CN106936839A - Accessing method and system - Google Patents
Accessing method and system Download PDFInfo
- Publication number
- CN106936839A CN106936839A CN201710196278.4A CN201710196278A CN106936839A CN 106936839 A CN106936839 A CN 106936839A CN 201710196278 A CN201710196278 A CN 201710196278A CN 106936839 A CN106936839 A CN 106936839A
- Authority
- CN
- China
- Prior art keywords
- password
- temporary password
- storehouse
- user
- temporary
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3228—One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
Abstract
The present invention provides a kind of accessing method and system, and the accessing method includes:With the presence or absence of the consistent temporary password of password is currently logined with user in temporary password storehouse, the temporary password storehouse includes all effective temporary password for having stored of the user preset for inquiry;If so, then allow to login, and the temporary password that will be inquired is deleted from the temporary password storehouse.Accessing method and system in the present invention, when the password that user logins is temporary password, after the completion of logining, system will delete the temporary password this time logined in the temporary password storehouse automatically, when user logins at this, even if the password logined is peeped surreptitiously, peeped surreptitiously cannot also be logined successfully by the password peeped surreptitiously.Therefore by the accessing method and system, user only needs to be input into temporary password every time and is logined, even if password is peeped surreptitiously, cannot also repeat to login, it is to avoid appearance peeped surreptitiously because of password caused by the phenomenon encroached on of the information such as privacy, property.
Description
Technical field
The present invention relates to cryptographic service technical field, more particularly to a kind of accessing method and system.
Background technology
With the continuous improvement of the communication technology and level of digital, increasing place needs to step in the middle of actual life
Enter password, such as ATM, computer, POS, gate inhibition, the account of major websites is logined, by the setting of password to a certain extent
Can effectively ensure that the information such as privacy, the property of user are not encroached on.
However, with the continuous improvement of hacking technique and stealing cryptographic means, adding current password and logining meeting mostly cruelly
It is exposed in the middle of public arena, is easily caused peep of cipher, person of peeping will peeps the letters such as privacy, the property of taking family by password
Breath, so as to greatly loss will be caused to user.
The reason for causing above-mentioned loss is, in the middle of prior art, does not have the means of cryptoguard so that when password is peeped
Surreptitiously, when and not having time update password again, person of peeping passes through the private for entering into user that password just can be easy peeped surreptitiously
Close space, so as to encroach on the information such as the privacy of user, property.
The content of the invention
Based on this, even if being peeped surreptitiously it is an object of the invention to provide a kind of password, the accessing method logined cannot be also repeated
And system.
A kind of accessing method according to embodiments of the present invention, including:
Inquiry whether there is in temporary password storehouse currently logins the consistent temporary password of password with user, described interim close
Code storehouse includes all effective temporary password for having stored of the user preset;
If so, then allow to login, and the temporary password that will be inquired is deleted from the temporary password storehouse.
In addition, a kind of accessing method according to the above embodiment of the present invention, can also have following additional technical characteristic:
Further, the inquiry in temporary password storehouse with the presence or absence of currently logining consistent interim of password with user
Before the step of password, also include:
Judge described currently to login whether password is true password;
If it is not, then performing the inquiry in temporary password storehouse with the presence or absence of currently logining consistent interim of password with user
The step of password;
If so, then allowing to login, and judge whether the user calls temporary password pre-set programs;
If calling, obtain the temporary password of user's current setting or system generation and be deposited into the temporary password
In the middle of storehouse.
Further, in the temporary password for obtaining user's current setting or system generation and it is deposited into described facing
When cryptographic libraries in the middle of step after, also include:
Function access rights corresponding with the temporary password that user's current setting or system are generated are obtained, and is deposited into
In the middle of authority storehouse.
Further, it is described to allow the step of the logining to include:
Function access rights corresponding with the temporary password for inquiring are extracted in the middle of the authority storehouse, with to described
The function that user can access is limited.
Further, in the temporary password for obtaining user's current setting or system generation and it is deposited into described facing
When cryptographic libraries in the middle of step after, also include:
Effective termination time corresponding with the temporary password that user's current setting or system are generated is obtained, and is deposited into
In the middle of time storehouse;
When current time exceed the time storehouse in any effective termination time when, will with any effective termination when
Between corresponding temporary password deleted from the temporary password storehouse.
