CN112541192B - Safe password input method based on fingerprint protection certificate safe deposit - Google Patents
Safe password input method based on fingerprint protection certificate safe deposit Download PDFInfo
- Publication number
- CN112541192B CN112541192B CN202011429637.4A CN202011429637A CN112541192B CN 112541192 B CN112541192 B CN 112541192B CN 202011429637 A CN202011429637 A CN 202011429637A CN 112541192 B CN112541192 B CN 112541192B
- Authority
- CN
- China
- Prior art keywords
- credential
- input
- password
- user
- entry
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/20—Image preprocessing
- G06V10/22—Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Medical Informatics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Telephone Function (AREA)
Abstract
The invention relates to a safe password input method based on a fingerprint protection credential vault, which is characterized in that a credential vault and a credential vault control module are introduced into a mobile terminal, a user can configure a user credential in the credential vault in advance, when a password input context is detected in a conventional input process, the user is prompted to select a password in the credential vault, fingerprint authentication is required for accessing the user credential content, once the authentication is passed, the selected password is sent to a target application program in an implicit mode, and meanwhile, the user can still select to input the password through the conventional input method. The method introduces a mechanism for enabling the mobile equipment user to safely input the password from the fingerprint protection credential safe deposit, the user can automatically and safely transmit the stored credential to the target application program through fingerprint verification in a seamless and implicit mode, the user can input the password in any application program by using a unified method, and meanwhile, the risk of password leakage is greatly reduced compared with the risk of common password input.
Description
Technical Field
The invention relates to the technical field of mobile terminals, in particular to a safe password input method based on a fingerprint identification protection certificate safe, which enables a mobile device user to safely complete password input through the fingerprint protection certificate safe.
Background
Smartphones and other mobile devices have become an important component of everyday work and life today. Various applications are used on mobile devices, many of which require user credentials for authentication. Imagine you doing a presentation with surrounding people, everyone staring at your cell phone screen, you need to log in to a website or an application. How you do-turn around others or hide the screen before your input is completed, which is an embarrassing situation. More seriously, your password may be snooped by malicious people, resulting in unexpected loss. In many other cases, you do not want others to see the password you input, especially in public places. Some applications and platforms provide an embedded mechanism to save and automatically populate credentials for users in an implicit manner, which helps to reduce the risk of passwords being snooped to some extent. However, each of these mechanisms has limitations such as being less general (not usable by all applications), lacking credential-level protection, lacking flexibility for users to control credential usage, not being well integrated with conventional input processes, and the like.
Disclosure of Invention
The invention aims to provide a mechanism for enabling a mobile device user to safely input a password from a fingerprint protection certificate safe: the explicit password input process of the user is separated from the process of actually typing the password in the application program or the webpage, the user can automatically and safely transmit the stored credentials to the target application program through fingerprint check in a seamless and implicit mode, and the user can input the password in any application program by using a unified method without worrying about password leakage.
In order to achieve the above purpose, the technical scheme adopted by the invention is that a safe password input method based on a fingerprint protection credential vault is characterized in that a credential vault and a credential vault control module are introduced into a mobile terminal, the credential vault is used for a user to prestore user credentials of various application programs and websites, the user credentials comprise a plurality of credential entries, the credential vault control module is used for controlling the configuration and access of the credential vault, the user starts the mobile application program, when clicking in a login window, an input method system service is triggered to input a text detection flow so as to analyze and judge whether an input focus is in a login window requiring input of a password, and the judgment result is returned to the credential vault control module, for a password input request, the credential vault control module establishes input connection with a target application program, the user selects predefined credential entries from the credential vault, verifies whether the selected credential entries are legal access according to the fingerprint identity of the user, after passing authentication, the user can further select detailed information of the credential entries in the credential vault, the credential vault control module sends the password to a target text box of the target application program, and the target application program is sent to the target text box to the target application program to respond to the target application program input; when fingerprint identity verification fails or the user selects to cancel password input and passes through the credential vault, the input method system service starts and binds the input method editor to the target application program, so that the input method editor establishes connection with the target application program and transmits user input to the target application program, and finally the target application program transmits a response to the input method system service to end the input transaction.
As an improvement of the present invention, the credential vault is a component for securely caching or storing credential related data, the credential vault control module is a component for controlling configuration and access of the credential vault, the input method system service is an operating system component for controlling use of an input method, and the Input Method Editor (IME) is a program for allowing input of characters and symbols not on a keyboard.
