CN111865573A - Dynamic password generation system, generation method, equipment and storage medium - Google Patents
Dynamic password generation system, generation method, equipment and storage medium Download PDFInfo
- Publication number
- CN111865573A CN111865573A CN202010572711.1A CN202010572711A CN111865573A CN 111865573 A CN111865573 A CN 111865573A CN 202010572711 A CN202010572711 A CN 202010572711A CN 111865573 A CN111865573 A CN 111865573A
- Authority
- CN
- China
- Prior art keywords
- module
- plaintext
- dynamic
- characters
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
Abstract
The invention relates to a dynamic password generation system, a generation method, equipment and a storage medium, wherein the system comprises an input module, a receiving module, a plaintext splicing module, a judgment module, a Hash module, a key generation module, a dynamic character library, a password splicing module and a reading module, the input module is connected with the receiving module, the receiving module is connected with the plaintext splicing module, the plaintext splicing module is connected with the judgment module, the judgment module is connected with the Hash module and the input module, the Hash is connected with the key generation module, the key generation module is connected with the dynamic character library, the dynamic character block is connected with the password splicing module, and the password splicing module is connected with the reading module. The invention enables the same input and the same operator to operate at different time through a unique calculation method of the Hash module, and the obtained dynamic passwords are different; and the dynamic password is only generated when being used, is effective once, has extremely low repetition rate and higher safety, and avoids the phenomenon that the traditional dynamic password is easy to crack.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a dynamic password generation system, a dynamic password generation method, a dynamic password generation device, and a storage medium.
Background
With the popularization of internet application services, users have more and more transactions on the network. Information security is a key issue due to the openness, unreliability, and peering of the internet. Especially for internet-based online banking services, information security is the most fundamental, the most critical, and the most interesting part. When a user uses high-risk businesses of online banking, such as transfer businesses, payment businesses and the like, the bank can provide services for the user only by inputting a correct password. Generally, the password input by the user is the inherent password of the account, and the inherent password input by the user must be transmitted to the server of the service center through the internet, so that the security of the transaction is reduced by inputting the inherent password, and an illegal attacker can easily steal the inherent password of the user through a network attack and the like. In order to prevent the danger caused by the fact that the inherent password of the user is stolen, a dynamic password authentication mode is added at present to carry out the transaction, namely, the user not only needs to input the inherent password, but also needs to input the dynamic password which changes every transaction.
For example, in the prior art, the dynamic password in the prior art mainly uses N-bit seeds and time to generate a password, and a hacker can know the generation algorithm of the N-bit seeds and the dynamic password to break the password; in addition, characters in a password library adopted by the password generated by the dynamic password board are mainly numbers, so that the value range of the generated dynamic password is small, and the difficulty of cracking is reduced.
Disclosure of Invention
The present invention is directed to a dynamic password generation system, a dynamic password generation method, a dynamic password generation device, and a storage medium, which overcome the above-mentioned drawbacks of the prior art.
The purpose of the invention can be realized by the following technical scheme:
the utility model provides a dynamic password generating system, this system includes input module, receiving module, plaintext concatenation module, judgement module, Hash module, key generation module, dynamic character storehouse, password concatenation module and reads the module, wherein:
the input module is used for acquiring hardware information guided by a user;
the receiving module is used for receiving and transmitting the hardware information in the input module to the plaintext splicing module;
the plaintext splicing module is used for integrating hardware information data with different lengths into a unified plaintext character and transmitting the unified plaintext character to the judging module;
The judgment module is used for judging plaintext characters and transmitting the plaintext characters to the Hash module or returning the plaintext characters to the input module under different judgment results;
the Hash module is used for extracting keywords in plaintext characters, further processing the keywords and transmitting an output value to the key generation module;
the key generation module is used for finding a corresponding result of an output value according to a pre-established hash table and transmitting the result to the dynamic character library;
the dynamic character library is used for extracting corresponding characters in the character library according to corresponding results in the key generation module;
the password splicing module is used for combining the corresponding characters in the extracted character library to obtain a password and sending the password to the reading module;
and the reading module is used for displaying the passwords finally obtained by the password splicing module in different modes.
Further, the hardware information includes IP hardware information and Mac hardware information.
Furthermore, the reading module comprises a display module and a voice broadcasting module, wherein the display module is used for displaying the generated dynamic characters on a display screen for direct reading; and the voice broadcasting module is used for carrying out voice broadcasting on the dynamic password.