A kind of accessing system according to embodiments of the present invention, including:
Enquiry module, for inquiring about in temporary password storehouse with the presence or absence of currently logining consistent interim close of password with user
Code, the temporary password storehouse includes all effective temporary password for having stored of the user preset;
First password removing module, for when being inquired in the temporary password storehouse with described current to login password consistent
Temporary password when, it is allowed to login, and the temporary password that will be inquired is deleted from the temporary password storehouse.
In addition, a kind of accessing system according to the above embodiment of the present invention, can also have following additional technical characteristic:
Further, the accessing system also includes:
True password judge module, for judging described currently to login whether password is true password;
When judge it is described it is current to login password be not the true password when, then the enquiry module inquiry is faced described
When cryptographic libraries in the presence or absence of currently logining the consistent temporary password of password with described;
Pre-set programs judge module, for when judge it is described it is current to login password be the true password when, it is allowed to step on
Enter, and judge whether the user calls temporary password pre-set programs;
Password acquisition module, for when user have invoked the temporary password pre-set programs, obtaining the user current
The temporary password of setting or system generation is simultaneously deposited into the middle of the temporary password storehouse.
Further, the accessing system also includes:
Access rights memory module, the temporary password for obtaining with user's current setting or system are generated is corresponding
Function access rights, and be deposited into the middle of authority storehouse.
Further, the first password removing module includes:
Access rights extraction unit, for when being inquired in the temporary password storehouse with described current to login password consistent
Temporary password when, function access rights corresponding with the temporary password for inquiring are extracted in the middle of the authority storehouse, with
The function that the user can access is limited.
Further, the accessing system also includes:
Termination time memory module, the temporary password for obtaining with user's current setting or system are generated is corresponding
Effectively terminate the time, and be deposited into the middle of time storehouse;
Second password removing module, for when current time exceed the time storehouse in any effective termination time when,
Temporary password corresponding with any effective termination time is deleted from the temporary password storehouse.
Above-mentioned accessing method and system, when the password that user logins is temporary password, after the completion of logining, system will be from
The temporary password deleted in the temporary password storehouse and this time logined is moved, when user logins at this, even if logined
Password is peeped surreptitiously, and peeped surreptitiously cannot also be logined successfully by the password peeped surreptitiously.Therefore by the accessing method and system, use
Family only needs to be input into temporary password every time to be logined, even if password is peeped surreptitiously, cannot also repeat to login, it is to avoid appearance because
Password peeped surreptitiously caused by the phenomenon encroached on of the information such as privacy, property.
Brief description of the drawings
Fig. 1 is the flow chart of the accessing method in first embodiment of the invention.
Fig. 2 is the flow chart of the accessing method in second embodiment of the invention.
Fig. 3 is the structural representation of the accessing system in third embodiment of the invention.
Main element symbol description:
Enquiry module | 11 | First password removing module | 12 |
True password judge module | 13 | Pre-set programs judge module | 14 |
Password acquisition module | 15 | Access rights memory module | 16 |
Access rights extraction unit | 121 | Termination time memory module | 17 |
Second password removing module | 18 |
Detailed description below will further illustrate the present invention with reference to above-mentioned accompanying drawing.
Specific embodiment
For the ease of understanding the present invention, the present invention is described more fully below with reference to relevant drawings.In accompanying drawing
Give some embodiments of the invention.But, the present invention can be realized in many different forms, however it is not limited to this paper institutes
The embodiment of description.On the contrary, the purpose that these embodiments are provided be make to the disclosure more it is thorough comprehensively.
It should be noted that when element is referred to as " being fixedly arranged on " another element, it can directly on another element
Or can also there is element placed in the middle.When an element is considered as " connection " another element, it can be directly connected to
To another element or may be simultaneously present centering elements.Term as used herein " vertical ", " level ", " left side ",
" right side " and similar statement are for illustrative purposes only.
