CN106936839A - Accessing method and system - Google Patents

Accessing method and system Download PDF

Info

Publication number
CN106936839A
CN106936839A CN201710196278.4A CN201710196278A CN106936839A CN 106936839 A CN106936839 A CN 106936839A CN 201710196278 A CN201710196278 A CN 201710196278A CN 106936839 A CN106936839 A CN 106936839A
Authority
CN
China
Prior art keywords
password
temporary password
storehouse
user
temporary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710196278.4A
Other languages
Chinese (zh)
Inventor
王东杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Guangzhou Shirui Electronics Co Ltd
Original Assignee
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Guangzhou Shirui Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Shiyuan Electronics Thecnology Co Ltd, Guangzhou Shirui Electronics Co Ltd filed Critical Guangzhou Shiyuan Electronics Thecnology Co Ltd
Priority to CN201710196278.4A priority Critical patent/CN106936839A/en
Publication of CN106936839A publication Critical patent/CN106936839A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Abstract

The present invention provides a kind of accessing method and system, and the accessing method includes:With the presence or absence of the consistent temporary password of password is currently logined with user in temporary password storehouse, the temporary password storehouse includes all effective temporary password for having stored of the user preset for inquiry;If so, then allow to login, and the temporary password that will be inquired is deleted from the temporary password storehouse.Accessing method and system in the present invention, when the password that user logins is temporary password, after the completion of logining, system will delete the temporary password this time logined in the temporary password storehouse automatically, when user logins at this, even if the password logined is peeped surreptitiously, peeped surreptitiously cannot also be logined successfully by the password peeped surreptitiously.Therefore by the accessing method and system, user only needs to be input into temporary password every time and is logined, even if password is peeped surreptitiously, cannot also repeat to login, it is to avoid appearance peeped surreptitiously because of password caused by the phenomenon encroached on of the information such as privacy, property.

