CN109086624A - login method and device - Google Patents

login method and device Download PDF

Info

Publication number
CN109086624A
CN109086624A CN201810879466.1A CN201810879466A CN109086624A CN 109086624 A CN109086624 A CN 109086624A CN 201810879466 A CN201810879466 A CN 201810879466A CN 109086624 A CN109086624 A CN 109086624A
Authority
CN
China
Prior art keywords
password
encryption device
verified
target application
component
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810879466.1A
Other languages
Chinese (zh)
Inventor
唐建新
李鹏坤
蒋红宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Haitai Fangyuan High Technology Co Ltd
Original Assignee
Beijing Haitai Fangyuan High Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Haitai Fangyuan High Technology Co Ltd filed Critical Beijing Haitai Fangyuan High Technology Co Ltd
Priority to CN201810879466.1A priority Critical patent/CN109086624A/en
Publication of CN109086624A publication Critical patent/CN109086624A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of login method and devices.Wherein, this method comprises: multiple encryption devices of detection access, wherein multiple encryption devices are for logging in target application;Read the password component in multiple encryption devices, wherein a password component is stored in an encryption device;It is determined according to multiple password components and this time logs in whether target application succeeds.The present invention solves file safety cabinet in the prior art and is difficult to meet the technical issues of several administrators manage this demand of file jointly.