Unless otherwise defined, all of technologies and scientific terms used here by the article with belong to technical field of the invention
The implication that technical staff is generally understood that is identical.The term for being used in the description of the invention herein is intended merely to description tool
The purpose of the embodiment of body, it is not intended that in the limitation present invention.Term as used herein " and/or " include one or more phases
The arbitrary and all of combination of the Listed Items of pass.
Fig. 1 is referred to, the accessing method in first embodiment of the invention, including step S01 to step S02 is shown.
Step S01, inquiry whether there is in temporary password storehouse currently logins the consistent temporary password of password, institute with user
Stating temporary password storehouse includes all effective temporary password for having stored of the user preset.
It should be noted that before the step S01, user can in advance login need by inputing true password
In the middle of the system to be logined (such as intelligent access control system, major web station systems, banking system), and can be what is logined
The reservation that temporary password is carried out in the middle of system is set, and preengages the temporary password for setting and be stored into the temporary password storehouse.
Additionally, it should be noted that, current system (such as intelligent access control system, major web station systems, banking system)
Set up with mobile terminal (mobile phone, flat board, notebook computer etc.) and associated, user can be needed by being logined in advance on mobile terminal
In the middle of the system to be logined, and then the reservation of completion temporary password is set, and the privacy of mobile terminal is high, can avoid the occurrence of true
Real password is peeped phenomenon surreptitiously.
Exist in the step S01 inquires the temporary password storehouse and current login consistent interim close of password with described
During code, illustrate it is described it is current login password and preengage before this set, now then execution step S02.When the step
S01 inquire in the temporary password storehouse in the absence of with it is described it is current login password consistent temporary password when, illustrate it is described ought
Before login password and do not preengage before this and set, then do not allow to login, and send the prompting of code error.
Step S02, it is allowed to login, and the temporary password that will be inquired deletes from the temporary password storehouse.
To sum up, the accessing method in the middle of the above embodiment of the present invention, when the password that user logins is temporary password, is stepping on
After the completion of entering, system will delete the temporary password this time logined in the temporary password storehouse automatically, when user steps at this
Fashionable, even if the password logined is peeped surreptitiously, peeped surreptitiously cannot also be logined successfully by the password peeped surreptitiously.Therefore by described
Accessing method and system, user only need to be input into temporary password every time and are logined, even if password is peeped surreptitiously, cannot also repeat
Login, it is to avoid the phenomenon that the information such as privacy, property is encroached on caused by occurring being peeped surreptitiously because of password.
Fig. 2 is referred to, the accessing method in second embodiment of the invention, including step S11 to step S19 is shown.
Step S11, judges that user currently logins whether password is true password.
As long as it should be understood that true one, password, if the step S11 is determined, described current to login password be not true
During real password, then described current to login password will be temporary password or bad password.
When step S11 determine it is described it is current login password for the true password when, then perform step S12.When described
Step S11 determines described current when logining password and being not the true password, then perform step S17.
Step S12, it is allowed to login, and judge whether the user calls temporary password pre-set programs.
It should be understood that because user is logined using true password, then after allowing to login, user is able to access that
Institute's functional (such as check, withdraw the money, temporary password is set) in the middle of institute's accessing system.
It should be noted that the temporary password pre-set programs are used for user's reservation sets temporary password, equivalent to common
Password set program.Likewise, being provided with calling for the temporary password pre-set programs in the middle of the system that user is logined
Module, calling module is set equivalent to common password, and user can be with by the calling module of the temporary password pre-set programs
Call the temporary password pre-set programs, and then complete the reservation of temporary password, and now server will sense that user calls
The temporary password pre-set programs.
When step S12 determines the user have invoked the temporary password pre-set programs, then step S13 to step is performed
Rapid S16.When step S12 determines the user does not call the temporary password pre-set programs, then it is failure to actuate.
Step S13, obtains the temporary password of user's current setting or system generation and is deposited into the temporary password
In the middle of storehouse.
It should be understood that when user have invoked the temporary password pre-set programs, user can be according to the prompting of program
Oneself sets temporary password, or system automatically generates a temporary password and notifies to user.
Step S14, obtains function access rights corresponding with the temporary password that user's current setting or system are generated,
And be deposited into the middle of authority storehouse.
