When user is provided by network or obtains service, it is typically necessary in service provider
Or Virtual network operator registers one's own account, and corresponding password is set.
In life at present, Internet service is varied, and user needs to register all kinds of websites, each net
Standing will have user name, password.Website can be simply divided into following two by significance level:
(1) finance accounts such as high priority account, such as bank, the account ID and password of the type are related to
And the property safety of user is, it is necessary to user is properly taken care of;
(2) low priority account, such as various forum's accounts, the only account of the type or registration are seen once
Just without managing again.
For the account number cipher for helping user record various, prior art proposes code management device to improve
Experience of the user in page browsing.Specifically, after registration is completed by certain website as user,
Code management device saves user name, password, is subsequently filled out automatically when user needs and logs in the website
User name, password are write, if user is not desired to oneself sets password, moreover it is possible to when user needs generation password certainly
Dynamic generation password.
As current utilization rate a code management device higher, the shape that Last Pass can be extended with browser
Formula is used, and can point out to preserve log-on message when any one website of User logs in, and subsequent user is accessed should
During website will Auto-writing logon form, exempt that memory account is close and the trouble that manually enters.With Last Pass
As a example by, the configuration diagram of key management system of the prior art is as shown in figure 1, its rear end needs deployment
Very heavy service is used for doing user index, data directory and data storage.And need to define front and back end
Interface.Therefore developer wants self-developing application and is deployed to provide service on service server, Er Qiekai
Originator needs oneself to provide user index and data index service, if developer is without cloud storage, needs
Oneself to provide data storage service.
Inventor realize it is of the invention during find, for common developer, it can not
Server lease and erection expense required for bearing the key storage of a large number of users, therefore for such
For system, server can turn into performance bottleneck.And the design and exploitation custom of different developers are not
Together, cause that such system coupling is high but reusability is poor.
As can be seen here, how realization is used on the premise of reducing hardware use cost and shortening the construction cycle
The key management at family, as those skilled in the art's technical problem urgently to be resolved hurrily.
The content of the invention
The invention provides a kind of user key storage method, to be opened in simplified development process and reduction
The efficiency of management of user key is improved on the premise of hair cost, the method is applied to include cipher key management services
In the key management system of device, user terminal and authentication server, including:
The Key Management server receives the key storage request for coming from user terminal, and the key is deposited
Temporary authentication token, key information and ID, the temporary authentication token are carried in storage request
For user is issued to the user terminal after the authentication server is logged in by the authentication server;
The Key Management server is authenticated to the temporary authentication token;
If temporary authentication token authentication passes through, the Key Management server itself inquiry with it is described
The corresponding key storage space of user, and store the ID is corresponding with the key information to institute
In stating key storage space.
Preferably, the temporary authentication token is specially the user terminal and is being reflected described in the User logs in
The backward authentication server acquisition request of power server.
Preferably, the key information at least includes user account, user cipher and website logo,
The Key Management server deposits store to the key corresponding with the key information of the ID
After storage space, also include:
When receiving the key for coming from the user terminal and filling in request, the Key Management server
Determine that the key fills in the corresponding targeted website mark of request;
The Key Management server inquires about right with targeted website mark in the key storage space
The user account and user cipher answered;
The user account and user cipher that the Key Management server will be inquired are back to the user
Terminal.
Preferably, user profile and site information are also carried in the key storage request, described close
Key management server is stored the ID is corresponding with the key information to the key storage space
Afterwards, also include:
The Key Management server is according to the user profile, the site information, the ID
And the key generation user index to be stored.
Preferably, deposited the ID is corresponding with the key information in the Key Management server
After storage to the key storage space, also include:
When the cipher key retrieval requests in coming from the user are received, according to the cipher key retrieval requests
The keyword of middle carrying and user index generation Search Results, and the Search Results are back to
The user terminal.
The invention provides a kind of server, to before simplifying development process and reducing development cost
The efficiency of management for improving user key is put, the server is used to be applied to bag as Key Management server
In including the key management system of the Key Management server, user terminal and authentication server, including:
Receiver module, reception comes from the key storage request of user terminal, in the key storage request
Temporary authentication token, key information and ID are carried, the temporary authentication token exists for user
The user terminal is issued to by the authentication server after logging in the authentication server;
Authentication module, authenticates to the temporary authentication token;
Processing module, when temporary authentication token authentication passes through, inquires about server itself and the use
The corresponding key storage space in family, and store the ID is corresponding with the key information to described
In key storage space.
