CN106789848A - A kind of user key storage method and server - Google Patents

A kind of user key storage method and server Download PDF

Info

Publication number
CN106789848A
CN106789848A CN201510819162.2A CN201510819162A CN106789848A CN 106789848 A CN106789848 A CN 106789848A CN 201510819162 A CN201510819162 A CN 201510819162A CN 106789848 A CN106789848 A CN 106789848A
Authority
CN
China
Prior art keywords
key
user
server
user terminal
key management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510819162.2A
Other languages
Chinese (zh)
Inventor
张治中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510819162.2A priority Critical patent/CN106789848A/en
Priority to PCT/CN2016/105668 priority patent/WO2017088677A1/en
Publication of CN106789848A publication Critical patent/CN106789848A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of user key management method.Key Management server receives the key storage request for coming from user terminal first, and the temporary authentication token in asking key storage is authenticated, because temporary authentication token is that user is issued to user terminal after authentication server is logged in by authentication server, if therefore temporary authentication token authentication passes through, Key Management server in itself corresponding with user key storage space of inquiry, and can be stored ID is corresponding with key information into key storage space.So as to without setting the storage that special purpose interface realizes user key between servers again, greatly simplify development process and reduce development cost, and development efficiency is improve while guaranteeing safety.

Description

A kind of user key storage method and server
Technical field
The application is related to communication technical field, more particularly to a kind of user key storage method.The application is same When further relate to a kind of server.
Background technology
With continuing to develop for Internet technology, people can complete various oneself institute by internet now The thing of needs.When user is provided by network or obtains service, it is typically necessary in service provider Or Virtual network operator registers one's own account, and corresponding password is set.
In life at present, Internet service is varied, and user needs to register all kinds of websites, each net Standing will have user name, password.Website can be simply divided into following two by significance level:
(1) finance accounts such as high priority account, such as bank, the account ID and password of the type are related to And the property safety of user is, it is necessary to user is properly taken care of;
(2) low priority account, such as various forum's accounts, the only account of the type or registration are seen once Just without managing again.
For the account number cipher for helping user record various, prior art proposes code management device to improve Experience of the user in page browsing.Specifically, after registration is completed by certain website as user, Code management device saves user name, password, is subsequently filled out automatically when user needs and logs in the website User name, password are write, if user is not desired to oneself sets password, moreover it is possible to when user needs generation password certainly Dynamic generation password.
As current utilization rate a code management device higher, the shape that Last Pass can be extended with browser Formula is used, and can point out to preserve log-on message when any one website of User logs in, and subsequent user is accessed should During website will Auto-writing logon form, exempt that memory account is close and the trouble that manually enters.With Last Pass As a example by, the configuration diagram of key management system of the prior art is as shown in figure 1, its rear end needs deployment Very heavy service is used for doing user index, data directory and data storage.And need to define front and back end Interface.Therefore developer wants self-developing application and is deployed to provide service on service server, Er Qiekai Originator needs oneself to provide user index and data index service, if developer is without cloud storage, needs Oneself to provide data storage service.
Inventor realize it is of the invention during find, for common developer, it can not Server lease and erection expense required for bearing the key storage of a large number of users, therefore for such For system, server can turn into performance bottleneck.And the design and exploitation custom of different developers are not Together, cause that such system coupling is high but reusability is poor.
As can be seen here, how realization is used on the premise of reducing hardware use cost and shortening the construction cycle The key management at family, as those skilled in the art's technical problem urgently to be resolved hurrily.
The content of the invention
The invention provides a kind of user key storage method, to be opened in simplified development process and reduction The efficiency of management of user key is improved on the premise of hair cost, the method is applied to include cipher key management services In the key management system of device, user terminal and authentication server, including:
The Key Management server receives the key storage request for coming from user terminal, and the key is deposited Temporary authentication token, key information and ID, the temporary authentication token are carried in storage request For user is issued to the user terminal after the authentication server is logged in by the authentication server;
The Key Management server is authenticated to the temporary authentication token;
If temporary authentication token authentication passes through, the Key Management server itself inquiry with it is described The corresponding key storage space of user, and store the ID is corresponding with the key information to institute In stating key storage space.
Preferably, the temporary authentication token is specially the user terminal and is being reflected described in the User logs in The backward authentication server acquisition request of power server.
Preferably, the key information at least includes user account, user cipher and website logo, The Key Management server deposits store to the key corresponding with the key information of the ID After storage space, also include:
When receiving the key for coming from the user terminal and filling in request, the Key Management server Determine that the key fills in the corresponding targeted website mark of request;
The Key Management server inquires about right with targeted website mark in the key storage space The user account and user cipher answered;
The user account and user cipher that the Key Management server will be inquired are back to the user Terminal.
Preferably, user profile and site information are also carried in the key storage request, described close Key management server is stored the ID is corresponding with the key information to the key storage space Afterwards, also include:
The Key Management server is according to the user profile, the site information, the ID And the key generation user index to be stored.
Preferably, deposited the ID is corresponding with the key information in the Key Management server After storage to the key storage space, also include:
When the cipher key retrieval requests in coming from the user are received, according to the cipher key retrieval requests The keyword of middle carrying and user index generation Search Results, and the Search Results are back to The user terminal.
The invention provides a kind of server, to before simplifying development process and reducing development cost The efficiency of management for improving user key is put, the server is used to be applied to bag as Key Management server In including the key management system of the Key Management server, user terminal and authentication server, including:
Receiver module, reception comes from the key storage request of user terminal, in the key storage request Temporary authentication token, key information and ID are carried, the temporary authentication token exists for user The user terminal is issued to by the authentication server after logging in the authentication server;
Authentication module, authenticates to the temporary authentication token;
Processing module, when temporary authentication token authentication passes through, inquires about server itself and the use The corresponding key storage space in family, and store the ID is corresponding with the key information to described In key storage space.
Preferably, the temporary authentication token is specially the user terminal and is being reflected described in the User logs in The backward authentication server acquisition request of power server.
Preferably, the key information at least includes user account, user cipher and website logo;Also Including:
Filling module, receive determine when the key for coming from the user terminal fills in request it is described close Key fills in the corresponding targeted website mark of request, is inquired about in the key storage space and the target network The corresponding user account of station identifications and user cipher, the user account and user cipher that will be inquired are returned It is back to the user terminal.
Preferably, user profile and site information are also carried in the key storage request, is also included:
Generation module, according to the user profile, the site information, the ID and described Key to be stored generates user index.
Preferably, the generation module is also when the cipher key retrieval requests in coming from the user are received According to keyword and the user index generation Search Results carried in the cipher key retrieval requests, and The Search Results are back to the user terminal.
As can be seen here, by the technical scheme of application the application, Key Management server receives come from first Asked in the key storage of user terminal, and the temporary authentication token in key storage request authenticated, Because temporary authentication token is that user is issued to user's end after authentication server is logged in by authentication server End, if therefore temporary authentication token authentication pass through, Key Management server can itself inquiry and user Corresponding key storage space, and store ID is corresponding with key information into key storage space. So as to without setting the storage that special purpose interface realizes user key between servers again, greatly simplify out Send out flow and reduce development cost, and development efficiency is improve while guaranteeing safety.
Brief description of the drawings
Fig. 1 is the configuration diagram of key management system in the prior art;
Fig. 2 is a kind of schematic flow sheet of user key storage method that the application is proposed;
A kind of schematic diagram of user key management method that Fig. 3 is proposed by the application specific embodiment;
Fig. 4 is a kind of structural representation of server that the application is proposed.
Specific embodiment
In view of the technical problem proposed in background technology, present applicant proposes a kind of storage of user key Method, as shown in Fig. 2 the method is comprised the following steps:
S201, the Key Management server receives the key storage request for coming from user terminal, described Temporary authentication token, key information and ID are carried in key storage request, it is described to recognize temporarily Card token is that user is issued to the user terminal after authentication server is logged in by the authentication server 's.
In existing technology, user is deposited carrying out key using the terminal device for being provided with key management instrument Chu Shi, terminal device needs to be docked with service server using special api interface, and developer Also need to set other servers for storing the key data of user based on service server, this is undoubtedly Significantly increase the development cost and development difficulty of key management.For this present applicant proposes it is a set of only The key management system being made up of Key Management server, user terminal and authentication server.Wherein User terminal carries the key management of front end displaying treatment in addition to providing a user with website browsing function Instrument, it can be mobile terminal or PC terminals, with authentication server and Key Management server it Between can realize not relying on the message communication and information Store of interface setting.Deposited by server Storage and the API for reading are optimized, the work such as inquiry, storage, reading when simplifying Password Management, are opened Originator no longer needs to need to develop these general utility functions as before.
Based on above key management system, when user needs storage key, user will first pass through user Terminal logs in authentication server, after user's Successful login authentication server, user terminal will be to authentication Server request temporary authentication token, and by the temporary authentication token and ID and key information one Sent to Key Management server in key storage request with carrying.
Preferably, Key Management server can be arranged in current network storage service and put down by technical staff In platform, the network storage service platform must provide general on the premise of with storage and read functions Interface.In specific application scenarios, in order to it is convenient, rapidly realize the technical scheme of the application, The network storage service platform can be used and can externally provide magnanimity, safe and highly reliable cloud storage service OSS (Object Storage Service, object storage) platform.Using the server on OSS platforms Using the application provide key managing project when, developer or domestic consumer can be by itself institutes Server of the mobile terminal or PC terminals for using directly with OSS platforms is interacted, and without again Api interface is set.On this basis, technical staff may be based on the independence of network storage service platform, The resilient expansion of capacity and disposal ability is further opened up to the interface function and store function of network Exhibition, these belong to the protection domain of the application.
S202, the Key Management server is authenticated to the temporary authentication token.
S203, if temporary authentication token authentication passes through, the Key Management server is inquired about at itself Key storage space corresponding with the user, and deposit the ID is corresponding with the key information In storage to the key storage space.
During user carries out activity by internet, in most cases user is needed in net The user name and password of oneself registration are filled in station, therefore in a preferred embodiment of the application, key Information should at least include user account, user cipher and website logo, in Key Management server by institute State that ID is corresponding with the key information to be stored to the key storage space, if receiving The key for coming from the user terminal fills in request, and the Key Management server determines that the key is filled out The corresponding targeted website mark of write request, inquires about in the key storage space and is marked with the targeted website Know corresponding user account and user cipher, and the user account that will inquire and user cipher are returned To the user terminal, realized for the user name of website and filling in for password with this.
It should be noted that, although only entering by taking the user name password of website automatically filling as an example in above procedure Row explanation, but when user is logged in using other modes (such as APP), also can be on this basis It is changed to be adaptively adjusted filling for mark, these belong to the protection domain of the application.
Additionally, be directed to the password for oneself being stored for ease of user be managed, in key storage request also The user profile of itself and site information of user input can be carried, will in the Key Management server The ID is corresponding with the key information to be stored to the key storage space, key management Server will be according to the user profile, the site information, the ID and described to be stored Key generates user index, and when the cipher key retrieval requests in coming from the user are received, key Management server can be according to keyword and the user index life carried in the cipher key retrieval requests Into Search Results, and the Search Results are back to the user terminal.
By above scheme as can be seen that the scheme of the application is by using on network storage service platform Open a variety of services in the cloud computing that Key Management server is provided, instead of the work in tradition exploitation Make, eliminate intermediate link.By the request of user and response, directly got through with the service in cloud computing, So as to improve existing key management efficiency.
In order to technological thought of the invention is expanded on further, in conjunction with concrete application scene as shown in Figure 3, Technical scheme is illustrated.Detailed step is as follows:
S301, the terminal device (PC equipment or mobile terminal) that user is used by itself logs in authentication Server;
S302, in secure log after authentication server, the user opens key pipe on the terminal device Science and engineering has (being illustrated by taking Last Pass as an example in the specific embodiment).The key management instrument has Line Password Management and the function of page filtering, are able to record that user by terminal device in page browsing mistake The user name and password filled in journey, at the same recognize current browse webpage required for filling user name and Password.
S303, key management instrument asks interim token token from authentication server;
S304, after the interim token for receiving key management instrument is asked, authentication server needs are The key management instrument generates interim token.In this specific embodiment, technical staff can be using formulation Security token service (STS) generates interim token, and the security token service is an issue, checking and continues The Web service of security token is ordered, can effectively ensure the security and validity of interim token.
S305, key management instrument is obtained to obtain and visited after interim token is obtained using the interim token Ask the authority of the cloud service of network storage service platform.Begin look for user-related record information, and Corresponding user name, password and other data etc. are write on into network storage service platform, while can be with The content (such as user name, network name etc.) of search is indexed in being placed on cloud search service;
S306, user when needing to carry out password during carrying out page browsing by terminal device and filling, By the way that key management instrument is from the required password of network storage service platform acquisition and fills in browsing pages, So as to further be accessed.
Above step realizes user in the page on the premise of it need not develop special purpose interface and server The password function that storage and key are filled automatically automatically is carried out in navigation process.However, being separated by one The section time is not used after some account, and user may forget and log in the use that the website is used at that time Name in an account book, therefore this specific embodiment additionally provides the search work(that the page is filled for website or other passwords Can, it is specific as follows:
S307, if user needs to be filled for before some website or password filling page search User name and during password, the user can initiate searching request, subsequent key by the key management instrument Management tool by according to the mark of website to be searched or the filling page to network storage service platform request Cloud search service, network storage service platform, will after the searching request for receiving key management instrument Index all users corresponding with the website that user is stored before inquiry in record in S305 Name and corresponding key, and Search Results are back to key management instrument, follow-up key management instrument User name corresponding with the website, password display will be got to user.
Based on above method embodiment identical technology design, the embodiment of the present invention additionally provides a kind of clothes Business device can apply in above method flow.
As shown in figure 4, being a kind of structural representation of server provided in an embodiment of the present invention, can wrap Include:
Receiver module 401, reception comes from the key storage request of user terminal, the key storage request In carry temporary authentication token, key information and ID, the temporary authentication token is user The user terminal is issued to by the authentication server after the authentication server is logged in;
Authentication module 402, authenticates to the temporary authentication token;
Processing module 403, if temporary authentication token authentication passes through, inquires about server itself and the use The corresponding key storage space in family, and store the ID is corresponding with the key information to described In key storage space.
Wherein, the temporary authentication token is specially the user terminal and is being authenticated described in the User logs in The backward authentication server acquisition request of server.
The key information at least includes user account, user cipher and website logo;Also include:
Filling module, receive determine when the key for coming from the user terminal fills in request it is described close Key fills in the corresponding targeted website mark of request, is inquired about in the key storage space and the target network The corresponding user account of station identifications and user cipher, the user account and user cipher that will be inquired are returned It is back to the user terminal.
User profile and site information are also carried in the key storage request, is also included:
Generation module, according to the user profile, the site information, the ID and described Key to be stored generates user index.
The generation module is also when the cipher key retrieval requests in coming from the user are received according to The keyword carried in cipher key retrieval requests and user index generation Search Results, and searched described Hitch fruit is back to the user terminal.
By the technical scheme of application the application, Key Management server receives come from user terminal first Key storage request, and to key storage ask in temporary authentication token authenticate, due to interim Authentication token is that user is issued to user terminal after authentication server is logged in by authentication server, if therefore Temporary authentication token authentication passes through, and Key Management server can be in itself inquiry key corresponding with user Memory space, and store ID is corresponding with key information into key storage space.So that need not Special purpose interface is set between servers again and realizes the storage of user key, greatly simplify development process with And development cost is reduced, and development efficiency is improve while guaranteeing safety.
Through the above description of the embodiments, those skilled in the art can be understood that this hair It is bright to be realized by hardware, it is also possible to be realized by the mode of software plus necessary general hardware platform. Based on such understanding, technical scheme can be embodied in the form of software product, and this is soft It (can be CD-ROM, USB flash disk is mobile hard that part product can be stored in a non-volatile memory medium Disk etc.) in, including some instructions are used to so that a computer equipment (can be personal computer, take Business device, or the network equipment etc.) perform method described in each implement scene of the invention.
It will be appreciated by those skilled in the art that accompanying drawing is a schematic diagram for being preferable to carry out scene, in accompanying drawing Module or necessary to flow not necessarily implements the present invention.
It will be appreciated by those skilled in the art that the module in device in implement scene can be according to implement scene Description be distributed in the device of implement scene, it is also possible to is carried out respective change and is disposed other than this implementation In one or more devices of scene.The module of above-mentioned implement scene can merge into a module, also may be used To be further split into multiple submodule.
The invention described above sequence number is for illustration only, and the quality of implement scene is not represented.
Disclosed above is only several specific implementation scenes of the invention, but, the present invention is not limited to This, the changes that any person skilled in the art can think of should all fall into protection scope of the present invention.

Claims (10)

1. a kind of user key storage method, it is characterised in that methods described is applied to include key management In the key management system of server, user terminal and authentication server, the method includes:
The Key Management server receives the key storage request for coming from user terminal, and the key is deposited Temporary authentication token, key information and ID, the temporary authentication token are carried in storage request For user is issued to the user terminal after the authentication server is logged in by the authentication server;
The Key Management server is authenticated to the temporary authentication token;
If temporary authentication token authentication passes through, the Key Management server itself inquiry with it is described The corresponding key storage space of user, and store the ID is corresponding with the key information to institute In stating key storage space.
2. the method for claim 1, it is characterised in that
The temporary authentication token is specially the user terminal in authentication server described in the User logs in The backward authentication server acquisition request.
3. the method for claim 1, it is characterised in that the key information at least includes user Account, user cipher and website logo, in the Key Management server by the ID and institute State key information correspondence to store to the key storage space, also include:
When receiving the key for coming from the user terminal and filling in request, the Key Management server Determine that the key fills in the corresponding targeted website mark of request;
The Key Management server inquires about right with targeted website mark in the key storage space The user account and user cipher answered;
The user account and user cipher that the Key Management server will be inquired are back to the user Terminal.
4. the method for claim 1, it is characterised in that also carried in the key storage request User profile and site information, in the Key Management server by the ID and the key Information correspondence is stored to the key storage space, is also included:
The Key Management server is according to the user profile, the site information, the ID And the key generation user index to be stored.
5. method as claimed in claim 4, it is characterised in that in the Key Management server by institute State that ID is corresponding with the key information to be stored to the key storage space, also include:
When the cipher key retrieval requests in coming from the user are received, according to the cipher key retrieval requests The keyword of middle carrying and user index generation Search Results, and the Search Results are back to The user terminal.
6. a kind of server, for being applied to include the cipher key management services as Key Management server In the key management system of device, user terminal and authentication server, it is characterised in that including:
Receiver module, reception comes from the key storage request of user terminal, in the key storage request Temporary authentication token, key information and ID are carried, the temporary authentication token exists for user The user terminal is issued to by the authentication server after logging in the authentication server;
Authentication module, authenticates to the temporary authentication token;
Processing module, when temporary authentication token authentication passes through, inquires about server itself and the use The corresponding key storage space in family, and store the ID is corresponding with the key information to described In key storage space.
7. server as claimed in claim 6, it is characterised in that the temporary authentication token is specially The user terminal is after authentication server described in the User logs in the authentication server acquisition request 's.
8. server as claimed in claim 6, it is characterised in that the key information at least includes using Family account, user cipher and website logo;Also include:
Filling module, receive determine when the key for coming from the user terminal fills in request it is described close Key fills in the corresponding targeted website mark of request, is inquired about in the key storage space and the target network The corresponding user account of station identifications and user cipher, the user account and user cipher that will be inquired are returned It is back to the user terminal.
9. server as claimed in claim 6, it is characterised in that also taken in the key storage request Band user profile and site information, also include:
Generation module, according to the user profile, the site information, the ID and described Key to be stored generates user index.
10. server as claimed in claim 9, it is characterised in that
The generation module is also when the cipher key retrieval requests in coming from the user are received according to The keyword carried in cipher key retrieval requests and user index generation Search Results, and searched described Hitch fruit is back to the user terminal.
CN201510819162.2A 2015-11-23 2015-11-23 A kind of user key storage method and server Pending CN106789848A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510819162.2A CN106789848A (en) 2015-11-23 2015-11-23 A kind of user key storage method and server
PCT/CN2016/105668 WO2017088677A1 (en) 2015-11-23 2016-11-14 User key storage method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510819162.2A CN106789848A (en) 2015-11-23 2015-11-23 A kind of user key storage method and server

Publications (1)

Publication Number Publication Date
CN106789848A true CN106789848A (en) 2017-05-31

Family

ID=58763022

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510819162.2A Pending CN106789848A (en) 2015-11-23 2015-11-23 A kind of user key storage method and server

Country Status (2)

Country Link
CN (1) CN106789848A (en)
WO (1) WO2017088677A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107025409A (en) * 2017-06-27 2017-08-08 中经汇通电子商务有限公司 A kind of data safety storaging platform
CN108282331A (en) * 2018-01-02 2018-07-13 金邦达有限公司 Cipher processing method, apparatus and system
CN109257381A (en) * 2018-11-08 2019-01-22 江苏恒宝智能系统技术有限公司 A kind of key management method, system and electronic equipment
CN109889342A (en) * 2018-12-15 2019-06-14 中国平安人寿保险股份有限公司 Interface testing method for authenticating, device, electronic equipment and storage medium
CN110536152A (en) * 2019-08-05 2019-12-03 广州珠江数码集团股份有限公司 A kind of set-top box users authentication caching method, device, medium and terminal device
CN111143816A (en) * 2018-11-05 2020-05-12 纬创资通股份有限公司 Verification and authorization method and verification server

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110247758B (en) * 2019-05-30 2023-03-24 天翼数字生活科技有限公司 Password management method and device and password manager