Description

Login method and device
Technical field
The present invention relates to data processing fields, in particular to a kind of login method and device.
Background technique
File safety cabinet is a kind of file security storage software, by this software can virtual one cryptographically deposit Store up the disk or a file of file.It needs to carry out password authentication before accessing file safety cabinet, only be tested by password It just can be with the file in reading and writing of files safety cabinet after card.
About password authentication, current method is to carry out password authentication by an individual encryption device, because of mouth Order is stored securely in encryption device and can not be exported, therefore has certain safety.But the situation of single cipher equipment The application scenarios that several administrators manage file safety cabinet jointly can not be met the needs of.
Aiming at the problem that file safety cabinet in the prior art is difficult to meet several administrators and manages this demand of file jointly, Currently no effective solution has been proposed.
Summary of the invention
The embodiment of the invention provides a kind of login method and devices, difficult at least to solve file safety cabinet in the prior art To meet the technical issues of several administrators manage this demand of file jointly.
According to an aspect of an embodiment of the present invention, a kind of login method is provided, comprising: detect multiple passwords of access Equipment, wherein multiple encryption devices are for logging in target application;Read the password component in multiple encryption devices, wherein one A password component is stored in encryption device;It is determined according to multiple password components and this time logs in whether target application succeeds.
Further, before the encryption device of detection access, target application shows prompt information, wherein prompt information For characterizing the current encryption device for needing to access target application.
Further, it is determined that each encryption device in multiple encryption devices is encryption device to be verified;To be verified close Decoding apparatus carries out device authentication;In the case where being verified, the password component stored in encryption device to be verified is read.
Further, the mark of encryption device to be verified is obtained;The corresponding legal logo collection of target application is obtained, In, legal logo collection includes the mark of the corresponding legal encryption device of target application;If the mark of encryption device to be verified Belong to legal logo collection, it is determined that be verified to encryption device to be verified.
Further, before multiple encryption devices of detection access, password and the password for generating target application are corresponding Password component determines the quantity n being split for the password to target application, wherein n is the integer greater than 1;Generate n Random number, and determine that any one random number is password in n random number, the n-1 random number in addition to password is password N-1 password component, wherein password component is for being distributed to encryption device, and password is for being stored in target application;To n Random number carries out default operation and obtains operation result, and determines that operation result is a password component of password.
Further, operation result is being obtained to the n preset operation of random number progress, and is determining that operation result is password A password component after, password component is distributed to encryption device respectively, wherein distribute a mouth to encryption device Enable component.
Further, default operation is carried out to password component, obtains password to be verified, wherein default operation is exclusive or fortune It calculates;The password for comparing password to be verified and being stored in target application;If password to be verified and be stored in target application Password is identical, and determination passes through password authentication to be verified.
The embodiment of the invention provides a kind of entering device, detection module, for detecting multiple encryption devices of access, In, multiple encryption devices are for logging in target application;Read module, for reading the password component in multiple encryption devices, In, a password component is stored in an encryption device;Determining module is this time logged in for being determined according to multiple password components Whether target application succeeds.
The embodiment of the invention provides a kind of storage medium, storage medium includes the program of storage, wherein is run in program When control storage medium where equipment execute above-mentioned login method.
The embodiment of the invention provides a kind of processor, processor is for running program, wherein executes when program is run The login method stated.
In embodiments of the present invention, multiple encryption devices of access are detected, wherein multiple encryption devices are for logging in target Using;Read the password component in multiple encryption devices, wherein a password component is stored in an encryption device;According to Multiple password components, which determine, this time logs in whether target application succeeds.Password component is dispersed in multiple encryption devices by above scheme In, when needing to carry out password authentication, it is necessary to which multiple encryption devices participate in together, could pass through verifying, and then log in target and answer With, and then solve file safety cabinet in the prior art and be difficult to meet the technology that several administrators manage this demand of file jointly Problem.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of login method according to an embodiment of the present invention;And
Fig. 2 is a kind of schematic diagram of entering device according to an embodiment of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people The model that the present invention protects all should belong in member's every other embodiment obtained without making creative work It encloses.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Cover it is non-exclusive include, for example, the process, method, system, product or equipment for containing a series of steps or units are not necessarily limited to Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
Embodiment 1
According to embodiments of the present invention, a kind of embodiment of login method is provided, it should be noted that in the process of attached drawing The step of illustrating can execute in a computer system such as a set of computer executable instructions, although also, in process Logical order is shown in figure, but in some cases, it can be to be different from shown or described by sequence execution herein Step.
Fig. 1 is the flow chart of login method according to an embodiment of the present invention, as shown in Figure 1, this method comprises the following steps:
Step S102 detects multiple encryption devices of access, wherein multiple encryption devices are for logging in target application.
Specifically, above-mentioned encryption device can be USBKey equipment.Password component, each password are stored in encryption device Equipment can be held by a user, and a user only holds an encryption device.Above-mentioned target application can be file guarantor Dangerous cabinet, file safety cabinet store software as a kind of file security, may be mounted on mobile terminal or terminal, the reality Apply a step by be mounted with file security storage software terminal (following terminals be this be mounted with file security store software Terminal) execute.In an alternative embodiment, for being mounted with the PC of file security storage software, user will be stored There is the USB interface of the USBKey insertion PC of password component, so that terminal detects encryption device.
Above-mentioned multiple encryption devices can be sequentially ingressed into terminal, be also possible to whole by multiple and different interface accesses simultaneously End, the application is not specifically limited herein.