Preferably, the temporary authentication token is specially the user terminal and is being reflected described in the User logs in
The backward authentication server acquisition request of power server.
Preferably, the key information at least includes user account, user cipher and website logo;Also
Including:
Filling module, receive determine when the key for coming from the user terminal fills in request it is described close
Key fills in the corresponding targeted website mark of request, is inquired about in the key storage space and the target network
The corresponding user account of station identifications and user cipher, the user account and user cipher that will be inquired are returned
It is back to the user terminal.
Preferably, user profile and site information are also carried in the key storage request, is also included:
Generation module, according to the user profile, the site information, the ID and described
Key to be stored generates user index.
Preferably, the generation module is also when the cipher key retrieval requests in coming from the user are received
According to keyword and the user index generation Search Results carried in the cipher key retrieval requests, and
The Search Results are back to the user terminal.
As can be seen here, by the technical scheme of application the application, Key Management server receives come from first
Asked in the key storage of user terminal, and the temporary authentication token in key storage request authenticated,
Because temporary authentication token is that user is issued to user's end after authentication server is logged in by authentication server
End, if therefore temporary authentication token authentication pass through, Key Management server can itself inquiry and user
Corresponding key storage space, and store ID is corresponding with key information into key storage space.
So as to without setting the storage that special purpose interface realizes user key between servers again, greatly simplify out
Send out flow and reduce development cost, and development efficiency is improve while guaranteeing safety.
Brief description of the drawings
Fig. 1 is the configuration diagram of key management system in the prior art;
Fig. 2 is a kind of schematic flow sheet of user key storage method that the application is proposed;
A kind of schematic diagram of user key management method that Fig. 3 is proposed by the application specific embodiment;
Fig. 4 is a kind of structural representation of server that the application is proposed.
Specific embodiment
In view of the technical problem proposed in background technology, present applicant proposes a kind of storage of user key
Method, as shown in Fig. 2 the method is comprised the following steps:
S201, the Key Management server receives the key storage request for coming from user terminal, described
Temporary authentication token, key information and ID are carried in key storage request, it is described to recognize temporarily
Card token is that user is issued to the user terminal after authentication server is logged in by the authentication server
's.
In existing technology, user is deposited carrying out key using the terminal device for being provided with key management instrument
Chu Shi, terminal device needs to be docked with service server using special api interface, and developer
Also need to set other servers for storing the key data of user based on service server, this is undoubtedly
Significantly increase the development cost and development difficulty of key management.For this present applicant proposes it is a set of only
The key management system being made up of Key Management server, user terminal and authentication server.Wherein
User terminal carries the key management of front end displaying treatment in addition to providing a user with website browsing function
Instrument, it can be mobile terminal or PC terminals, with authentication server and Key Management server it
Between can realize not relying on the message communication and information Store of interface setting.Deposited by server
Storage and the API for reading are optimized, the work such as inquiry, storage, reading when simplifying Password Management, are opened
Originator no longer needs to need to develop these general utility functions as before.
Based on above key management system, when user needs storage key, user will first pass through user
Terminal logs in authentication server, after user's Successful login authentication server, user terminal will be to authentication
Server request temporary authentication token, and by the temporary authentication token and ID and key information one
Sent to Key Management server in key storage request with carrying.
Preferably, Key Management server can be arranged in current network storage service and put down by technical staff
In platform, the network storage service platform must provide general on the premise of with storage and read functions
Interface.In specific application scenarios, in order to it is convenient, rapidly realize the technical scheme of the application,
The network storage service platform can be used and can externally provide magnanimity, safe and highly reliable cloud storage service
OSS (Object Storage Service, object storage) platform.Using the server on OSS platforms
Using the application provide key managing project when, developer or domestic consumer can be by itself institutes
Server of the mobile terminal or PC terminals for using directly with OSS platforms is interacted, and without again
Api interface is set.On this basis, technical staff may be based on the independence of network storage service platform,
The resilient expansion of capacity and disposal ability is further opened up to the interface function and store function of network
Exhibition, these belong to the protection domain of the application.
S202, the Key Management server is authenticated to the temporary authentication token.
S203, if temporary authentication token authentication passes through, the Key Management server is inquired about at itself
Key storage space corresponding with the user, and deposit the ID is corresponding with the key information
In storage to the key storage space.