The function access rights refer to the limitation that user can only access specified function in the middle of the system logined, such as only
Can use and check informational function, withdrawal function etc. can only be used.
It is described obtain corresponding with the temporary password of user's current setting function access rights method can be:When
When user sets a temporary password, a corresponding function access rights are automatically generated, and the function of automatically generating is visited
Ask that authority can be configured or change in the middle of institute's accessing system, or;
Function access rights can be set in the middle of the temporary password pre-set programs subprogram is set, when user sets one
During individual temporary password, the function access rights will be automatic jumped to subprogram will be set, it is interim close with current setting to complete
The setting of the function access rights corresponding to code.
Step S15, obtains effective termination time corresponding with the temporary password that user's current setting or system are generated,
And be deposited into the middle of time storehouse.
Effective termination time refers to effective deadline of the temporary password of user's current setting, is had described
In the effect termination time, effectively, user can facing using user's current setting for the temporary password of user's current setting
When password login in the middle of system, otherwise it is then invalid.
It should be understood that the side for obtaining effective termination time corresponding with the temporary password of user's current setting
Method, can be consistent with the method for above-mentioned acquisition function access rights.
Step S16, when any effective termination time in current time exceedes the time storehouse, any will have with described
The effect termination time, corresponding temporary password was deleted from the temporary password storehouse.
It should be understood that when user's reservation sets a temporary password, in fact it could happen that because itself being busy with one's work, forgetting goes to step on
Enter or forget the phenomenon of the temporary password for setting so that preengage the temporary password of setting for a long time not using logining, and then lead
Cause institute energy accessing system password it is more and more, undoubtedly increase the probability that password is cracked, however increased privacy of user, wealth
The risk that the information such as product are encroached on.However, by setting effective termination time, above-mentioned situation can be effectively solved, when
When user's forgetting goes to login or forget temporary password, within a specified time corresponding temporary password can be deleted.
Step S17, inquiry is in the temporary password storehouse with the presence or absence of currently logining consistent interim close of password with user
Code.
Wherein, the temporary password storehouse includes all effective temporary password for having stored of the user preset.
Exist in the step S17 inquires the temporary password storehouse and current login consistent interim close of password with described
During code, illustrate it is described it is current login password and preengage before this set, now then execution step S18 to step S19.When
The step S17 inquire in the temporary password storehouse in the absence of with it is described it is current login password consistent temporary password when, say
It is bright it is described it is current login password and do not preengage before this set, then do not allow to login, and send the prompting of code error.
Step S18, extracts function access rights corresponding with the temporary password for inquiring, with right in the middle of the authority storehouse
The function that the user can access is limited.
It should be understood that when the step S18 is proceeded to, the system that represents allows user to login, the corresponding work(of acquisition
Energy access rights, will limit the function that the user for currently logining can access.
Step S19, the temporary password for inquiring is deleted from the temporary password storehouse.
When specifically used, when (such as Internet bar) enters into Taobao's system to user's needs in public places, user can pass through
Signed in in the middle of system in advance with true password (being assumed to be abcdef) in the mobile terminal of oneself, in mobile terminal, login is mainly
The privacy of protection password, because mobile terminal privacy is relatively good, others will not be easily seen the password of oneself input;
Then, in the middle of the system that mobile terminal is logined, reservation sets a temporary password (being assumed to be 123456), and accordingly
Setting function access rights and effectively terminate the time;
When Taobao's system is logined in Internet bar, user steps on by only needing to the temporary password (123456) that input is set
Enter, and after logining, set temporary password (123456) will be automatically deleted, even if password is peeped surreptitiously, also not result in
The infringement of the information such as privacy, property.
Another aspect of the present invention also provides a kind of accessing system, refer to Fig. 3, described in third embodiment of the invention
Accessing system, including enquiry module 11 and first password removing module 12.
The enquiry module 11, for for inquiring about in temporary password storehouse with the presence or absence of currently logining password one with user
The temporary password of cause, the temporary password storehouse includes all effective temporary password for having stored of the user preset.
The first password removing module 12 is electrically connected with the enquiry module 11, for when in the temporary password storehouse
In inquire with it is described it is current login password consistent temporary password when, it is allowed to login, and the temporary password that will be inquired is from institute
State deletion in temporary password storehouse.
Further, the accessing system also includes true password judge module 13, pre-set programs judge module 14 and close
Code acquisition module 15.
The true password judge module 13 is electrically connected with the enquiry module 11, for judge it is described currently login it is close
Whether code is true password.When judge it is described it is current to login password be not the true password when, then the enquiry module 11
Inquiry whether there is in the temporary password storehouse currently logins the consistent temporary password of password with described.
The pre-set programs judge module 14 is electrically connected with the true password judge module 13, and institute is judged for working as
State current when to login password be the true password, it is allowed to login, and judge whether the user calls temporary password to preset journey
Sequence.
The password acquisition module 15 is electrically connected with the pre-set programs judge module 14, for have invoked institute as user
When stating temporary password pre-set programs, obtain the temporary password of user's current setting or system generation and be deposited into described interim
In the middle of cryptographic libraries.
Further, the accessing system also includes access rights memory module 16.
The access rights memory module 16, for obtaining the temporary password generated with user's current setting or system
Corresponding function access rights, and be deposited into the middle of authority storehouse.
Further, the first password removing module 12 includes access rights extraction unit 121.
The access rights extraction unit 121, currently logins for working as to be inquired in the temporary password storehouse with described
During the consistent temporary password of password, function corresponding with the temporary password for inquiring is extracted in the middle of the authority storehouse and is accessed
Authority, limits with to the function that the user can access.
Further, the accessing system also includes termination time memory module 17 and the second password removing module 18.
The termination time memory module 17, for obtaining the temporary password generated with user's current setting or system
Corresponding effective termination time, and be deposited into the middle of time storehouse.
The second password removing module 18, for when current time exceed the time storehouse in any effective termination when
Between when, temporary password corresponding with any effective termination time is deleted from the temporary password storehouse.
It will be understood by those skilled in the art that in flow charts represent or logic described otherwise above herein and/or
Step, for example, being considered the order list of the executable instruction for realizing logic function, may be embodied in and appoint
In what computer-readable medium, for instruction execution system, device or equipment (such as computer based system, including processor
System or other can be from the system of instruction execution system, device or equipment instruction fetch and execute instruction) use, or combine this
A little instruction execution system, device or equipment and use.For the purpose of this specification, " computer-readable medium " can be it is any can be with
Comprising, storage, communication, propagate or transmission procedure performs system for instruction execution system, device or equipment or with reference to these instructions
System, device or equipment and the device that uses.
The more specifically example (non-exhaustive list) of computer-readable medium includes following:With one or more wirings
Electrical connection section (electronic installation), portable computer diskette box (magnetic device), random access memory (RAM), read-only storage
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device, and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can thereon print described program or other are suitable
Medium, because optical scanner for example can be carried out by paper or other media, then enters edlin, interpretation or if necessary with it
His suitable method is processed electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each several part of the invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned
In implementation method, the software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage
Or firmware is realized.If for example, realized with hardware, and in another embodiment, can be with well known in the art
Any one of row technology or combinations thereof are realized:With the logic gates for realizing logic function to data-signal
Discrete logic, the application specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means to combine specific features, structure, material or spy that the embodiment or example are described
Point is contained at least one embodiment of the invention or example.In this manual, to the schematic representation of above-mentioned term not
Necessarily refer to identical embodiment or example.And, the specific features of description, structure, material or feature can be any
One or more embodiments or example in combine in an appropriate manner.
Embodiment described above only expresses several embodiments of the invention, and its description is more specific and detailed, but simultaneously
Therefore the limitation to the scope of the claims of the present invention can not be interpreted as.It should be pointed out that for one of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention
Shield scope.Therefore, the protection domain of patent of the present invention should be determined by the appended claims.
Claims (10)
1. a kind of accessing method, it is characterised in that including:
Inquiry whether there is in temporary password storehouse currently logins the consistent temporary password of password, the temporary password storehouse with user
Include all effective temporary password for having stored of the user preset;
If so, then allow to login, and the temporary password that will be inquired is deleted from the temporary password storehouse.
2. accessing method according to claim 1, it is characterised in that whether there is in temporary password storehouse in the inquiry
Before the step of consistent temporary password of password is currently logined with user, also include:
Judge described currently to login whether password is true password;
The consistent temporary password of password is currently logined with user if it is not, then performing the inquiry and whether there is in temporary password storehouse
The step of;
If so, then allowing to login, and judge whether the user calls temporary password pre-set programs;
If calling, obtain user's current setting or system generation temporary password and be deposited into the temporary password storehouse work as
In.
3. accessing method according to claim 2, it is characterised in that obtain user's current setting or system described
After the temporary password of generation and the step being deposited into the middle of the temporary password storehouse, also include:
Function access rights corresponding with the temporary password that user's current setting or system are generated are obtained, and is deposited into authority
In the middle of storehouse.
4. accessing method according to claim 3, it is characterised in that described to allow the step of the logining to include:
Function access rights corresponding with the temporary password for inquiring are extracted in the middle of the authority storehouse, with to the user
The function that can be accessed is limited.
5. accessing method according to claim 2, it is characterised in that obtain user's current setting or system described
After the temporary password of generation and the step being deposited into the middle of the temporary password storehouse, also include:
Effective termination time corresponding with the temporary password that user's current setting or system are generated is obtained, and is deposited into the time
In the middle of storehouse;
When current time exceed the time storehouse in any effective termination time when, will be with any effective termination time pair
The temporary password answered is deleted from the temporary password storehouse.
6. a kind of accessing system, it is characterised in that including:
Enquiry module, the consistent temporary password of password is currently logined with user for inquiring about to whether there is in temporary password storehouse,
The temporary password storehouse includes all effective temporary password for having stored of the user preset;
First password removing module, for current logining that password is consistent to be faced with described when being inquired in the temporary password storehouse
When password when, it is allowed to login, and the temporary password that will be inquired is deleted from the temporary password storehouse.
7. accessing system according to claim 6, it is characterised in that the accessing system also includes:
True password judge module, for judging described currently to login whether password is true password;
When judge it is described it is current to login password be not the true password when, then the enquiry module inquiry is described interim close
Whether there is in code storehouse and currently login the consistent temporary password of password with described;
Pre-set programs judge module, for when judge it is described it is current to login password be the true password when, it is allowed to login, and
Judge whether the user calls temporary password pre-set programs;
Password acquisition module, for when user have invoked the temporary password pre-set programs, obtaining user's current setting
Or system generation temporary password and be deposited into the middle of the temporary password storehouse.
8. accessing system according to claim 7, it is characterised in that the accessing system also includes:
Access rights memory module, for obtaining function corresponding with the temporary password of user's current setting or system generation
Access rights, and be deposited into the middle of authority storehouse.
9. accessing system according to claim 8, it is characterised in that the first password removing module includes:
Access rights extraction unit, for current logining that password is consistent to be faced with described when being inquired in the temporary password storehouse
When password when, function access rights corresponding with the temporary password for inquiring are extracted in the middle of the authority storehouse, with to institute
The function that stating user can access is limited.
10. accessing system according to claim 7, it is characterised in that the accessing system also includes:
Termination time memory module, the temporary password for obtaining with user's current setting or system are generated is corresponding effectively
The termination time, and be deposited into the middle of time storehouse;
Second password removing module, for exceeding the time storehouse when current time in any effective termination time when, will be with
Any effective termination time, corresponding temporary password was deleted from the temporary password storehouse.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710196278.4A CN106936839A (en) | 2017-03-29 | 2017-03-29 | Accessing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710196278.4A CN106936839A (en) | 2017-03-29 | 2017-03-29 | Accessing method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106936839A true CN106936839A (en) | 2017-07-07 |
Family
ID=59426002
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710196278.4A Withdrawn CN106936839A (en) | 2017-03-29 | 2017-03-29 | Accessing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106936839A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110071813A (en) * | 2019-04-30 | 2019-07-30 | 杭州复杂美科技有限公司 | A kind of account permission change method system, account platform and user terminal |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1881228A (en) * | 2005-06-14 | 2006-12-20 | 华为技术有限公司 | Method for controlling system account right |
CN102467774A (en) * | 2010-11-17 | 2012-05-23 | 戴胜祝 | Cryptosystem with anti-recording function |
CN103684791A (en) * | 2013-12-19 | 2014-03-26 | 华为软件技术有限公司 | Login processing device, method and system |
CN104202298A (en) * | 2014-07-30 | 2014-12-10 | 北京乐动卓越信息技术有限公司 | System and method of login with single account and multiple passwords |
US20150072646A1 (en) * | 2013-09-09 | 2015-03-12 | International Business Machines Corporation | Mobile device password reset |
EP2961208A1 (en) * | 2014-06-27 | 2015-12-30 | Gemalto SA | Method for accessing a service and corresponding application server, device and system |
CN106530470A (en) * | 2016-12-14 | 2017-03-22 | 余仁植 | Vehicle unlocking method, lock unlocking device, vehicle and vehicle system |
-
2017
- 2017-03-29 CN CN201710196278.4A patent/CN106936839A/en not_active Withdrawn
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1881228A (en) * | 2005-06-14 | 2006-12-20 | 华为技术有限公司 | Method for controlling system account right |
CN102467774A (en) * | 2010-11-17 | 2012-05-23 | 戴胜祝 | Cryptosystem with anti-recording function |
US20150072646A1 (en) * | 2013-09-09 | 2015-03-12 | International Business Machines Corporation | Mobile device password reset |
CN103684791A (en) * | 2013-12-19 | 2014-03-26 | 华为软件技术有限公司 | Login processing device, method and system |
EP2961208A1 (en) * | 2014-06-27 | 2015-12-30 | Gemalto SA | Method for accessing a service and corresponding application server, device and system |
CN104202298A (en) * | 2014-07-30 | 2014-12-10 | 北京乐动卓越信息技术有限公司 | System and method of login with single account and multiple passwords |
CN106530470A (en) * | 2016-12-14 | 2017-03-22 | 余仁植 | Vehicle unlocking method, lock unlocking device, vehicle and vehicle system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110071813A (en) * | 2019-04-30 | 2019-07-30 | 杭州复杂美科技有限公司 | A kind of account permission change method system, account platform and user terminal |
CN110071813B (en) * | 2019-04-30 | 2021-10-01 | 杭州复杂美科技有限公司 | Account permission changing method and system, account platform and user terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10567385B2 (en) | System and method for provisioning a security token | |
US9716699B2 (en) | Password management system | |
US7945951B2 (en) | Rights-context elevator | |
US10771455B2 (en) | System and method for enabling secure authentication | |
CN104143068B (en) | Method of password authentication and system | |
WO2017151867A1 (en) | Secure mobile device two-factor authentication | |
US20070198933A1 (en) | Permitting Multiple Tasks Requiring Elevated Rights | |
US10110578B1 (en) | Source-inclusive credential verification | |
CN104615924A (en) | System and method for storing account numbers and passwords for account numbers | |
US20120204268A1 (en) | Method and apparatus for protecting information based on data card | |
US10749874B2 (en) | Preventing unauthorized access to secured information systems by injecting device data collectors | |
CN103971048A (en) | Method and system for entering password | |
US7941848B2 (en) | Elevating rights | |
US10263971B2 (en) | Preventing unauthorized access to secured information systems by injecting device data collectors | |
CN105740670A (en) | Application encryption method and device, and application startup method and device | |
CN106529324A (en) | Method and device for switching user identity | |
CN103036852A (en) | Method and device for achieving network login | |
CN103763370A (en) | Method, system and device for changing screen locking password of working area of mobile terminal | |
US20180139244A1 (en) | Management of actions initiated by applications in client devices | |
CN106936839A (en) | Accessing method and system | |
CN102682230B (en) | For safety protecting method and the device of the Internet Long-distance Control | |
US10346606B2 (en) | Generation of a captcha on a handheld touch screen device | |
US20060206930A1 (en) | Method and system for rendering single sign on | |
KR20190003146A (en) | Automatic login system and management method through authorization authentication of smartphone | |
KR20210065923A (en) | Device authentication method by login session passing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170707 |
|
WW01 | Invention patent application withdrawn after publication |