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102404337A (en) * 2011-12-13 2012-04-04 华为技术有限公司 Data encryption method and device
CN103023875A (en) * 2012-11-21 2013-04-03 北京荣之联科技股份有限公司 Account management system and method
CN103929306A (en) * 2014-04-02 2014-07-16 天地融科技股份有限公司 Intelligent secret key device and information management method of intelligent secret key device
WO2014189262A1 (en) * 2013-05-24 2014-11-27 Strix Inc. User terminal authentication method of access point apparatus
CN104821937A (en) * 2015-03-26 2015-08-05 腾讯科技(北京)有限公司 Token acquisition method, device and system
WO2015149582A1 (en) * 2014-04-02 2015-10-08 天地融科技股份有限公司 Password input method, intelligent secret key device and client apparatus
US9208341B2 (en) * 2013-08-14 2015-12-08 Brainzquare Inc. System and method for synchronizing an encrypted file with a remote storage

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102404337A (en) * 2011-12-13 2012-04-04 华为技术有限公司 Data encryption method and device
CN103023875A (en) * 2012-11-21 2013-04-03 北京荣之联科技股份有限公司 Account management system and method
WO2014189262A1 (en) * 2013-05-24 2014-11-27 Strix Inc. User terminal authentication method of access point apparatus
US9208341B2 (en) * 2013-08-14 2015-12-08 Brainzquare Inc. System and method for synchronizing an encrypted file with a remote storage
CN103929306A (en) * 2014-04-02 2014-07-16 天地融科技股份有限公司 Intelligent secret key device and information management method of intelligent secret key device
WO2015149582A1 (en) * 2014-04-02 2015-10-08 天地融科技股份有限公司 Password input method, intelligent secret key device and client apparatus
CN104821937A (en) * 2015-03-26 2015-08-05 腾讯科技(北京)有限公司 Token acquisition method, device and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107025409A (en) * 2017-06-27 2017-08-08 中经汇通电子商务有限公司 A kind of data safety storaging platform
CN108282331A (en) * 2018-01-02 2018-07-13 金邦达有限公司 Cipher processing method, apparatus and system
CN111143816A (en) * 2018-11-05 2020-05-12 纬创资通股份有限公司 Verification and authorization method and verification server
CN109257381A (en) * 2018-11-08 2019-01-22 江苏恒宝智能系统技术有限公司 A kind of key management method, system and electronic equipment
CN109889342A (en) * 2018-12-15 2019-06-14 中国平安人寿保险股份有限公司 Interface testing method for authenticating, device, electronic equipment and storage medium
CN110536152A (en) * 2019-08-05 2019-12-03 广州珠江数码集团股份有限公司 A kind of set-top box users authentication caching method, device, medium and terminal device

Also Published As

Publication number Publication date
WO2017088677A1 (en) 2017-06-01

Similar Documents

Publication Publication Date Title
CN106789848A (en) A kind of user key storage method and server
CN104767719B (en) Determine Website login terminal whether be mobile terminal method and server
CN104580074B (en) The login method of client application and its corresponding server
US8544072B1 (en) Single sign-on service
US9450954B2 (en) Form filling with digital identities, and automatic password generation
RU2742700C1 (en) Method, apparatus and a client terminal device for realizing a web site logon with a fingerprint
US10491588B2 (en) Local and remote access apparatus and system for password storage and management
CN103916244B (en) Verification method and device
CN101897166A (en) Systems and methods for establishing a secure communication channel using a browser component
CN113542201B (en) Access control method and equipment for Internet service
CN107147647A (en) A kind of webpage authorization method and device
CN102594817A (en) Password agent method, user terminal equipment and password agent server
CN101764808B (en) Authentication processing method and system for automatic login as well as server
CN102299936A (en) Method and device for accessing application websites
CN107168960A (en) A kind of business performs method and device
CN103414745A (en) Mobile terminal cross-browser login method and device
CN105025484B (en) Access the method and device of Wi-Fi Hotspot
CN103457954A (en) Method and device for user password management
KR101897085B1 (en) Apparatus and method for generating a realtime password and storage medium
CN106161710A (en) A kind of user account safety management system based on smart mobile phone
CN106792699A (en) A kind of Wireless Fidelity Wi Fi connection methods and mobile terminal
CN116484338A (en) Database access method and device
CN104506557A (en) Method and device for managing login information
CN114024751B (en) Application access control method and device, computer equipment and storage medium
CN107948210A (en) A kind of login method, device, client, server and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531