Step S104 reads the password component in multiple encryption devices, wherein a mouth is stored in an encryption device Enable component.
In above-mentioned steps S104, after terminal detects the access of encryption device, the password component in encryption device is read. In an alternative embodiment, for a user for holding USBKey by USBKey access terminal, terminal reads the USBKey kind Password component after, the user disconnect USBKey and terminal communication, what next user for holding USBKey was held it USBKey access terminal, terminal reads the password component in this time USBKey of access again, until reading all passwords point Amount.
Step S106 is determined according to multiple password components and is this time logged in whether target application succeeds.
Specifically, above-mentioned login refers to the login to file safety cabinet, and in the case where logining successfully, available text Data in part safety cabinet.
In an alternative embodiment, operation can be carried out to multiple password components, obtains password to be verified, and will be to Password is verified with the password of target application to be logged in compared with pair, thus to judge this time whether login succeeds.Multiple passwords are set Any one password component in standby is incorrect, can all lead to authentication failed, can not log in target application.Insured with log file For cabinet, password component is distributed to n (n > 1) a user by password distribution stage, file safety cabinet, in n user, each user Hold a USBKey, a password component is stored in each USBKey, when logging in this document safety cabinet, only terminal is read The password component in USBKey for having taken this n user to be held, can be proved to be successful, a few USBKey, or any Password component in USBKey is incorrect, can all lead to authentication failed.
From the foregoing, it will be observed that multiple encryption devices of the above embodiments of the present application detection access, wherein multiple encryption devices are used for Log in target application;Read the password component in multiple encryption devices, wherein password point is stored in an encryption device Amount;It is determined according to multiple password components and this time logs in whether target application succeeds.Password component is dispersed in multiple by above scheme In encryption device, when needing to carry out password authentication, it is necessary to which multiple encryption devices participate in together, could pass through verifying, Jin Erdeng Target application is recorded, and then solves file safety cabinet in the prior art and is difficult to meet several administrators and manage this need of file jointly The technical issues of asking.
As a kind of optional embodiment, before the encryption device of detection access, the above method further include: target application Show prompt information, wherein prompt information is used to characterize the encryption device for currently needing to access target application.
Specifically, above-mentioned prompt information can be shown in the display device of terminal, need for prompting by encryption device Access terminal.
In an alternative embodiment, still by taking file safety cabinet as an example, user is selected after opening file safety cabinet, terminal Screen can be with display reminding information " would you please be inserted into USBKey ", to prompt user by encryption device access terminal.
As a kind of optional embodiment, the password component in multiple encryption devices is read, comprising: determine that multiple passwords are set Each encryption device in standby is encryption device to be verified;Device authentication is carried out to encryption device to be verified;What is be verified In the case of, read the password component stored in encryption device to be verified.
Specifically, verifying encryption device, refer to verifying encryption device itself, so that it is determined that access is eventually Whether the encryption device at end is legal.
In above-mentioned steps, when reading the password component in encryption device, need to verify encryption device, and only Have in the case where being verified, just reads the password component in encryption device, so as to avoid the access of illegal password equipment, And then it ensure that the safety of data in file safety cabinet.
In an alternative embodiment, after file safety cabinet generates password component, password component can be written In USBKey, these USBKey are legal USBKey, and when needing to obtain the data in file safety cabinet, it is legal to need Legal USBKey access terminal is made terminal read the password component in these USBKey by the holder of USBKey.If there is User has stolen password component, and the password component stolen is written in other USBKey, although the password in the USBKey point Amount is correct password component, but since the USBKey is not legal USBKey, terminal not can read the USBKey Terminal password component.
As a kind of optional embodiment, device authentication is carried out to encryption device to be verified, comprising: obtain password to be verified The mark of equipment;Obtain the corresponding legal logo collection of target application, wherein legal logo collection includes that target application is corresponding The mark of legal encryption device;If the mark of encryption device to be verified belongs to legal logo collection, it is determined to be verified close Decoding apparatus is verified.
Specifically, the mark of above-mentioned encryption device can be PIN code, above-mentioned legal logo collection is by the legal of target application The mark (can be PIN code) of encryption device is constituted.Still by taking file safety cabinet as an example, file safety cabinet generate password component it Afterwards, password component is distributed to multiple encryption devices, these passwords for receiving the password component that file safety cabinet is directly distributed are set Standby is legal encryption device.
In an alternative embodiment, legal logo collection be file safety cabinet complete password distribution after can Determining information can search the PIN code of encryption device to be verified, such as after access pin equipment in legal logo collection It include the PIN code of encryption device to be verified in the legal logo collection of fruit, it is determined that encryption device to be verified is verified, to Password component in verifying encryption device is obtained directly from terminal.
Before multiple encryption devices of detection access, method further include: password and the password for generating target application are corresponding Password component, wherein the step of generating the password and password corresponding password component of target application comprises determining that target application Password component quantity n, wherein n is integer greater than 1;N random number is generated, and determines any one in n random number Random number is password, and the n-1 random number in addition to password is n-1 password component of password, wherein password component is for dividing It is sent to encryption device, password is for being stored in target application;Default operation is carried out to n random number and obtains operation result, and Determine that operation result is a password component of password.
Specifically, above-mentioned quantity can be taking human as being configured, quantity n, which can be, needs to participate in this document safety cabinet data The quantity of the personnel of secrecy item.The length of n random number of generation can be identical.
In an alternative embodiment, still by taking target application is file safety cabinet as an example, file safety cabinet component is generated Program first confirms that the quantity n of segmentation, then according to n, generates n random number, and take any one random number in n random number As the password P of file safety cabinet, password component of remaining n-1 random number as P is denoted as S1, S2 ... ..., Sn-1, this When, the quantity of password component also poor 1.The method for obtaining n-th of password component can be, and carry out exclusive or to n-1 password component Operation, that is, n-th of password component Sn=P ⊕ S1 ⊕ S2 ⊕ ... ⊕ Sn-1, to obtain S1 to Sn password component.