Description

Accessing method and system
Technical field
The present invention relates to cryptographic service technical field, more particularly to a kind of accessing method and system.
Background technology
With the continuous improvement of the communication technology and level of digital, increasing place needs to step in the middle of actual life Enter password, such as ATM, computer, POS, gate inhibition, the account of major websites is logined, by the setting of password to a certain extent Can effectively ensure that the information such as privacy, the property of user are not encroached on.
However, with the continuous improvement of hacking technique and stealing cryptographic means, adding current password and logining meeting mostly cruelly It is exposed in the middle of public arena, is easily caused peep of cipher, person of peeping will peeps the letters such as privacy, the property of taking family by password Breath, so as to greatly loss will be caused to user.
The reason for causing above-mentioned loss is, in the middle of prior art, does not have the means of cryptoguard so that when password is peeped Surreptitiously, when and not having time update password again, person of peeping passes through the private for entering into user that password just can be easy peeped surreptitiously Close space, so as to encroach on the information such as the privacy of user, property.
The content of the invention
Based on this, even if being peeped surreptitiously it is an object of the invention to provide a kind of password, the accessing method logined cannot be also repeated And system.
A kind of accessing method according to embodiments of the present invention, including:
Inquiry whether there is in temporary password storehouse currently logins the consistent temporary password of password with user, described interim close Code storehouse includes all effective temporary password for having stored of the user preset;
If so, then allow to login, and the temporary password that will be inquired is deleted from the temporary password storehouse.
In addition, a kind of accessing method according to the above embodiment of the present invention, can also have following additional technical characteristic:
Further, the inquiry in temporary password storehouse with the presence or absence of currently logining consistent interim of password with user Before the step of password, also include:
Judge described currently to login whether password is true password;
If it is not, then performing the inquiry in temporary password storehouse with the presence or absence of currently logining consistent interim of password with user The step of password;
If so, then allowing to login, and judge whether the user calls temporary password pre-set programs;
If calling, obtain the temporary password of user's current setting or system generation and be deposited into the temporary password In the middle of storehouse.
Further, in the temporary password for obtaining user's current setting or system generation and it is deposited into described facing When cryptographic libraries in the middle of step after, also include:
Function access rights corresponding with the temporary password that user's current setting or system are generated are obtained, and is deposited into In the middle of authority storehouse.
Further, it is described to allow the step of the logining to include:
Function access rights corresponding with the temporary password for inquiring are extracted in the middle of the authority storehouse, with to described The function that user can access is limited.
Further, in the temporary password for obtaining user's current setting or system generation and it is deposited into described facing When cryptographic libraries in the middle of step after, also include:
Effective termination time corresponding with the temporary password that user's current setting or system are generated is obtained, and is deposited into In the middle of time storehouse;
When current time exceed the time storehouse in any effective termination time when, will with any effective termination when Between corresponding temporary password deleted from the temporary password storehouse.
A kind of accessing system according to embodiments of the present invention, including:
Enquiry module, for inquiring about in temporary password storehouse with the presence or absence of currently logining consistent interim close of password with user Code, the temporary password storehouse includes all effective temporary password for having stored of the user preset;
First password removing module, for when being inquired in the temporary password storehouse with described current to login password consistent Temporary password when, it is allowed to login, and the temporary password that will be inquired is deleted from the temporary password storehouse.
In addition, a kind of accessing system according to the above embodiment of the present invention, can also have following additional technical characteristic:
Further, the accessing system also includes:
True password judge module, for judging described currently to login whether password is true password;
When judge it is described it is current to login password be not the true password when, then the enquiry module inquiry is faced described When cryptographic libraries in the presence or absence of currently logining the consistent temporary password of password with described;
Pre-set programs judge module, for when judge it is described it is current to login password be the true password when, it is allowed to step on Enter, and judge whether the user calls temporary password pre-set programs;
Password acquisition module, for when user have invoked the temporary password pre-set programs, obtaining the user current The temporary password of setting or system generation is simultaneously deposited into the middle of the temporary password storehouse.
Further, the accessing system also includes:
Access rights memory module, the temporary password for obtaining with user's current setting or system are generated is corresponding Function access rights, and be deposited into the middle of authority storehouse.
Further, the first password removing module includes:
Access rights extraction unit, for when being inquired in the temporary password storehouse with described current to login password consistent Temporary password when, function access rights corresponding with the temporary password for inquiring are extracted in the middle of the authority storehouse, with The function that the user can access is limited.
Further, the accessing system also includes:
Termination time memory module, the temporary password for obtaining with user's current setting or system are generated is corresponding Effectively terminate the time, and be deposited into the middle of time storehouse;