Further, the process of judging the plaintext characters and transmitting the plaintext characters to the Hash module or returning the plaintext characters to the input module under different judgment results specifically includes: and judging the plaintext character, judging whether the length of the plaintext character meets the standard, if so, transmitting the plaintext character to the Hash module, and if not, returning to the input module again until standard information is input.
Further, the process of extracting the keywords in the plaintext characters and further processing the keywords and then transmitting the output value to the key generation module specifically includes: and extracting keywords in the plaintext characters from the plaintext splicing module, which are transmitted by the judging module, converting the original keywords with any length into the keywords with fixed length through a hash algorithm, and transmitting the converted keywords as output values to the key generating module.
The invention also provides a dynamic password generation method based on the dynamic password generation system, which comprises the following steps:
step 1: the user transmits hardware information to the receiving module through the input module, the receiving module transmits the hardware information to the plaintext splicing module, and the plaintext splicing module integrates the hardware information with different lengths into a uniform plaintext character and then transmits the uniform plaintext character to the judging module;
Step 2: the judgment module analyzes the plaintext characters to obtain information parameters whether the plaintext characters meet the standard or not, and then gives an instruction, if the plaintext characters meet the standard parameters, the instruction is directly transmitted to the Hash module, and if the plaintext characters do not meet the standard parameters, the judgment module returns to the input module again to re-input the plaintext characters until the input information is correct;
and step 3: the Hash module extracts transmitted information, obtains an output value after processing, transmits the output value to the key generation module, matches the output value according to a pre-established Hash table, finds a corresponding result and transmits the result to the dynamic character library;
and 4, step 4: and extracting corresponding characters in the dynamic character library according to the key generated by the key generation module, and performing unordered arrangement on the characters through the password splicing module and transmitting the characters to the reading module to display the password finally obtained by the password splicing module.
Further, the hardware information in step 1 includes IP hardware information and Mac hardware information.
Further, the step 3 specifically includes: the Hash module extracts transmitted information, converts original keywords with any length into keywords with fixed length through a Hash algorithm, transmits the keywords as output values to the key generation module, matches the output values according to a pre-established Hash table, finds corresponding results and transmits the results to the dynamic character library.
The invention also provides a terminal device, which comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the processor realizes the steps of the dynamic password generation method based on the dynamic password generation system when executing the computer program.
The present invention also provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the steps of the dynamic password generation method based on the dynamic password generation system.
Compared with the prior art, the invention has the following advantages:
(1) the invention enables the same input and the same operator to operate at different time through a unique calculation method of the Hash module, and the obtained dynamic passwords are different; and the dynamic password is only generated when being used, is effective once, has extremely low repetition rate and higher safety, and avoids the phenomenon that the traditional dynamic password is easy to crack.
(2) The invention increases the security intensity of the generated dynamic password by the high encryption intensity, the high calculation complexity and the high non-reverse property of the dynamic character library.
Drawings
FIG. 1 is a flow chart of a dynamic password generation method of the present invention;
fig. 2 is a block diagram of a reading module in a dynamic password generation system according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, shall fall within the scope of protection of the present invention.
Examples
Referring to fig. 1 and 2, a dynamic password generation system includes an input module, a receiving module, a plaintext splicing module, a judging module, a Hash module, a key generating module, a dynamic character library, a password splicing module and a reading module, the input module is connected with the receiving module, the receiving module is connected with the plaintext splicing module, the plaintext splicing module is connected with the judging module, the judging module is connected with the Hash module and the input module, the Hash is connected with the key generating module, the key generating module is connected with the dynamic character library, the dynamic character block is connected with the password splicing module, and the password splicing module is connected with the reading module.