As a kind of optional embodiment, operation result is obtained carrying out preset operation to n random number, and determine fortune After calculating the password component that result is password, the above method further include: password component is distributed to encryption device respectively, In, distribute a password component to an encryption device.
Specifically, above-mentioned encryption device still can be USBKey, it, can be by n mouth after generating n password component Order is distributed to the USBKey that corresponding n user is held, these USBKey are legal USBKey, corresponding, to one Distribute a password component in USBKey.
It as a kind of optional embodiment, is determined according to multiple password components and this time logs in whether target application succeeds, wrapped It includes: default operation being carried out to password component, obtains password to be verified, wherein default operation is XOR operation;Compare mouth to be verified Enable and be stored in the password in target application;If password to be verified is identical with the password being stored in target application, determining pair Password authentication to be verified passes through.
In an alternative embodiment, still by taking file safety cabinet as an example, after user's startup file safety cabinet, file is protected Dangerous cabinet starts login interface, prompts the USBKey of accessing user one by one, and first user accesses the USBKey of its control, and file is protected The PIN code of dangerous cabinet authentication USBKey reads the password component S1 that is stored in USBKey after being proved to be successful, then, to the Two, the USBKey that nth user is held executes same step to third ..., to obtain n password component.
After file safety cabinet has read the password component of n user, Q=S1 ⊕ S2 ⊕ ... ⊕ Sn-1 ⊕ Sn, Q are calculated Password as to be verified, compares P and Q, if P and Q are equal, allows access into file safety cabinet, otherwise, is prohibited from entering file guarantor Dangerous cabinet.
It follows that in the above scheme, if password to be verified is identical as the password that target application prestores, it is determined that this It is secondary to be proved to be successful, allow log file safety cabinet, if password to be verified is different from the password that target application prestores, it is determined that this Secondary authentication failed, forbids log file safety cabinet, and can with display reminding information, such as: your password mistake.As a result, The user for holding n password component carries out the register of file safety cabinet together, and could succeed log file safety cabinet, replacement The encryption device of any one user, or lack the encryption device of any one user, it is all difficult to successfully log in, to realize Several administrators manage this demand of file jointly, and have achieved the effect that improve Information Security in file safety cabinet.
Embodiment 2
According to embodiments of the present invention, a kind of entering device is provided, Fig. 2 is a kind of login dress according to an embodiment of the present invention The schematic diagram set, as shown in Fig. 2, the device includes:
Detection module 20, for detecting multiple encryption devices of access, wherein multiple encryption devices are answered for logging in target With.
Read module 22, for reading the password component in multiple encryption devices, wherein be stored in an encryption device One password component.
Determining module 24 this time logs in whether target application succeeds for determining according to multiple password components.
As a kind of optional embodiment, above-mentioned apparatus further include: cue module, for the encryption device in detection access Before, target application shows prompt information, wherein prompt information is used to characterize the current password for needing to access target application and sets It is standby.
As a kind of optional embodiment, the password component in multiple encryption devices is read, comprising: first determines submodule Block, for determining that each encryption device in multiple encryption devices is encryption device to be verified;Submodule is verified, for to be tested It demonstrate,proves encryption device and carries out device authentication;Reading submodule, in the case where being verified, reading in encryption device to be verified The password component of storage.
As a kind of optional embodiment, verifying submodule includes: first acquisition unit, is set for obtaining password to be verified Standby mark;Second obtains module, for obtaining the corresponding legal logo collection of target application, wherein legal logo collection packet Include the mark of the corresponding legal encryption device of target application;Determination unit, if the mark for encryption device to be verified belongs to Legal logo collection, it is determined that encryption device to be verified is verified.
As a kind of optional embodiment, above-mentioned apparatus includes: generation module, for setting in multiple passwords of detection access Before standby, the password and the corresponding password component of password of target application are generated, wherein generation module includes: the second determining submodule Block, the quantity n of the password component for determining target application, wherein n is the integer greater than 1;Submodule is generated, for generating n A random number, and determine that any one random number is password in n random number, the n-1 random number in addition to password is password N-1 password component, wherein password component is for being distributed to encryption device, and password is for being stored in target application;Third It determines submodule, obtains operation result for carrying out default operation to n random number, and determine that operation result is one of password Password component.
As a kind of optional embodiment, above-mentioned apparatus further include: distribution module, for being carried out in advance to n random number If operation obtain operation result, and after determining a password component that operation result is password, password component is divided respectively It is sent to encryption device, wherein distribute a password component to an encryption device.
As a kind of optional embodiment, determining module includes: operation submodule, for carrying out default fortune to password component It calculates, obtains password to be verified, wherein default operation is XOR operation;Sub-module stored, for comparing password to be verified and storage Password in target application;4th determines submodule, if for password to be verified and the password being stored in target application Identical, determination passes through password authentication to be verified.
Embodiment 3
According to embodiments of the present invention, a kind of storage medium is provided, storage medium includes the program of storage, wherein in institute Equipment where controlling the storage medium when stating program operation executes login method described in embodiment 1.
Embodiment 4
According to embodiments of the present invention, a kind of processor is provided, which is characterized in that the processor is used to run program, Wherein, login method described in embodiment 1 is executed when described program is run.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
In the above embodiment of the invention, it all emphasizes particularly on different fields to the description of each embodiment, does not have in some embodiment The part of detailed description, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed technology contents can pass through others Mode is realized.Wherein, the apparatus embodiments described above are merely exemplary, such as the division of the unit, Ke Yiwei A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of unit or module It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple On unit.It can some or all of the units may be selected to achieve the purpose of the solution of this embodiment according to the actual needs.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code Medium.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (10)