As an improvement of the present invention, the credential entry includes, but is not limited to, a title, an account number, a password, a target application name, a target website, remark information, whether or not credential content (also referred to as credentials) is secure access, and the like.
As an improvement of the invention, a security access rule is defined for the credential entry, the credential entry is associated with an identity verification fingerprint, different credential entries may be associated with different fingerprints, and after enablement, the access credential entry requires fingerprint identity verification.
As an improvement of the invention, a context detection module is introduced in the mobile terminal to identify the password input context, and when the password input interface is detected, a new option is displayed in the mobile terminal to enable the user to select a predefined credential from the credential vault.
As an improvement of the invention, the recognition of the password input context by the context detection module can be realized by adopting an OCR character recognition or a machine learning model of a password input screen.
As an improvement of the present invention, when the user selects the credential entry, only the title list of the credential entry is displayed, and the other credentials other than the title in the credential entry are not displayed on the screen.
As an improvement of the invention, an access verification module is introduced into the mobile terminal, and after a user selects a credential entry of a specific title, the credential vault control module needs to carry out fingerprint identity verification on the selected credential entry to retrieve detailed information, and the access verification module specifically carries out fingerprint identity verification operation.
As an improvement of the invention, an access manager is introduced in the mobile terminal, and after the access verification is passed, the access manager retrieves the detailed information of the selected credential entry from the credential vault.
As an improvement of the invention, the method for inputting the security password specifically comprises the following steps:
step 1: the user starts the mobile application program, clicks in the login window, and triggers the process of inputting the password through the keyboard;
step 2: the IME hook module intercepts the call to the IME and redirects the call request to the credential vault control module;
step 3: the certificate safe control module calls the context detection module to analyze whether the input focus is in a login window requiring password input, and returns the detection result to the certificate safe control module;
step 4: for a password input request, the credential vault control module selects to establish an input connection with a target application;
step 5: the credential vault control module displays a credential selection menu for a user to select predefined credential entries;
step 6: the credential vault control module invokes the access verification module to verify the user fingerprint to ensure that the user has access rights of the corresponding entry;
step 7: for legal access, the credential vault control module invokes an access manager to retrieve detailed information of the credential entry from the credential vault;
step 8: the credential vault control module sends the password to a password input box of the target application;
step 9: the target application program sends a response to the input method system service to end the input transaction;
if any of steps 2-9 fails, the IME hook module receives the corresponding response and notifies the input method system that the service continues according to the normal input method flow.
Compared with the prior art, the method and the device introduce the credential vault and the credential vault control module into the mobile terminal, a user can configure the user credentials in the credential vault in advance, when the password input context is detected in the conventional input process, the user is prompted to select the password in the credential vault, fingerprint identity verification is required for accessing the user credential content, once the verification is passed, the selected password is implicitly sent to the target application program, and meanwhile, the user can still select to input the password through the conventional input method. The invention introduces a mechanism for enabling a mobile device user to safely input a password from a fingerprint protection credential safe deposit, the user can automatically and safely transmit the stored credential to a target application program through fingerprint verification in a seamless and implicit mode, the user can automatically and safely transmit the stored credential to the target application program through fingerprint inspection in a seamless and implicit mode, the user can input the password in any application program by using a unified method, and the risk of password leakage is greatly reduced compared with the risk of common password input.
Drawings
FIG. 1 is a schematic diagram of a conventional entry scheme of a login password of an application program in a conventional mobile device;
FIG. 2 is a typical entry for a user account of an application or website in a mobile device;
FIG. 3 is a block diagram of a secure password entry method according to the present invention;
fig. 4 is a flowchart of a security code input method according to the present invention.
Detailed Description
The present invention is further described and illustrated below in conjunction with the accompanying drawings in order to enhance the understanding and appreciation of the invention.
As shown in fig. 1, a conventional method for inputting a login password of an application program in a mobile device specifically includes the following steps:
step 1: the application requests an input method.
Step 2: the input method system service starts and binds the input method to the application.
Step 3: the input method establishes a connection with an application and sends user input to the application.
The method comprises the steps of introducing a credential safe and a credential safe control module into the mobile terminal, wherein the credential safe is used for a user to store user credentials of various application programs and websites in advance, the user credentials comprise a plurality of credential entries, and the user can add the credential entries in a safe and concealed place. FIG. 2 shows typical entries for user accounts for applications or websites. The credential vault control module is used for controlling the configuration and access of the credential vault.