Second password removing module, for when current time exceed the time storehouse in any effective termination time when, Temporary password corresponding with any effective termination time is deleted from the temporary password storehouse.
Above-mentioned accessing method and system, when the password that user logins is temporary password, after the completion of logining, system will be from The temporary password deleted in the temporary password storehouse and this time logined is moved, when user logins at this, even if logined Password is peeped surreptitiously, and peeped surreptitiously cannot also be logined successfully by the password peeped surreptitiously.Therefore by the accessing method and system, use Family only needs to be input into temporary password every time to be logined, even if password is peeped surreptitiously, cannot also repeat to login, it is to avoid appearance because Password peeped surreptitiously caused by the phenomenon encroached on of the information such as privacy, property.
Brief description of the drawings
Fig. 1 is the flow chart of the accessing method in first embodiment of the invention.
Fig. 2 is the flow chart of the accessing method in second embodiment of the invention.
Fig. 3 is the structural representation of the accessing system in third embodiment of the invention.
Main element symbol description:
Enquiry module 11 First password removing module 12
True password judge module 13 Pre-set programs judge module 14
Password acquisition module 15 Access rights memory module 16
Access rights extraction unit 121 Termination time memory module 17
Second password removing module 18
Detailed description below will further illustrate the present invention with reference to above-mentioned accompanying drawing.
Specific embodiment
For the ease of understanding the present invention, the present invention is described more fully below with reference to relevant drawings.In accompanying drawing Give some embodiments of the invention.But, the present invention can be realized in many different forms, however it is not limited to this paper institutes The embodiment of description.On the contrary, the purpose that these embodiments are provided be make to the disclosure more it is thorough comprehensively.
It should be noted that when element is referred to as " being fixedly arranged on " another element, it can directly on another element Or can also there is element placed in the middle.When an element is considered as " connection " another element, it can be directly connected to To another element or may be simultaneously present centering elements.Term as used herein " vertical ", " level ", " left side ", " right side " and similar statement are for illustrative purposes only.
Unless otherwise defined, all of technologies and scientific terms used here by the article with belong to technical field of the invention The implication that technical staff is generally understood that is identical.The term for being used in the description of the invention herein is intended merely to description tool The purpose of the embodiment of body, it is not intended that in the limitation present invention.Term as used herein " and/or " include one or more phases The arbitrary and all of combination of the Listed Items of pass.
Fig. 1 is referred to, the accessing method in first embodiment of the invention, including step S01 to step S02 is shown.
Step S01, inquiry whether there is in temporary password storehouse currently logins the consistent temporary password of password, institute with user Stating temporary password storehouse includes all effective temporary password for having stored of the user preset.
It should be noted that before the step S01, user can in advance login need by inputing true password In the middle of the system to be logined (such as intelligent access control system, major web station systems, banking system), and can be what is logined The reservation that temporary password is carried out in the middle of system is set, and preengages the temporary password for setting and be stored into the temporary password storehouse.
Additionally, it should be noted that, current system (such as intelligent access control system, major web station systems, banking system) Set up with mobile terminal (mobile phone, flat board, notebook computer etc.) and associated, user can be needed by being logined in advance on mobile terminal In the middle of the system to be logined, and then the reservation of completion temporary password is set, and the privacy of mobile terminal is high, can avoid the occurrence of true Real password is peeped phenomenon surreptitiously.
Exist in the step S01 inquires the temporary password storehouse and current login consistent interim close of password with described During code, illustrate it is described it is current login password and preengage before this set, now then execution step S02.When the step S01 inquire in the temporary password storehouse in the absence of with it is described it is current login password consistent temporary password when, illustrate it is described ought Before login password and do not preengage before this and set, then do not allow to login, and send the prompting of code error.
Step S02, it is allowed to login, and the temporary password that will be inquired deletes from the temporary password storehouse.
To sum up, the accessing method in the middle of the above embodiment of the present invention, when the password that user logins is temporary password, is stepping on After the completion of entering, system will delete the temporary password this time logined in the temporary password storehouse automatically, when user steps at this Fashionable, even if the password logined is peeped surreptitiously, peeped surreptitiously cannot also be logined successfully by the password peeped surreptitiously.Therefore by described Accessing method and system, user only need to be input into temporary password every time and are logined, even if password is peeped surreptitiously, cannot also repeat Login, it is to avoid the phenomenon that the information such as privacy, property is encroached on caused by occurring being peeped surreptitiously because of password.
Fig. 2 is referred to, the accessing method in second embodiment of the invention, including step S11 to step S19 is shown.
Step S11, judges that user currently logins whether password is true password.
As long as it should be understood that true one, password, if the step S11 is determined, described current to login password be not true During real password, then described current to login password will be temporary password or bad password.
When step S11 determine it is described it is current login password for the true password when, then perform step S12.When described Step S11 determines described current when logining password and being not the true password, then perform step S17.
Step S12, it is allowed to login, and judge whether the user calls temporary password pre-set programs.
It should be understood that because user is logined using true password, then after allowing to login, user is able to access that Institute's functional (such as check, withdraw the money, temporary password is set) in the middle of institute's accessing system.
It should be noted that the temporary password pre-set programs are used for user's reservation sets temporary password, equivalent to common Password set program.Likewise, being provided with calling for the temporary password pre-set programs in the middle of the system that user is logined Module, calling module is set equivalent to common password, and user can be with by the calling module of the temporary password pre-set programs Call the temporary password pre-set programs, and then complete the reservation of temporary password, and now server will sense that user calls The temporary password pre-set programs.
When step S12 determines the user have invoked the temporary password pre-set programs, then step S13 to step is performed Rapid S16.When step S12 determines the user does not call the temporary password pre-set programs, then it is failure to actuate.
Step S13, obtains the temporary password of user's current setting or system generation and is deposited into the temporary password In the middle of storehouse.
It should be understood that when user have invoked the temporary password pre-set programs, user can be according to the prompting of program Oneself sets temporary password, or system automatically generates a temporary password and notifies to user.
Step S14, obtains function access rights corresponding with the temporary password that user's current setting or system are generated, And be deposited into the middle of authority storehouse.
The function access rights refer to the limitation that user can only access specified function in the middle of the system logined, such as only Can use and check informational function, withdrawal function etc. can only be used.
It is described obtain corresponding with the temporary password of user's current setting function access rights method can be:When When user sets a temporary password, a corresponding function access rights are automatically generated, and the function of automatically generating is visited Ask that authority can be configured or change in the middle of institute's accessing system, or;
Function access rights can be set in the middle of the temporary password pre-set programs subprogram is set, when user sets one During individual temporary password, the function access rights will be automatic jumped to subprogram will be set, it is interim close with current setting to complete The setting of the function access rights corresponding to code.
Step S15, obtains effective termination time corresponding with the temporary password that user's current setting or system are generated, And be deposited into the middle of time storehouse.
Effective termination time refers to effective deadline of the temporary password of user's current setting, is had described In the effect termination time, effectively, user can facing using user's current setting for the temporary password of user's current setting When password login in the middle of system, otherwise it is then invalid.
It should be understood that the side for obtaining effective termination time corresponding with the temporary password of user's current setting Method, can be consistent with the method for above-mentioned acquisition function access rights.
Step S16, when any effective termination time in current time exceedes the time storehouse, any will have with described The effect termination time, corresponding temporary password was deleted from the temporary password storehouse.
It should be understood that when user's reservation sets a temporary password, in fact it could happen that because itself being busy with one's work, forgetting goes to step on Enter or forget the phenomenon of the temporary password for setting so that preengage the temporary password of setting for a long time not using logining, and then lead Cause institute energy accessing system password it is more and more, undoubtedly increase the probability that password is cracked, however increased privacy of user, wealth The risk that the information such as product are encroached on.However, by setting effective termination time, above-mentioned situation can be effectively solved, when When user's forgetting goes to login or forget temporary password, within a specified time corresponding temporary password can be deleted.
Step S17, inquiry is in the temporary password storehouse with the presence or absence of currently logining consistent interim close of password with user Code.
Wherein, the temporary password storehouse includes all effective temporary password for having stored of the user preset.
Exist in the step S17 inquires the temporary password storehouse and current login consistent interim close of password with described During code, illustrate it is described it is current login password and preengage before this set, now then execution step S18 to step S19.When The step S17 inquire in the temporary password storehouse in the absence of with it is described it is current login password consistent temporary password when, say It is bright it is described it is current login password and do not preengage before this set, then do not allow to login, and send the prompting of code error.
Step S18, extracts function access rights corresponding with the temporary password for inquiring, with right in the middle of the authority storehouse The function that the user can access is limited.
It should be understood that when the step S18 is proceeded to, the system that represents allows user to login, the corresponding work(of acquisition Energy access rights, will limit the function that the user for currently logining can access.
Step S19, the temporary password for inquiring is deleted from the temporary password storehouse.
When specifically used, when (such as Internet bar) enters into Taobao's system to user's needs in public places, user can pass through Signed in in the middle of system in advance with true password (being assumed to be abcdef) in the mobile terminal of oneself, in mobile terminal, login is mainly The privacy of protection password, because mobile terminal privacy is relatively good, others will not be easily seen the password of oneself input;
Then, in the middle of the system that mobile terminal is logined, reservation sets a temporary password (being assumed to be 123456), and accordingly Setting function access rights and effectively terminate the time;