The input module is mainly used for leading hardware information based on IP, Mac and the like into the input module by a user;
the receiving module receives the hardware information such as IP, Mac and the like input by the input module and transmits the hardware information to the plaintext splicing module;
the dynamic character library comprises a plurality of plaintext characters used for generating a dynamic password, corresponding characters in the corresponding dynamic character library are extracted according to a secret key generated by the secret key generation module, and the dynamic character library has higher encryption strength, calculation complexity and non-reverse deducability;
the reading module comprises a display module and a voice broadcasting module, the display module displays the generated dynamic characters on a display screen for direct reading, and the voice broadcasting module carries out voice broadcasting on the dynamic passwords;
the plaintext splicing module integrates hardware information data such as IP (Internet protocol) and Mac (machine aided command) with different lengths into a unified plaintext character;
the judgment module judges the plaintext characters transmitted by the plaintext splicing, judges whether the length of the plaintext characters meets the standard or not, transmits the plaintext characters to the Hash module if the length of the plaintext characters meets the standard, and returns to the input module again until standard information is input if the length of the plaintext characters does not meet the standard;
the Hash module firstly extracts keywords in plaintext characters transmitted by the plaintext splicing module, converts input with any length into output with fixed length through a Hash algorithm, and transmits an output value to the key generation module;
The key generation module comprises a hash table established in advance, and corresponding results are transmitted to the dynamic character library by finding the corresponding results in the hash table according to output values;
the password splicing module carries out disordered permutation and combination on a plurality of plaintext characters, and an obtained password is sent to the reading module;
the dynamic password generation method corresponding to the generation system comprises the following steps:
s1, connecting the input module, the receiving module, the plaintext splicing module, the judging module, the Hash module, the key generating module, the dynamic character module, the password splicing module and the reading module;
s2, the user transmits hardware information based on IP, Mac and the like to a receiving module through an input module, the receiving module transmits the hardware information based on IP, Mac and the like to a plaintext splicing module, the plaintext splicing module integrates the information with different lengths into plaintext characters which are specified in a unified manner, and the plaintext characters which are specified in the unified manner are transmitted to a judging module;
s3, the judgment module analyzes the plaintext character to obtain whether the plaintext character meets the standard information parameter, and then gives an instruction, if the plaintext character meets the standard parameter, the instruction is directly transmitted to the Hash module, and if the plaintext character does not meet the standard parameter, the input information is incorrect, and the information returns to the input module again to be input again until the input information is correct;
S4, the Hash module extracts the transmitted information, converts the input with any length into the output with fixed length through the Hash algorithm, transmits the output value to the key generation module, the output value generated by the key generation module can be matched according to the pre-established Hash table, finds the corresponding result in the Hash table, and transmits the result to the dynamic character library;
and S5, extracting corresponding characters in a corresponding dynamic character library according to the key generated by the key generation module, wherein the dynamic character library has higher encryption strength, calculation complexity and non-reverse property, arranging a plurality of characters in disorder through the password splicing module and transmitting the characters to the reading module, and a user can display the generated dynamic password on a display screen to directly read the dynamic password or obtain the dynamic password through the voice broadcast module according to the situation.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. The utility model provides a dynamic password generating system, its characterized in that, this system includes input module, receiving module, plaintext concatenation module, judgement module, Hash module, key generation module, dynamic character storehouse, password concatenation module and reads the module, wherein:
the input module is used for acquiring hardware information guided by a user;
the receiving module is used for receiving and transmitting the hardware information in the input module to the plaintext splicing module;
the plaintext splicing module is used for integrating hardware information data with different lengths into a unified plaintext character and transmitting the unified plaintext character to the judging module;
the judgment module is used for judging plaintext characters and transmitting the plaintext characters to the Hash module or returning the plaintext characters to the input module under different judgment results;
the Hash module is used for extracting keywords in plaintext characters, further processing the keywords and transmitting an output value to the key generation module;
the key generation module is used for finding a corresponding result of an output value according to a pre-established hash table and transmitting the result to the dynamic character library;
the dynamic character library is used for extracting corresponding characters in the character library according to corresponding results in the key generation module;
The password splicing module is used for combining the corresponding characters in the extracted character library to obtain a password and sending the password to the reading module;
and the reading module is used for displaying the passwords finally obtained by the password splicing module in different modes.
2. A dynamic password generation system according to claim 1, wherein said hardware information includes IP hardware information and Mac hardware information.
3. The dynamic password generation system according to claim 1, wherein the reading module comprises a display module and a voice broadcasting module, wherein the display module is configured to display the generated dynamic characters on a display screen for direct reading; and the voice broadcasting module is used for carrying out voice broadcasting on the dynamic password.
4. The system for generating dynamic passwords according to claim 1, wherein the process of judging plaintext characters and transmitting the plaintext characters to the Hash module or returning the plaintext characters to the input module under different judgment results specifically comprises: and judging the plaintext character, judging whether the length of the plaintext character meets the standard, if so, transmitting the plaintext character to the Hash module, and if not, returning to the input module again until standard information is input.
5. The system for generating a dynamic password according to claim 1, wherein the process of extracting a keyword from a plaintext character and further processing the keyword, and then transmitting an output value to the key generation module specifically comprises: and extracting keywords in the plaintext characters from the plaintext splicing module, which are transmitted by the judging module, converting the original keywords with any length into the keywords with fixed length through a hash algorithm, and transmitting the converted keywords as output values to the key generating module.