As shown in fig. 3, an embodiment of the present invention shows a secure password input method based on a credential vault protected by a fingerprint, a user starts a mobile application, when clicking in a login window, triggers a process of detecting an input text by an input method system service, so as to analyze and determine whether an input focus is in the login window where a password needs to be input, and returns a determination result to a credential vault control module, for a password input request, the credential vault control module will establish an input connection with a target application, the user selects a predefined credential entry from the credential vault, verifies whether the selected credential entry is a legal access according to a user fingerprint identity, after passing the authentication, the user can further select detailed information of the credential entry in the credential vault, the credential vault control module sends the password to a target text box of the target application, and the target application sends a response to the input method system service to end the input transaction; when fingerprint identity verification fails or the user selects to cancel password input and passes through the credential vault, the input method system service starts and binds the IME to the target application program, so that the IME establishes connection with the target application program and transmits user input to the target application program, and finally the target application program transmits a response to the input method system service to end the input transaction.
The invention introduces a general mechanism to securely and seamlessly dock user-defined credentials to mobile applications that require credentials to log in. The risk of password leakage of the mobile device user can be greatly reduced.
The credential vault is a component for safely caching or storing credential related data, the credential vault control module is a component for controlling the configuration and access of the credential vault, the input method system service is an operating system component for controlling the use of an input method, and the IME is a program for allowing the input of characters and symbols not on a keyboard.
The credential entries include, but are not limited to, titles, account numbers, passwords, destination application names, destination web addresses, remark information, whether it is a credential for secure access, and the like. The credentials are securely and seamlessly docked to the target application even though the user no longer needs to worry about password leakage in public places.
Defining a security access rule for the credential entry, associating the credential entry with an authentication fingerprint, wherein different credential entries may be associated with different fingerprints, and after enabling, accessing the credential entry requires fingerprint authentication.
A context detection module is introduced into the mobile terminal to identify the password input context, and when the password input interface is detected, a new option is displayed in the mobile terminal to enable the user to select a predefined credential from the credential vault instead of invoking a common IME for input operation.
To make the recognition mechanism more versatile, the recognition of the password input context by the context detection module may be implemented using OCR word recognition or a machine learning model of the password input screen. A typical login window contains feature words such as "user name", "password", "account", "login", etc., so that an appropriate algorithm can be designed based on OCR and custom rules to help detect password entry context. The recognition mechanism can be extended to any software product that is input by an input method running on a fingerprinting device.
When the user selects the credential entry, only the title list of the credential entry is displayed, and the other credentials in the credential entry except the title are not displayed on the screen.
An access verification module is introduced into the mobile terminal, and after a user selects a credential entry of a specific title, the credential vault control module needs to perform fingerprint identity verification on the selected credential entry to retrieve detailed information, and the access verification module performs fingerprint identity verification. And after the authentication is passed, the user may further select the credential content associated with the credential entry, and the selected field (e.g., password) will be filled into the target text box of the target application.
An access manager is introduced in the mobile terminal, and after the access verification is passed, the access manager retrieves the detailed information of the selected credential entry from the credential vault.
As shown in fig. 4, the method for inputting the security password specifically includes the following steps:
step 1: the user starts the mobile application program, clicks in the login window, and triggers the process of inputting the password through the keyboard;
step 2: the IME hook module intercepts the call to the IME and redirects the call request to the credential vault control module;
step 3: the certificate safe control module calls the context detection module to analyze whether the input focus is in a login window requiring password input, and returns the detection result to the certificate safe control module;
step 4: for a password input request, the credential vault control module selects to establish an input connection with a target application;
step 5: the credential vault control module displays a credential selection menu for a user to select predefined credential entries;
step 6: the credential vault control module invokes the access verification module to verify the user fingerprint to ensure that the user has access rights of the corresponding entry;
step 7: for legal access, the credential vault control module invokes an access manager to retrieve detailed information of the credential entry from the credential vault;
step 8: the credential vault control module sends the password to a password input box of the target application;
step 9: the target application program sends a response to the input method system service to end the input transaction;
if any of steps 2-9 fails, the IME hook module receives the corresponding response and notifies the input method system that the service continues according to the normal input method flow. (as shown in steps 10-11 of fig. 4).
Compared with the Windows password manager and password management programs (such as Chrome and IE) of various browsers, the invention has the following advantages:
(1) A unified approach is provided that is suitable for various types of applications.
(2) The explicit password input link is separated from the actual use process of the password, so that the risk of password leakage is reduced.