1. a kind of login method characterized by comprising
Detect multiple encryption devices of access, wherein the multiple encryption device is for logging in target application;
Read the password component in the multiple encryption device, wherein password point is stored in an encryption device Amount;
It is determined according to multiple password components and this time logs in whether the target application succeeds.
2. the method according to claim 1, wherein the method is also before the encryption device of detection access Include:
The target application shows prompt information, wherein the prompt information currently needs to access the target and answer for characterizing Encryption device.
3. being wrapped the method according to claim 1, wherein reading the password component in the multiple encryption device It includes:
Determine that each encryption device in the multiple encryption device is encryption device to be verified;
Device authentication is carried out to the encryption device to be verified;
In the case where being verified, the password component stored in the encryption device to be verified is read.
4. according to the method described in claim 3, it is characterized in that, carrying out device authentication, packet to the encryption device to be verified It includes:
Obtain the mark of the encryption device to be verified;
Obtain the corresponding legal logo collection of the target application, wherein the legal logo collection includes the target application The mark of corresponding legal encryption device;
If the mark of the encryption device to be verified belongs to the legal logo collection, it is determined that set to the password to be verified It is standby to be verified.
5. method as claimed in any of claims 1 to 4, which is characterized in that set in multiple passwords of detection access Before standby, the method also includes: generate the password and the corresponding password component of the password of the target application, wherein raw Include: at the step of password of the target application and the password corresponding password component
Determine the quantity n of the password component of the target application, wherein n is the integer greater than 1;
Generate n random number, and determine that any one random number is the password in the n random number, remove the password it N-1 outer random number is n-1 password component of the password, wherein the password component is used to be distributed to encryption device, The password is for being stored in the target application;
Default operation is carried out to the n random number and obtains operation result, and determines that the operation result is the one of the password A password component.
6. according to the method described in claim 5, it is characterized in that, being obtained carrying out preset operation to the n random number Operation result, and after determining a password component that the operation result is the password, the method also includes:
The password component is distributed to encryption device respectively, wherein distribute a password component to an encryption device.
7. according to the method described in claim 5, it is characterized in that, being determined described in this time login according to multiple password components Whether target application succeeds, comprising:
Default operation is carried out to the password component, obtains password to be verified, wherein the default operation is XOR operation;
The password for comparing the password to be verified and being stored in the target application;
If the password to be verified is identical with the password being stored in the target application, the password to be verified is tested in determination Card passes through.
8. a kind of entering device characterized by comprising
Detection module, for detecting multiple encryption devices of access, wherein the multiple encryption device is answered for logging in target With;
Read module, for reading the password component in the multiple encryption device, wherein stored in an encryption device There is a password component;
Determining module this time logs in whether the target application succeeds for determining according to multiple password components.
9. a kind of storage medium, which is characterized in that the storage medium includes the program of storage, wherein run in described program When control the storage medium where equipment perform claim require any one of 1 to 7 described in login method.
10. a kind of processor, which is characterized in that the processor is for running program, wherein right of execution when described program is run Benefit require any one of 1 to 7 described in login method.
CN201810879466.1A 2018-08-03 2018-08-03 login method and device Pending CN109086624A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810879466.1A CN109086624A (en) 2018-08-03 2018-08-03 login method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810879466.1A CN109086624A (en) 2018-08-03 2018-08-03 login method and device

Publications (1)

Publication Number Publication Date
CN109086624A true CN109086624A (en) 2018-12-25

Family

ID=64833691

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810879466.1A Pending CN109086624A (en) 2018-08-03 2018-08-03 login method and device

Country Status (1)

Country Link
CN (1) CN109086624A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112003690A (en) * 2019-08-16 2020-11-27 华控清交信息科技(北京)有限公司 Password service system, method and device
CN112214741A (en) * 2020-10-09 2021-01-12 福建智康云医疗科技有限公司 Medical image sharing method, system and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103617400A (en) * 2013-11-22 2014-03-05 北京海泰方圆科技有限公司 File safe-case password resetting method
CN105187379A (en) * 2015-07-17 2015-12-23 上海交通大学 Multi-party distrust-based password split managing method
CN107017993A (en) * 2017-04-01 2017-08-04 北京江南天安科技有限公司 A kind of multi-party joint key is produced and digital signature method and system
CN108199835A (en) * 2018-01-19 2018-06-22 北京江南天安科技有限公司 A kind of multi-party joint private key decryption method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103617400A (en) * 2013-11-22 2014-03-05 北京海泰方圆科技有限公司 File safe-case password resetting method
CN105187379A (en) * 2015-07-17 2015-12-23 上海交通大学 Multi-party distrust-based password split managing method
CN107017993A (en) * 2017-04-01 2017-08-04 北京江南天安科技有限公司 A kind of multi-party joint key is produced and digital signature method and system
CN108199835A (en) * 2018-01-19 2018-06-22 北京江南天安科技有限公司 A kind of multi-party joint private key decryption method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112003690A (en) * 2019-08-16 2020-11-27 华控清交信息科技(北京)有限公司 Password service system, method and device
CN112003690B (en) * 2019-08-16 2024-01-12 华控清交信息科技(北京)有限公司 Password service system, method and device
CN112214741A (en) * 2020-10-09 2021-01-12 福建智康云医疗科技有限公司 Medical image sharing method, system and storage medium
CN112214741B (en) * 2020-10-09 2023-07-14 福建智康云医疗科技有限公司 Medical image sharing method, system and storage medium

Similar Documents

Publication Publication Date Title
CN103856472B (en) A kind of method and device of Account Logon
CN104579649B (en) Personal identification method and system
CN105160227B (en) Remote fingerprint verification method and user terminal and fingerprint verification system
CN105306490B (en) Payment verifying system, method and device
CN110225063A (en) Upgrade method, upgrade-system, server and the car-mounted terminal of automobile mounted system
CN106503589A (en) The method of calibration of block chain Transaction Information correctness, apparatus and system
CN108683667B (en) Account protection method, device, system and storage medium
CN109359601A (en) Authentication recognition methods, electronic device and computer readable storage medium
CN106487511A (en) Identity identifying method and device
CN106603234A (en) Method, device and system for device identity authentication
CN106612180A (en) Method and device for realizing session identifier synchronization
CN101542452A (en) Method, apparatus and system for authentication of external storage devices
CN108600183A (en) Target device control method
CN105184567B (en) Processing method, processing unit and the mobile terminal of information
CN105791277B (en) A kind of identity authentication method
CN104184709A (en) Verification method, device, server, service data center and system
CN105337739B (en) Safe login method, device, server and terminal
CN107317807A (en) A kind of apparatus bound method, apparatus and system
CN108462700A (en) Background server, terminal device, safe early warning method and storage medium suitable for recognition of face
CN109831311A (en) A kind of server validation method, system, user terminal and readable storage medium storing program for executing
CN106648583B (en) Information processing method and terminal
CN110505185A (en) Auth method, equipment and system
CN106790243A (en) A kind of password remapping method of safe U disc
CN109214221A (en) A kind of identity card reader verification method, host computer and identity card reader
CN104486306B (en) Identity authentication method is carried out based on finger hand vein recognition and cloud service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181225

RJ01 Rejection of invention patent application after publication