6. A dynamic password generation method based on the dynamic password generation system according to claim 1, characterized in that the method comprises the steps of:
step 1: the user transmits hardware information to the receiving module through the input module, the receiving module transmits the hardware information to the plaintext splicing module, and the plaintext splicing module integrates the hardware information with different lengths into a uniform plaintext character and then transmits the uniform plaintext character to the judging module;
step 2: the judgment module analyzes the plaintext characters to obtain information parameters whether the plaintext characters meet the standard or not, and then gives an instruction, if the plaintext characters meet the standard parameters, the instruction is directly transmitted to the Hash module, and if the plaintext characters do not meet the standard parameters, the judgment module returns to the input module again to re-input the plaintext characters until the input information is correct;
And step 3: the Hash module extracts transmitted information, obtains an output value after processing, transmits the output value to the key generation module, matches the output value according to a pre-established Hash table, finds a corresponding result and transmits the result to the dynamic character library;
and 4, step 4: and extracting corresponding characters in the dynamic character library according to the key generated by the key generation module, and performing unordered arrangement on the characters through the password splicing module and transmitting the characters to the reading module to display the password finally obtained by the password splicing module.
7. The dynamic password generation method based on the dynamic password generation system according to claim 6, wherein the hardware information in step 1 includes IP hardware information and Mac hardware information.
8. The method according to claim 6, wherein the step 3 specifically includes: the Hash module extracts transmitted information, converts original keywords with any length into keywords with fixed length through a Hash algorithm, transmits the keywords as output values to the key generation module, matches the output values according to a pre-established Hash table, finds corresponding results and transmits the results to the dynamic character library.
9. A terminal device comprising a memory, a processor and a computer program stored in the memory and operable on the processor, wherein the processor implements the steps of the dynamic password generation method based on the dynamic password generation system according to any one of claims 6 to 8 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, implements the steps of the dynamic password generation method based on the dynamic password generation system according to any one of claims 6 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010572711.1A CN111865573A (en) | 2020-06-22 | 2020-06-22 | Dynamic password generation system, generation method, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010572711.1A CN111865573A (en) | 2020-06-22 | 2020-06-22 | Dynamic password generation system, generation method, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111865573A true CN111865573A (en) | 2020-10-30 |
Family
ID=72987093
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010572711.1A Pending CN111865573A (en) | 2020-06-22 | 2020-06-22 | Dynamic password generation system, generation method, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111865573A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113806730A (en) * | 2021-09-18 | 2021-12-17 | 北京安天网络安全技术有限公司 | Safe password input method, system, equipment and medium |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001030020A1 (en) * | 1999-10-20 | 2001-04-26 | Fujitsu Limited | Variable length key encrypting system |
CN1486014A (en) * | 2002-09-24 | 2004-03-31 | 黎明网络有限公司 | Method for safe data transmission based on public cipher key architecture and apparatus thereof |
CN101374149A (en) * | 2008-09-19 | 2009-02-25 | 中国民生银行股份有限公司 | Method and system for preventing cipher from being stolen |
US20100241865A1 (en) * | 2009-03-19 | 2010-09-23 | Chunghwa Telecom Co., Ltd | One-Time Password System Capable of Defending Against Phishing Attacks |
CN102571323A (en) * | 2011-12-31 | 2012-07-11 | 深圳市永达电子股份有限公司 | Non-standard character repertoire processing method and device, and system adopting same |
CN102752110A (en) * | 2011-04-19 | 2012-10-24 | 中国银行股份有限公司 | Dynamic password generating method and system |
CN102812662A (en) * | 2010-03-29 | 2012-12-05 | 英特尔公司 | Methods and apparatuses for administrator-driven profile update |
CN103401689A (en) * | 2013-08-22 | 2013-11-20 | 赵忠华 | Positional information based dynamic token and encryption method thereof |
CN103929311A (en) * | 2014-04-28 | 2014-07-16 | 无锡北斗星通信息科技有限公司 | Challenge dynamic password authentication method based on waveform features of brain waves |