(3) The password retrieval process is seamlessly integrated into the general process of password entry in a secure manner.
(4) The mobile device provides more flexible credential management and use modes for mobile device users, can realize various convenient logins without storing passwords in various application programs, and simultaneously increases another level of security control.
The technical means disclosed by the scheme of the invention is not limited to the technical means disclosed by the embodiment, and also comprises the technical scheme formed by any combination of the technical features. It should be noted that modifications and adaptations to the invention may occur to one skilled in the art without departing from the principles of the present invention and are intended to be within the scope of the present invention.
Claims (10)
1. A safe password input method based on a fingerprint protection certificate safe deposit is characterized in that: the method comprises the steps that a credential safe and a credential safe control module are introduced into a mobile terminal, the credential safe is used for a user to store user credentials of various application programs and websites in advance, the user credentials comprise a plurality of credential entries, the credential safe control module is used for controlling configuration and access of the credential safe, the user starts the mobile application program, when clicking in a login window, an input method system service is triggered to detect an input text flow so as to analyze and judge whether an input focus is in the login window requiring input of a password, a judgment result is returned to the credential safe control module, for a password input request, the credential safe control module establishes input connection with a target application program, the user selects a predefined credential entry from the credential safe, the selected credential entry is verified to be legally accessed according to a user fingerprint, after authentication is passed, the user can further select detailed information of the credential entry in the credential safe, the credential safe control module sends the password to a target text box of the target application program, and the target application program sends a response to the input method system service so as to finish input transactions; when fingerprint identity verification fails or the user selects to cancel password input and passes through the credential vault, the input method system service starts and binds the input method editor to the target application program, so that the input method editor establishes connection with the target application program and transmits user input to the target application program, and finally the target application program transmits a response to the input method system service to end the input transaction.
2. The method of claim 1, wherein the credential vault is a component that securely caches or stores credential related data, the credential vault control module is a component that controls configuration and access of the credential vault, the input method system service is an operating system component that controls use of input methods, and the input method editor is a program that allows entry of characters and symbols that are not on a keyboard.
3. A security password entry method based on fingerprint protection credential vault of claim 2 wherein said credential entries include, but are not limited to, title, account number, password, destination application name, destination web address, remark information, credential content whether or not it is secure access.
4. A security code entry method based on a fingerprint protection voucher safe as recited in claim 3, wherein security access rules are defined for said voucher entries, wherein voucher entries are associated with authentication fingerprints, different voucher entries can be associated with different fingerprints, and after activation, access to a voucher entry requires fingerprint authentication.
5. The method of claim 4, wherein a context detection module is incorporated into the mobile terminal to identify the context of the password entry, and when the password entry interface is detected, a new option is displayed in the mobile terminal to allow the user to select the predefined credentials from the credential vault.
6. The method for security password input based on fingerprint protection certificate vault of claim 5, wherein said context detection module is implemented by using OCR word recognition or a machine learning model of a password input screen for password input context recognition.
7. The fingerprint-based security code entry method of claim 6 wherein when a user selects a credential entry, only a list of titles of the credential entry is displayed, and no other credentials in the credential entry except for the title are displayed on the screen.
8. The method for inputting security codes based on fingerprint protection certificate of claim 7, wherein an access verification module is introduced into the mobile terminal, and when a user selects a certificate entry of a specific title, the control module of the certificate repository needs to perform fingerprint authentication on the selected certificate entry to retrieve detailed information, and the access verification module performs fingerprint authentication.
9. A secure password entry method based on a fingerprint protected credential vault of claim 8, wherein an access manager is incorporated in the mobile terminal, and wherein upon passing of the access authentication, the access manager retrieves details of the selected credential entry from the credential vault.