When Taobao's system is logined in Internet bar, user steps on by only needing to the temporary password (123456) that input is set Enter, and after logining, set temporary password (123456) will be automatically deleted, even if password is peeped surreptitiously, also not result in The infringement of the information such as privacy, property.
Another aspect of the present invention also provides a kind of accessing system, refer to Fig. 3, described in third embodiment of the invention Accessing system, including enquiry module 11 and first password removing module 12.
The enquiry module 11, for for inquiring about in temporary password storehouse with the presence or absence of currently logining password one with user The temporary password of cause, the temporary password storehouse includes all effective temporary password for having stored of the user preset.
The first password removing module 12 is electrically connected with the enquiry module 11, for when in the temporary password storehouse In inquire with it is described it is current login password consistent temporary password when, it is allowed to login, and the temporary password that will be inquired is from institute State deletion in temporary password storehouse.
Further, the accessing system also includes true password judge module 13, pre-set programs judge module 14 and close Code acquisition module 15.
The true password judge module 13 is electrically connected with the enquiry module 11, for judge it is described currently login it is close Whether code is true password.When judge it is described it is current to login password be not the true password when, then the enquiry module 11 Inquiry whether there is in the temporary password storehouse currently logins the consistent temporary password of password with described.
The pre-set programs judge module 14 is electrically connected with the true password judge module 13, and institute is judged for working as State current when to login password be the true password, it is allowed to login, and judge whether the user calls temporary password to preset journey Sequence.
The password acquisition module 15 is electrically connected with the pre-set programs judge module 14, for have invoked institute as user When stating temporary password pre-set programs, obtain the temporary password of user's current setting or system generation and be deposited into described interim In the middle of cryptographic libraries.
Further, the accessing system also includes access rights memory module 16.
The access rights memory module 16, for obtaining the temporary password generated with user's current setting or system Corresponding function access rights, and be deposited into the middle of authority storehouse.
Further, the first password removing module 12 includes access rights extraction unit 121.
The access rights extraction unit 121, currently logins for working as to be inquired in the temporary password storehouse with described During the consistent temporary password of password, function corresponding with the temporary password for inquiring is extracted in the middle of the authority storehouse and is accessed Authority, limits with to the function that the user can access.
Further, the accessing system also includes termination time memory module 17 and the second password removing module 18.
The termination time memory module 17, for obtaining the temporary password generated with user's current setting or system Corresponding effective termination time, and be deposited into the middle of time storehouse.
The second password removing module 18, for when current time exceed the time storehouse in any effective termination when Between when, temporary password corresponding with any effective termination time is deleted from the temporary password storehouse.
It will be understood by those skilled in the art that in flow charts represent or logic described otherwise above herein and/or Step, for example, being considered the order list of the executable instruction for realizing logic function, may be embodied in and appoint In what computer-readable medium, for instruction execution system, device or equipment (such as computer based system, including processor System or other can be from the system of instruction execution system, device or equipment instruction fetch and execute instruction) use, or combine this A little instruction execution system, device or equipment and use.For the purpose of this specification, " computer-readable medium " can be it is any can be with Comprising, storage, communication, propagate or transmission procedure performs system for instruction execution system, device or equipment or with reference to these instructions System, device or equipment and the device that uses.
The more specifically example (non-exhaustive list) of computer-readable medium includes following:With one or more wirings Electrical connection section (electronic installation), portable computer diskette box (magnetic device), random access memory (RAM), read-only storage (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device, and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can thereon print described program or other are suitable Medium, because optical scanner for example can be carried out by paper or other media, then enters edlin, interpretation or if necessary with it His suitable method is processed electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each several part of the invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned In implementation method, the software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage Or firmware is realized.If for example, realized with hardware, and in another embodiment, can be with well known in the art Any one of row technology or combinations thereof are realized:With the logic gates for realizing logic function to data-signal Discrete logic, the application specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means to combine specific features, structure, material or spy that the embodiment or example are described Point is contained at least one embodiment of the invention or example.In this manual, to the schematic representation of above-mentioned term not Necessarily refer to identical embodiment or example.And, the specific features of description, structure, material or feature can be any One or more embodiments or example in combine in an appropriate manner.
Embodiment described above only expresses several embodiments of the invention, and its description is more specific and detailed, but simultaneously Therefore the limitation to the scope of the claims of the present invention can not be interpreted as.It should be pointed out that for one of ordinary skill in the art For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention Shield scope.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.

Claims (10)

1. a kind of accessing method, it is characterised in that including:
Inquiry whether there is in temporary password storehouse currently logins the consistent temporary password of password, the temporary password storehouse with user Include all effective temporary password for having stored of the user preset;
If so, then allow to login, and the temporary password that will be inquired is deleted from the temporary password storehouse.
2. accessing method according to claim 1, it is characterised in that whether there is in temporary password storehouse in the inquiry Before the step of consistent temporary password of password is currently logined with user, also include:
Judge described currently to login whether password is true password;
The consistent temporary password of password is currently logined with user if it is not, then performing the inquiry and whether there is in temporary password storehouse The step of;
If so, then allowing to login, and judge whether the user calls temporary password pre-set programs;
If calling, obtain user's current setting or system generation temporary password and be deposited into the temporary password storehouse work as In.
3. accessing method according to claim 2, it is characterised in that obtain user's current setting or system described After the temporary password of generation and the step being deposited into the middle of the temporary password storehouse, also include:
Function access rights corresponding with the temporary password that user's current setting or system are generated are obtained, and is deposited into authority In the middle of storehouse.
4. accessing method according to claim 3, it is characterised in that described to allow the step of the logining to include:
Function access rights corresponding with the temporary password for inquiring are extracted in the middle of the authority storehouse, with to the user The function that can be accessed is limited.
5. accessing method according to claim 2, it is characterised in that obtain user's current setting or system described After the temporary password of generation and the step being deposited into the middle of the temporary password storehouse, also include:
Effective termination time corresponding with the temporary password that user's current setting or system are generated is obtained, and is deposited into the time In the middle of storehouse;
When current time exceed the time storehouse in any effective termination time when, will be with any effective termination time pair The temporary password answered is deleted from the temporary password storehouse.
6. a kind of accessing system, it is characterised in that including:
Enquiry module, the consistent temporary password of password is currently logined with user for inquiring about to whether there is in temporary password storehouse, The temporary password storehouse includes all effective temporary password for having stored of the user preset;
First password removing module, for current logining that password is consistent to be faced with described when being inquired in the temporary password storehouse When password when, it is allowed to login, and the temporary password that will be inquired is deleted from the temporary password storehouse.
7. accessing system according to claim 6, it is characterised in that the accessing system also includes:
True password judge module, for judging described currently to login whether password is true password;
When judge it is described it is current to login password be not the true password when, then the enquiry module inquiry is described interim close Whether there is in code storehouse and currently login the consistent temporary password of password with described;
Pre-set programs judge module, for when judge it is described it is current to login password be the true password when, it is allowed to login, and Judge whether the user calls temporary password pre-set programs;
Password acquisition module, for when user have invoked the temporary password pre-set programs, obtaining user's current setting Or system generation temporary password and be deposited into the middle of the temporary password storehouse.
8. accessing system according to claim 7, it is characterised in that the accessing system also includes:
Access rights memory module, for obtaining function corresponding with the temporary password of user's current setting or system generation Access rights, and be deposited into the middle of authority storehouse.
9. accessing system according to claim 8, it is characterised in that the first password removing module includes:
Access rights extraction unit, for current logining that password is consistent to be faced with described when being inquired in the temporary password storehouse When password when, function access rights corresponding with the temporary password for inquiring are extracted in the middle of the authority storehouse, with to institute The function that stating user can access is limited.
10. accessing system according to claim 7, it is characterised in that the accessing system also includes:
Termination time memory module, the temporary password for obtaining with user's current setting or system are generated is corresponding effectively The termination time, and be deposited into the middle of time storehouse;
Second password removing module, for exceeding the time storehouse when current time in any effective termination time when, will be with Any effective termination time, corresponding temporary password was deleted from the temporary password storehouse.
CN201710196278.4A 2017-03-29 2017-03-29 Accessing method and system Withdrawn CN106936839A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710196278.4A CN106936839A (en) 2017-03-29 2017-03-29 Accessing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710196278.4A CN106936839A (en) 2017-03-29 2017-03-29 Accessing method and system

Publications (1)

Publication Number Publication Date
CN106936839A true CN106936839A (en) 2017-07-07

Family

ID=59426002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710196278.4A Withdrawn CN106936839A (en) 2017-03-29 2017-03-29 Accessing method and system

Country Status (1)

Country Link
CN (1) CN106936839A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110071813A (en) * 2019-04-30 2019-07-30 杭州复杂美科技有限公司 A kind of account permission change method system, account platform and user terminal

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1881228A (en) * 2005-06-14 2006-12-20 华为技术有限公司 Method for controlling system account right
CN102467774A (en) * 2010-11-17 2012-05-23 戴胜祝 Cryptosystem with anti-recording function
CN103684791A (en) * 2013-12-19 2014-03-26 华为软件技术有限公司 Login processing device, method and system
CN104202298A (en) * 2014-07-30 2014-12-10 北京乐动卓越信息技术有限公司 System and method of login with single account and multiple passwords
US20150072646A1 (en) * 2013-09-09 2015-03-12 International Business Machines Corporation Mobile device password reset
EP2961208A1 (en) * 2014-06-27 2015-12-30 Gemalto SA Method for accessing a service and corresponding application server, device and system
CN106530470A (en) * 2016-12-14 2017-03-22 余仁植 Vehicle unlocking method, lock unlocking device, vehicle and vehicle system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1881228A (en) * 2005-06-14 2006-12-20 华为技术有限公司 Method for controlling system account right
CN102467774A (en) * 2010-11-17 2012-05-23 戴胜祝 Cryptosystem with anti-recording function
US20150072646A1 (en) * 2013-09-09 2015-03-12 International Business Machines Corporation Mobile device password reset
CN103684791A (en) * 2013-12-19 2014-03-26 华为软件技术有限公司 Login processing device, method and system
EP2961208A1 (en) * 2014-06-27 2015-12-30 Gemalto SA Method for accessing a service and corresponding application server, device and system
CN104202298A (en) * 2014-07-30 2014-12-10 北京乐动卓越信息技术有限公司 System and method of login with single account and multiple passwords
CN106530470A (en) * 2016-12-14 2017-03-22 余仁植 Vehicle unlocking method, lock unlocking device, vehicle and vehicle system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110071813A (en) * 2019-04-30 2019-07-30 杭州复杂美科技有限公司 A kind of account permission change method system, account platform and user terminal
CN110071813B (en) * 2019-04-30 2021-10-01 杭州复杂美科技有限公司 Account permission changing method and system, account platform and user terminal

Similar Documents

Publication Publication Date Title
US10567385B2 (en) System and method for provisioning a security token
US9716699B2 (en) Password management system
US7945951B2 (en) Rights-context elevator
US10771455B2 (en) System and method for enabling secure authentication
CN104143068B (en) Method of password authentication and system
WO2017151867A1 (en) Secure mobile device two-factor authentication
US20070198933A1 (en) Permitting Multiple Tasks Requiring Elevated Rights
US10110578B1 (en) Source-inclusive credential verification
CN104615924A (en) System and method for storing account numbers and passwords for account numbers
US20120204268A1 (en) Method and apparatus for protecting information based on data card
US10749874B2 (en) Preventing unauthorized access to secured information systems by injecting device data collectors
CN103971048A (en) Method and system for entering password
US7941848B2 (en) Elevating rights
US10263971B2 (en) Preventing unauthorized access to secured information systems by injecting device data collectors
CN105740670A (en) Application encryption method and device, and application startup method and device
CN106529324A (en) Method and device for switching user identity
CN103036852A (en) Method and device for achieving network login
CN103763370A (en) Method, system and device for changing screen locking password of working area of mobile terminal
US20180139244A1 (en) Management of actions initiated by applications in client devices
CN106936839A (en) Accessing method and system
CN102682230B (en) For safety protecting method and the device of the Internet Long-distance Control
US10346606B2 (en) Generation of a captcha on a handheld touch screen device
US20060206930A1 (en) Method and system for rendering single sign on
KR20190003146A (en) Automatic login system and management method through authorization authentication of smartphone
KR20210065923A (en) Device authentication method by login session passing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20170707

WW01 Invention patent application withdrawn after publication