WO2015114160A1 (en) * | 2014-02-03 | 2015-08-06 | Commocial Gmbh | Method for the secure transmission of characters |
CN107728937A (en) * | 2017-09-15 | 2018-02-23 | 上海交通大学 | A kind of key-value pair persistence methods and system using Nonvolatile memory medium |
EP3319289A1 (en) * | 2016-11-04 | 2018-05-09 | Thomson Licensing | Devices and methods for client device authentication |
-
2020
- 2020-06-22 CN CN202010572711.1A patent/CN111865573A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001030020A1 (en) * | 1999-10-20 | 2001-04-26 | Fujitsu Limited | Variable length key encrypting system |
CN1486014A (en) * | 2002-09-24 | 2004-03-31 | 黎明网络有限公司 | Method for safe data transmission based on public cipher key architecture and apparatus thereof |
CN101374149A (en) * | 2008-09-19 | 2009-02-25 | 中国民生银行股份有限公司 | Method and system for preventing cipher from being stolen |
US20100241865A1 (en) * | 2009-03-19 | 2010-09-23 | Chunghwa Telecom Co., Ltd | One-Time Password System Capable of Defending Against Phishing Attacks |
CN102812662A (en) * | 2010-03-29 | 2012-12-05 | 英特尔公司 | Methods and apparatuses for administrator-driven profile update |
CN102752110A (en) * | 2011-04-19 | 2012-10-24 | 中国银行股份有限公司 | Dynamic password generating method and system |
CN102571323A (en) * | 2011-12-31 | 2012-07-11 | 深圳市永达电子股份有限公司 | Non-standard character repertoire processing method and device, and system adopting same |
CN103401689A (en) * | 2013-08-22 | 2013-11-20 | 赵忠华 | Positional information based dynamic token and encryption method thereof |
WO2015114160A1 (en) * | 2014-02-03 | 2015-08-06 | Commocial Gmbh | Method for the secure transmission of characters |
CN103929311A (en) * | 2014-04-28 | 2014-07-16 | 无锡北斗星通信息科技有限公司 | Challenge dynamic password authentication method based on waveform features of brain waves |
EP3319289A1 (en) * | 2016-11-04 | 2018-05-09 | Thomson Licensing | Devices and methods for client device authentication |
CN107728937A (en) * | 2017-09-15 | 2018-02-23 | 上海交通大学 | A kind of key-value pair persistence methods and system using Nonvolatile memory medium |
Non-Patent Citations (3)
Title |
---|
史伟奇: "脚本程序安全漏洞的动态防御方法", 《计算机工程与设计》 * |
王顺满等: "动态加密技术在Ad-hoc网络中的应用", 《兵工学报》 * |
糜小夫: "基于密码学的网络多模态信息动态加密系统设计", 《现代电子技术》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113806730A (en) * | 2021-09-18 | 2021-12-17 | 北京安天网络安全技术有限公司 | Safe password input method, system, equipment and medium |
CN113806730B (en) * | 2021-09-18 | 2024-03-08 | 北京安天网络安全技术有限公司 | Method, system, equipment and medium for inputting security password |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10798081B2 (en) | Method, apparatus, and system for providing a security check | |
CN104065652B (en) | A kind of auth method, device, system and relevant device | |
US9838205B2 (en) | Network authentication method for secure electronic transactions | |
CN104065653B (en) | A kind of interactive auth method, device, system and relevant device | |
CN106330850B (en) | Security verification method based on biological characteristics, client and server | |
US8407463B2 (en) | Method of authentication of users in data processing systems | |
US20090031405A1 (en) | Authentication system and authentication method | |
US8381272B1 (en) | Systems and methods for strengthening web credentials | |
US20080263672A1 (en) | Protecting sensitive data intended for a remote application | |
CN111723889B (en) | Code scanning login method, graphic code display method, device, equipment and storage medium | |
KR101025807B1 (en) | Authentication method and authentication server | |
CN108322416B (en) | Security authentication implementation method, device and system | |
CN113067823B (en) | Mail user identity authentication and key distribution method, system, device and medium | |
CN112989426B (en) | Authorization authentication method and device, and resource access token acquisition method | |
CN111444551A (en) | Account registration and login method and device, electronic equipment and readable storage medium | |
WO2015179640A1 (en) | Method, apparatus, and system for providing a security check | |
CN114070568A (en) | Data processing method and device, electronic equipment and storage medium | |
CN111865573A (en) | Dynamic password generation system, generation method, equipment and storage medium | |
CN117336092A (en) | Client login method and device, electronic equipment and storage medium | |
CN101924634A (en) | Verification portal | |
CN101159547A (en) | Dynamic secret method of text information input, output and transmission | |
KR101975471B1 (en) | Block Chain Using Methods With Web Login | |
CN105071993A (en) | Encryption state detection method and system | |
KR20150104667A (en) | Authentication method | |
CN112565156A (en) | Information registration method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20231013 |
|
AD01 | Patent right deemed abandoned |