During user carries out activity by internet, in most cases user is needed in net
The user name and password of oneself registration are filled in station, therefore in a preferred embodiment of the application, key
Information should at least include user account, user cipher and website logo, in Key Management server by institute
State that ID is corresponding with the key information to be stored to the key storage space, if receiving
The key for coming from the user terminal fills in request, and the Key Management server determines that the key is filled out
The corresponding targeted website mark of write request, inquires about in the key storage space and is marked with the targeted website
Know corresponding user account and user cipher, and the user account that will inquire and user cipher are returned
To the user terminal, realized for the user name of website and filling in for password with this.
It should be noted that, although only entering by taking the user name password of website automatically filling as an example in above procedure
Row explanation, but when user is logged in using other modes (such as APP), also can be on this basis
It is changed to be adaptively adjusted filling for mark, these belong to the protection domain of the application.
Additionally, be directed to the password for oneself being stored for ease of user be managed, in key storage request also
The user profile of itself and site information of user input can be carried, will in the Key Management server
The ID is corresponding with the key information to be stored to the key storage space, key management
Server will be according to the user profile, the site information, the ID and described to be stored
Key generates user index, and when the cipher key retrieval requests in coming from the user are received, key
Management server can be according to keyword and the user index life carried in the cipher key retrieval requests
Into Search Results, and the Search Results are back to the user terminal.
By above scheme as can be seen that the scheme of the application is by using on network storage service platform
Open a variety of services in the cloud computing that Key Management server is provided, instead of the work in tradition exploitation
Make, eliminate intermediate link.By the request of user and response, directly got through with the service in cloud computing,
So as to improve existing key management efficiency.
In order to technological thought of the invention is expanded on further, in conjunction with concrete application scene as shown in Figure 3,
Technical scheme is illustrated.Detailed step is as follows:
S301, the terminal device (PC equipment or mobile terminal) that user is used by itself logs in authentication
Server;
S302, in secure log after authentication server, the user opens key pipe on the terminal device
Science and engineering has (being illustrated by taking Last Pass as an example in the specific embodiment).The key management instrument has
Line Password Management and the function of page filtering, are able to record that user by terminal device in page browsing mistake
The user name and password filled in journey, at the same recognize current browse webpage required for filling user name and
Password.
S303, key management instrument asks interim token token from authentication server;
S304, after the interim token for receiving key management instrument is asked, authentication server needs are
The key management instrument generates interim token.In this specific embodiment, technical staff can be using formulation
Security token service (STS) generates interim token, and the security token service is an issue, checking and continues
The Web service of security token is ordered, can effectively ensure the security and validity of interim token.
S305, key management instrument is obtained to obtain and visited after interim token is obtained using the interim token
Ask the authority of the cloud service of network storage service platform.Begin look for user-related record information, and
Corresponding user name, password and other data etc. are write on into network storage service platform, while can be with
The content (such as user name, network name etc.) of search is indexed in being placed on cloud search service;
S306, user when needing to carry out password during carrying out page browsing by terminal device and filling,
By the way that key management instrument is from the required password of network storage service platform acquisition and fills in browsing pages,
So as to further be accessed.
Above step realizes user in the page on the premise of it need not develop special purpose interface and server
The password function that storage and key are filled automatically automatically is carried out in navigation process.However, being separated by one
The section time is not used after some account, and user may forget and log in the use that the website is used at that time
Name in an account book, therefore this specific embodiment additionally provides the search work(that the page is filled for website or other passwords
Can, it is specific as follows:
S307, if user needs to be filled for before some website or password filling page search
User name and during password, the user can initiate searching request, subsequent key by the key management instrument
Management tool by according to the mark of website to be searched or the filling page to network storage service platform request
Cloud search service, network storage service platform, will after the searching request for receiving key management instrument
Index all users corresponding with the website that user is stored before inquiry in record in S305
Name and corresponding key, and Search Results are back to key management instrument, follow-up key management instrument
User name corresponding with the website, password display will be got to user.
Based on above method embodiment identical technology design, the embodiment of the present invention additionally provides a kind of clothes
Business device can apply in above method flow.
As shown in figure 4, being a kind of structural representation of server provided in an embodiment of the present invention, can wrap
Include:
Receiver module 401, reception comes from the key storage request of user terminal, the key storage request
In carry temporary authentication token, key information and ID, the temporary authentication token is user
The user terminal is issued to by the authentication server after the authentication server is logged in;
Authentication module 402, authenticates to the temporary authentication token;
Processing module 403, if temporary authentication token authentication passes through, inquires about server itself and the use
The corresponding key storage space in family, and store the ID is corresponding with the key information to described
In key storage space.
Wherein, the temporary authentication token is specially the user terminal and is being authenticated described in the User logs in
The backward authentication server acquisition request of server.
The key information at least includes user account, user cipher and website logo;Also include:
Filling module, receive determine when the key for coming from the user terminal fills in request it is described close
Key fills in the corresponding targeted website mark of request, is inquired about in the key storage space and the target network
The corresponding user account of station identifications and user cipher, the user account and user cipher that will be inquired are returned
It is back to the user terminal.
User profile and site information are also carried in the key storage request, is also included:
Generation module, according to the user profile, the site information, the ID and described
Key to be stored generates user index.
The generation module is also when the cipher key retrieval requests in coming from the user are received according to
The keyword carried in cipher key retrieval requests and user index generation Search Results, and searched described
Hitch fruit is back to the user terminal.
By the technical scheme of application the application, Key Management server receives come from user terminal first
Key storage request, and to key storage ask in temporary authentication token authenticate, due to interim
Authentication token is that user is issued to user terminal after authentication server is logged in by authentication server, if therefore
Temporary authentication token authentication passes through, and Key Management server can be in itself inquiry key corresponding with user
Memory space, and store ID is corresponding with key information into key storage space.So that need not
Special purpose interface is set between servers again and realizes the storage of user key, greatly simplify development process with
And development cost is reduced, and development efficiency is improve while guaranteeing safety.
Through the above description of the embodiments, those skilled in the art can be understood that this hair
It is bright to be realized by hardware, it is also possible to be realized by the mode of software plus necessary general hardware platform.
Based on such understanding, technical scheme can be embodied in the form of software product, and this is soft
It (can be CD-ROM, USB flash disk is mobile hard that part product can be stored in a non-volatile memory medium
Disk etc.) in, including some instructions are used to so that a computer equipment (can be personal computer, take
Business device, or the network equipment etc.) perform method described in each implement scene of the invention.
It will be appreciated by those skilled in the art that accompanying drawing is a schematic diagram for being preferable to carry out scene, in accompanying drawing
Module or necessary to flow not necessarily implements the present invention.
It will be appreciated by those skilled in the art that the module in device in implement scene can be according to implement scene
Description be distributed in the device of implement scene, it is also possible to is carried out respective change and is disposed other than this implementation
In one or more devices of scene.The module of above-mentioned implement scene can merge into a module, also may be used
To be further split into multiple submodule.
The invention described above sequence number is for illustration only, and the quality of implement scene is not represented.
Disclosed above is only several specific implementation scenes of the invention, but, the present invention is not limited to
This, the changes that any person skilled in the art can think of should all fall into protection scope of the present invention.
Claims (10)
1. a kind of user key storage method, it is characterised in that methods described is applied to include key management
In the key management system of server, user terminal and authentication server, the method includes:
The Key Management server receives the key storage request for coming from user terminal, and the key is deposited
Temporary authentication token, key information and ID, the temporary authentication token are carried in storage request
For user is issued to the user terminal after the authentication server is logged in by the authentication server;
The Key Management server is authenticated to the temporary authentication token;
If temporary authentication token authentication passes through, the Key Management server itself inquiry with it is described
The corresponding key storage space of user, and store the ID is corresponding with the key information to institute
In stating key storage space.
2. the method for claim 1, it is characterised in that
The temporary authentication token is specially the user terminal in authentication server described in the User logs in
The backward authentication server acquisition request.
3. the method for claim 1, it is characterised in that the key information at least includes user
Account, user cipher and website logo, in the Key Management server by the ID and institute
State key information correspondence to store to the key storage space, also include:
When receiving the key for coming from the user terminal and filling in request, the Key Management server
Determine that the key fills in the corresponding targeted website mark of request;
The Key Management server inquires about right with targeted website mark in the key storage space
The user account and user cipher answered;
The user account and user cipher that the Key Management server will be inquired are back to the user
Terminal.
4. the method for claim 1, it is characterised in that also carried in the key storage request
User profile and site information, in the Key Management server by the ID and the key
Information correspondence is stored to the key storage space, is also included:
The Key Management server is according to the user profile, the site information, the ID
And the key generation user index to be stored.
5. method as claimed in claim 4, it is characterised in that in the Key Management server by institute
State that ID is corresponding with the key information to be stored to the key storage space, also include:
When the cipher key retrieval requests in coming from the user are received, according to the cipher key retrieval requests
The keyword of middle carrying and user index generation Search Results, and the Search Results are back to
The user terminal.
6. a kind of server, for being applied to include the cipher key management services as Key Management server
In the key management system of device, user terminal and authentication server, it is characterised in that including:
Receiver module, reception comes from the key storage request of user terminal, in the key storage request
Temporary authentication token, key information and ID are carried, the temporary authentication token exists for user
The user terminal is issued to by the authentication server after logging in the authentication server;
Authentication module, authenticates to the temporary authentication token;
Processing module, when temporary authentication token authentication passes through, inquires about server itself and the use
The corresponding key storage space in family, and store the ID is corresponding with the key information to described
In key storage space.
7. server as claimed in claim 6, it is characterised in that the temporary authentication token is specially
The user terminal is after authentication server described in the User logs in the authentication server acquisition request
's.
8. server as claimed in claim 6, it is characterised in that the key information at least includes using
Family account, user cipher and website logo;Also include:
Filling module, receive determine when the key for coming from the user terminal fills in request it is described close
Key fills in the corresponding targeted website mark of request, is inquired about in the key storage space and the target network
The corresponding user account of station identifications and user cipher, the user account and user cipher that will be inquired are returned
It is back to the user terminal.
9. server as claimed in claim 6, it is characterised in that also taken in the key storage request
Band user profile and site information, also include:
Generation module, according to the user profile, the site information, the ID and described
Key to be stored generates user index.
10. server as claimed in claim 9, it is characterised in that
The generation module is also when the cipher key retrieval requests in coming from the user are received according to
The keyword carried in cipher key retrieval requests and user index generation Search Results, and searched described
Hitch fruit is back to the user terminal.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510819162.2A CN106789848A (en) | 2015-11-23 | 2015-11-23 | A kind of user key storage method and server |
PCT/CN2016/105668 WO2017088677A1 (en) | 2015-11-23 | 2016-11-14 | User key storage method and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510819162.2A CN106789848A (en) | 2015-11-23 | 2015-11-23 | A kind of user key storage method and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106789848A true CN106789848A (en) | 2017-05-31 |
Family
ID=58763022
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510819162.2A Pending CN106789848A (en) | 2015-11-23 | 2015-11-23 | A kind of user key storage method and server |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106789848A (en) |
WO (1) | WO2017088677A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107025409A (en) * | 2017-06-27 | 2017-08-08 | 中经汇通电子商务有限公司 | A kind of data safety storaging platform |
CN108282331A (en) * | 2018-01-02 | 2018-07-13 | 金邦达有限公司 | Cipher processing method, apparatus and system |
CN109257381A (en) * | 2018-11-08 | 2019-01-22 | 江苏恒宝智能系统技术有限公司 | A kind of key management method, system and electronic equipment |
CN109889342A (en) * | 2018-12-15 | 2019-06-14 | 中国平安人寿保险股份有限公司 | Interface testing method for authenticating, device, electronic equipment and storage medium |
CN110536152A (en) * | 2019-08-05 | 2019-12-03 | 广州珠江数码集团股份有限公司 | A kind of set-top box users authentication caching method, device, medium and terminal device |
CN111143816A (en) * | 2018-11-05 | 2020-05-12 | 纬创资通股份有限公司 | Verification and authorization method and verification server |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110247758B (en) * | 2019-05-30 | 2023-03-24 | 天翼数字生活科技有限公司 | Password management method and device and password manager |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102404337A (en) * | 2011-12-13 | 2012-04-04 | 华为技术有限公司 | Data encryption method and device |
CN103023875A (en) * | 2012-11-21 | 2013-04-03 | 北京荣之联科技股份有限公司 | Account management system and method |
CN103929306A (en) * | 2014-04-02 | 2014-07-16 | 天地融科技股份有限公司 | Intelligent secret key device and information management method of intelligent secret key device |
WO2014189262A1 (en) * | 2013-05-24 | 2014-11-27 | Strix Inc. | User terminal authentication method of access point apparatus |
CN104821937A (en) * | 2015-03-26 | 2015-08-05 | 腾讯科技(北京)有限公司 | Token acquisition method, device and system |
WO2015149582A1 (en) * | 2014-04-02 | 2015-10-08 | 天地融科技股份有限公司 | Password input method, intelligent secret key device and client apparatus |
US9208341B2 (en) * | 2013-08-14 | 2015-12-08 | Brainzquare Inc. | System and method for synchronizing an encrypted file with a remote storage |
-
2015
- 2015-11-23 CN CN201510819162.2A patent/CN106789848A/en active Pending
-
2016
- 2016-11-14 WO PCT/CN2016/105668 patent/WO2017088677A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102404337A (en) * | 2011-12-13 | 2012-04-04 | 华为技术有限公司 | Data encryption method and device |
CN103023875A (en) * | 2012-11-21 | 2013-04-03 | 北京荣之联科技股份有限公司 | Account management system and method |
WO2014189262A1 (en) * | 2013-05-24 | 2014-11-27 | Strix Inc. | User terminal authentication method of access point apparatus |
US9208341B2 (en) * | 2013-08-14 | 2015-12-08 | Brainzquare Inc. | System and method for synchronizing an encrypted file with a remote storage |
CN103929306A (en) * | 2014-04-02 | 2014-07-16 | 天地融科技股份有限公司 | Intelligent secret key device and information management method of intelligent secret key device |
WO2015149582A1 (en) * | 2014-04-02 | 2015-10-08 | 天地融科技股份有限公司 | Password input method, intelligent secret key device and client apparatus |
CN104821937A (en) * | 2015-03-26 | 2015-08-05 | 腾讯科技(北京)有限公司 | Token acquisition method, device and system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107025409A (en) * | 2017-06-27 | 2017-08-08 | 中经汇通电子商务有限公司 | A kind of data safety storaging platform |
CN108282331A (en) * | 2018-01-02 | 2018-07-13 | 金邦达有限公司 | Cipher processing method, apparatus and system |
CN111143816A (en) * | 2018-11-05 | 2020-05-12 | 纬创资通股份有限公司 | Verification and authorization method and verification server |
CN109257381A (en) * | 2018-11-08 | 2019-01-22 | 江苏恒宝智能系统技术有限公司 | A kind of key management method, system and electronic equipment |
CN109889342A (en) * | 2018-12-15 | 2019-06-14 | 中国平安人寿保险股份有限公司 | Interface testing method for authenticating, device, electronic equipment and storage medium |
CN110536152A (en) * | 2019-08-05 | 2019-12-03 | 广州珠江数码集团股份有限公司 | A kind of set-top box users authentication caching method, device, medium and terminal device |
Also Published As
Publication number | Publication date |
---|---|
WO2017088677A1 (en) | 2017-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106789848A (en) | A kind of user key storage method and server | |
CN104767719B (en) | Determine Website login terminal whether be mobile terminal method and server | |
CN104580074B (en) | The login method of client application and its corresponding server | |
US8544072B1 (en) | Single sign-on service | |
US9450954B2 (en) | Form filling with digital identities, and automatic password generation | |
RU2742700C1 (en) | Method, apparatus and a client terminal device for realizing a web site logon with a fingerprint | |
US10491588B2 (en) | Local and remote access apparatus and system for password storage and management | |
CN103916244B (en) | Verification method and device | |
CN101897166A (en) | Systems and methods for establishing a secure communication channel using a browser component | |
CN113542201B (en) | Access control method and equipment for Internet service | |
CN107147647A (en) | A kind of webpage authorization method and device | |
CN102594817A (en) | Password agent method, user terminal equipment and password agent server | |
CN101764808B (en) | Authentication processing method and system for automatic login as well as server | |
CN102299936A (en) | Method and device for accessing application websites | |
CN107168960A (en) | A kind of business performs method and device | |
CN103414745A (en) | Mobile terminal cross-browser login method and device | |
CN105025484B (en) | Access the method and device of Wi-Fi Hotspot | |
CN103457954A (en) | Method and device for user password management | |
KR101897085B1 (en) | Apparatus and method for generating a realtime password and storage medium | |
CN106161710A (en) | A kind of user account safety management system based on smart mobile phone | |
CN106792699A (en) | A kind of Wireless Fidelity Wi Fi connection methods and mobile terminal | |
CN116484338A (en) | Database access method and device | |
CN104506557A (en) | Method and device for managing login information | |
CN114024751B (en) | Application access control method and device, computer equipment and storage medium | |
CN107948210A (en) | A kind of login method, device, client, server and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170531 |