10. The method for inputting the security password based on the fingerprint protection certificate safe deposit as claimed in claim 9, characterized in that the method for inputting the security password comprises the following steps:
step 1: the user starts the mobile application program, clicks in the login window, and triggers the process of inputting the password through the keyboard;
step 2: the IME hook module intercepts the call to the IME and redirects the call request to the credential vault control module;
step 3: the certificate safe control module calls the context detection module to analyze whether the input focus is in a login window requiring password input, and returns the detection result to the certificate safe control module;
step 4: for a password input request, the credential vault control module selects to establish an input connection with a target application;
step 5: the credential vault control module displays a credential selection menu for a user to select predefined credential entries;
step 6: the credential vault control module invokes the access verification module to verify the user fingerprint to ensure that the user has access rights of the corresponding entry;
step 7: for legal access, the credential vault control module invokes an access manager to retrieve detailed information of the credential entry from the credential vault;
step 8: the credential vault control module sends the password to a password input box of the target application;
step 9: the target application program sends a response to the input method system service to end the input transaction;
if any of steps 2-9 fails, the IME hook module receives the corresponding response and notifies the input method system that the service continues according to the normal input method flow.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011429637.4A CN112541192B (en) | 2020-12-09 | 2020-12-09 | Safe password input method based on fingerprint protection certificate safe deposit |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011429637.4A CN112541192B (en) | 2020-12-09 | 2020-12-09 | Safe password input method based on fingerprint protection certificate safe deposit |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112541192A CN112541192A (en) | 2021-03-23 |
CN112541192B true CN112541192B (en) | 2023-08-25 |
Family
ID=75019682
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011429637.4A Active CN112541192B (en) | 2020-12-09 | 2020-12-09 | Safe password input method based on fingerprint protection certificate safe deposit |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112541192B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023060470A1 (en) * | 2021-10-13 | 2023-04-20 | Citrix Systems, Inc. | Prevention of inadvertent password disclosure |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105409264A (en) * | 2013-07-30 | 2016-03-16 | 德国电信股份有限公司 | System and method for securing a credential vault on a trusted computing base |
CN110602054A (en) * | 2019-08-20 | 2019-12-20 | 广州海颐信息安全技术有限公司 | Proxy-based privilege certificate authentication protection method and device |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9374369B2 (en) * | 2012-12-28 | 2016-06-21 | Lookout, Inc. | Multi-factor authentication and comprehensive login system for client-server networks |
US11580201B2 (en) * | 2016-11-30 | 2023-02-14 | Blackberry Limited | Method and apparatus for accessing authentication credentials within a credential vault |
US10630676B2 (en) * | 2017-11-24 | 2020-04-21 | Microsoft Technology Licensing, Llc | Protecting against malicious discovery of account existence |
-
2020
- 2020-12-09 CN CN202011429637.4A patent/CN112541192B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105409264A (en) * | 2013-07-30 | 2016-03-16 | 德国电信股份有限公司 | System and method for securing a credential vault on a trusted computing base |
CN110602054A (en) * | 2019-08-20 | 2019-12-20 | 广州海颐信息安全技术有限公司 | Proxy-based privilege certificate authentication protection method and device |
Non-Patent Citations (1)
Title |
---|
一种基于二次登录的数据库访问模型设计;叶君耀;印润远;朱华清;王燕红;;微计算机信息(27);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN112541192A (en) | 2021-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10223517B2 (en) | Gesture-to-password translation | |
US10025952B1 (en) | Obfuscation of sensitive human-perceptual output | |
US9305152B2 (en) | Automatic pin creation using password | |
US7930264B2 (en) | Multi-module authentication platform | |
US8863243B1 (en) | Location-based access control for portable electronic device | |
US10063538B2 (en) | System for secure login, and method and apparatus for same | |
US10110578B1 (en) | Source-inclusive credential verification | |
CN107622203A (en) | Guard method, device, storage medium and the electronic equipment of sensitive information | |
JP6564841B2 (en) | Verification server, verification method and computer program | |
US20240187406A1 (en) | Context-based authentication of a user | |
CN113994330A (en) | System and method for single sign-on of application program | |
WO2017088745A1 (en) | Information processing method and apparatus, and electronic device | |
US10887345B1 (en) | Protecting users from phishing attempts | |
US8656468B2 (en) | Method and system for validating authenticity of identity claims | |
Vecchiato et al. | The perils of Android security configuration | |
CN112541192B (en) | Safe password input method based on fingerprint protection certificate safe deposit | |
KR20060089395A (en) | Method for connecting automatically to web site | |
JP2012118833A (en) | Access control method | |
US20230315890A1 (en) | Call location based access control of query to database | |
Mandalapu et al. | An NFC featured three level authentication system for tenable transaction and abridgment of ATM card blocking intricacies | |
CN114528542A (en) | Login management method and device, electronic equipment and storage medium | |
US11599607B2 (en) | Authentication method and system for a telecommunications system | |
US20150007293A1 (en) | User authentication utilizing patterns | |
Mitchell et al. | Cashtags: Prevent leaking sensitive information through screen display | |
KR100721445B1 (en) | Authentication system and recording medium storing program for performing authentication usnig biometrics |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |