CN113225317A - iPhone mobile phone password automatic filling method and device - Google Patents
iPhone mobile phone password automatic filling method and device Download PDFInfo
- Publication number
- CN113225317A CN113225317A CN202110390663.9A CN202110390663A CN113225317A CN 113225317 A CN113225317 A CN 113225317A CN 202110390663 A CN202110390663 A CN 202110390663A CN 113225317 A CN113225317 A CN 113225317A
- Authority
- CN
- China
- Prior art keywords
- password
- input box
- user
- account number
- monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 238000012544 monitoring process Methods 0.000 claims abstract description 34
- 244000035744 Hura crepitans Species 0.000 claims abstract description 14
- 238000004590 computer program Methods 0.000 claims description 20
- 238000007726 management method Methods 0.000 description 31
- 230000006870 function Effects 0.000 description 18
- 238000010586 diagram Methods 0.000 description 14
- 238000004891 communication Methods 0.000 description 8
- 238000012545 processing Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000000750 progressive effect Effects 0.000 description 2
- 108010001267 Protein Subunits Proteins 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 239000007795 chemical reaction product Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
The application provides an iPhone mobile phone password automatic filling method and device, and the method comprises the following steps: monitoring click events occurring in an account number input box and a password input box in a current login page; when a click event occurs in the account number input box and the password input box, popping up a password management plug-in display page, and monitoring the click event of the password management plug-in display page in real time; when a click event occurs on a password management plug-in display page, displaying a pre-stored password data list to enable a user to select; and acquiring the encrypted password from the IOS sandbox through the API according to the selection of the user, decrypting the encrypted password and filling the decrypted password into the password input box. The problem that user account number password data and terminal matching bind and fill has been solved in this application, actually solves the manual password of user and forgets the vexation of password, for other APPs provide the entry in the convenient iPhone system of logging in of user, provides a novel safe convenient login mode.
Description
Technical Field
Background
At present, the modern password filling function judges a domain name or a web title to identify a website by reading web page data, and performs data filling on an account password column in a web page in a mode of tampering a front end code of the web page or a third party popup window by using software so as to achieve the password filling function. Such as key-string functionality of iPhone, auto-fill of google, or Dashlane software, among others. The whole process of the iPhone end password filling function is composed of 4 links. A first link: and judging whether the current input box is an account/password input box or not. A second ring section: and displaying a key icon on the top of the keyboard under the input frame meeting the condition. And a third link: and clicking the key icon to prompt the box to jump to the key string password list page. The fourth ring section: one of the lists is selected and automatically filled into the eligible input box.
The password filling function of each mobile phone manufacturer can only support the mobile phone of the own brand, and cannot support the same user at other terminals, so that the fault on the password filling use scene is caused; meanwhile, the requirement on the use viscosity of the user is high, and if the user changes the mobile phone, data cannot be transmitted, so that the flexible use scene of the password filling function is greatly limited. The iPhone system has a key string function, and the password can be stored in the key string only in a webpage scene.
In the technical scheme which can be realized at present, all links of the scheme are basically consistent. The key string function of the iPhone system needs to keep account numbers and passwords in some places where web pages log in, the web pages belong to different parties and are easy to be seized in transmission, the account numbers and passwords of users are listed in the list of the seized users, the security of ciphertext transmission also depends on the encryption mode of the account numbers and the passwords, and the iPhone system is worthy of caution.
Disclosure of Invention
The difference point of the method is that in terms of password data source, the 'password management tool plug-in' in the method carries out password management and communication with the iPhone system through the software.
According to one aspect of the application, an iPhone mobile phone password automatic filling method is provided, and comprises the following steps:
monitoring click events occurring in an account number input box and a password input box in a current login page;
when a click event occurs in the account number input box and the password input box, popping up a password management plug-in display page, and monitoring the click event of the password management plug-in display page in real time;
when a click event occurs on a password management plug-in display page, displaying a pre-stored password data list to enable a user to select;
and acquiring the encrypted password from the IOS sandbox through the API according to the selection of the user, decrypting the encrypted password and filling the decrypted password into the password input box.
In one embodiment, the monitoring of click events occurring in an account input box and a password input box in a current login page includes:
identifying an account number input box and a password input box in the current login page;
and monitoring the account number input box and the password input box in real time.
In one embodiment, the password data list includes the password of each login page.
In an embodiment, the method for automatically filling the password of the iPhone mobile phone further includes:
and password information input by a user is acquired, and the password is subjected to double encryption and then transmitted to the background server, so that the background server decrypts the password, then performs secondary encryption and stores the password in the background database.
According to another aspect of the present application, there is also provided an iPhone mobile phone password automatic filling device, including:
the login page monitoring unit is used for monitoring click events in an account number input box and a password input box in the current login page;
the password management plug-in popup unit is used for popping up a password management plug-in display page when a click event occurs in the account number input box and the password input box, and monitoring the click event of the password management plug-in display page in real time;
the list display unit is used for displaying a pre-stored password data list to enable a user to select when a click event occurs on a password management plug-in display page;
and the decryption filling unit is used for acquiring the encrypted password from the IOS sandbox through the API according to the selection of the user, decrypting the encrypted password and filling the decrypted password into the password input box.
In one embodiment, the landing page listening unit includes:
the target identification unit is used for identifying an account number input box and a password input box in the current login page;
and the real-time monitoring unit is used for monitoring the account number input box and the password input box in real time.
In one embodiment, the password data list includes the password of each login page.
In one embodiment, the iPhone mobile phone password automatic filling device further comprises:
and password information input by a user is acquired, and the password is subjected to double encryption and then transmitted to the background server, so that the background server decrypts the password, then performs secondary encryption and stores the password in the background database.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of an iPhone mobile phone password automatic filling method provided by the present application.
Fig. 2 is a flowchart illustrating monitoring of click events occurring in an account entry box and a password entry box in a current login page according to an embodiment of the present disclosure.
Fig. 3 to 5 show an embodiment of the method of the present application in a specific application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to solve the problems existing in the background art, the present application provides an iPhone mobile phone password automatic filling method, as shown in fig. 1, including:
s101: and monitoring click events occurring in an account number input box and a password input box in the current login page.
S102: and when a click event occurs in the account number input box and the password input box, popping up a password management plug-in display page, and monitoring the click event of the password management plug-in display page in real time.
S103: and when a click event occurs on the password management plug-in display page, displaying a pre-stored password data list to enable a user to select.
S104: and acquiring the encrypted password from the IOS sandbox through the API according to the selection of the user, decrypting the encrypted password and filling the decrypted password into the password input box.
In a specific embodiment, in the target APP needing to be filled with the password, the current input box is matched, after the keyboard is popped up, the user selects a key icon at the top of the keyboard, the user selects 'hidden guardian password management' (password management plug-in) in the pop-up box, and a password management list is popped up through the system. And the user can directly fill the account number and the password input box of the target APP by selecting the password to be filled.
In an embodiment, monitoring click events occurring in an account entry box and a password entry box in a current login page, as shown in fig. 2, includes:
s201: and identifying an account number input box and a password input box in the current login page.
And S202, monitoring the account number input box and the password input box in real time.
In one embodiment, the password data list includes the password of each login page.
In an embodiment, the method for automatically filling the password of the iPhone mobile phone further includes:
the password information input by the user is acquired, and the information input by the user is subjected to double encryption and then transmitted to the background server, so that the background server decrypts the password, then performs secondary encryption and stores the password into the background database.
In a specific embodiment, the practical operation flow of the present application is as follows:
s1 is based on password tool IOS system sandbox password data, data is encrypted and synchronized to iPhone end hidden small guard password management and stored in iPhone system sandbox safely in a bidirectional mode.
S2 the user manages the operation data through iPhone software 'secret key password', specifically, the user clicks an account or a password input box in a target APP login page needing to be filled, clicks a top key icon of a pop-up keyboard, pops up a selection list at the bottom, selects 'secret key password management', and selects the required data to be filled into a target APP account password box after popping up the password list. .
S3 matches the current input box in the target APP to be filled with password, selects the key icon on the top of the keyboard, selects "hidden guardian password management" (password management plug-in) in the pop-up box, and pops up the password list through the system (as shown in fig. 3 to 5).
S4 the user selects the password to be filled and fills the password into the target APP directly.
The user stores password data through iPhone end hidden guardian password management and uploads the password data to a back-end server, real-time interaction of the password data is achieved through an api interface, and a system sandbox is updated in real time.
The present invention can populate views in other applications with data previously provided by the user. These applications that populate other applications are referred to as "auto-fill services". The auto-fill framework is responsible for managing communications between applications and the auto-fill service.
Filling out forms is a very time consuming and error prone task. Users are easily annoyed by applications that need to perform such operations. The auto-fill framework may improve the user experience by providing the following advantages: 1. reducing the time taken to fill the field. The auto-fill service may eliminate the need for the user to repeatedly enter information. 2. Minimizing user input errors. Inputting content is prone to errors, especially on mobile devices. The probability of wrongly written characters can be reduced to the minimum by reducing the condition of inputting information as much as possible.
The invention uses the application Group and automatic private password Provider service of the ios mobile terminal to realize the automatic filling function, the user needs to set the automatic filling service function of the invention, the automatic private password Provider relies on the existence of hidden small guard password management, and the software and the system sandbox data are shared through the application Group, thereby achieving the purpose of directly filling the password through the system without opening the hidden small guard password management software again.
The double encryption technology is used in the password data storage and transmission process of the application: the database stores data using encryption and retrieves data for decryption via an API interface. In transmission, an API interface is used for transmitting data, parameters of the API interface are encrypted, and returned data need to be decrypted. Before encryption and decryption, the client needs to obtain the key through an API (application programming interface).
Based on the same inventive concept, the embodiment of the present application further provides an apparatus for an iPhone mobile phone password automatic filling method, which can be used to implement the method described in the above embodiments, as described in the following embodiments. The principle of solving the problems of the iPhone mobile phone password automatic filling method device is similar to that of the iPhone mobile phone password automatic filling method, so the implementation of the iPhone mobile phone password automatic filling method device can refer to the implementation of the iPhone mobile phone password automatic filling method, and repeated parts are not described again. As used hereinafter, the term "unit" or "module" may be a combination of software and/or hardware that implements a predetermined function. While the system described in the embodiments below is preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
According to another aspect of the present application, there is also provided an iPhone mobile phone password automatic filling device, including:
the login page monitoring unit is used for monitoring click events in an account number input box and a password input box in the current login page;
the password management plug-in popup unit is used for popping up a password management plug-in display page when a click event occurs in the account number input box and the password input box, and monitoring the click event of the password management plug-in display page in real time;
the list display unit is used for displaying a pre-stored password data list to enable a user to select when a click event occurs on a password management plug-in display page;
and the decryption filling unit is used for acquiring the encrypted password from the IOS sandbox through the API according to the selection of the user, decrypting the encrypted password and filling the decrypted password into the password input box.
In one embodiment, the user selects the password to be filled, and the password can be directly filled into the account and password input box of the target APP through the secure transmission of the system sandbox.
In one embodiment, the landing page listening unit includes:
the target identification unit is used for identifying an account number input box and a password input box in the current login page;
and the real-time monitoring unit is used for monitoring the account number input box and the password input box in real time.
In one embodiment, the password data list includes the password of each login page.
In one embodiment, the iPhone mobile phone password automatic filling device further comprises:
the password information input by the user is acquired, and the information input by the user is subjected to double encryption and then transmitted to the background server, so that the background server decrypts the password, then performs secondary encryption and stores the password into the background database.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
An embodiment of the present application further provides a specific implementation manner of an electronic device, which is capable of implementing all steps in the method in the foregoing embodiment, where the electronic device specifically includes the following contents:
a processor (processor), a memory (memory), a communication Interface (Communications Interface), and a bus;
the processor, the memory and the communication interface complete mutual communication through the bus;
the processor is configured to call a computer program in the memory, and the processor implements all the steps of the method in the above embodiments when executing the computer program, for example, the processor implements the following steps when executing the computer program:
s101: and monitoring click events occurring in an account number input box and a password input box in the current login page.
S102: and when a click event occurs in the account number input box and the password input box, popping up a password management plug-in display page, and monitoring the click event of the password management plug-in display page in real time.
S103: and when a click event occurs on the password management plug-in display page, displaying a pre-stored password data list to enable a user to select.
S104: and acquiring the encrypted password from the IOS sandbox through the API according to the selection of the user, decrypting the encrypted password and filling the decrypted password into the password input box.
Embodiments of the present application also provide a computer-readable storage medium capable of implementing all the steps of the method in the above embodiments, where the computer-readable storage medium stores thereon a computer program, and the computer program when executed by a processor implements all the steps of the method in the above embodiments, for example, the processor implements the following steps when executing the computer program:
s101: and monitoring click events occurring in an account number input box and a password input box in the current login page.
S102: and when a click event occurs in the account number input box and the password input box, popping up a password management plug-in display page, and monitoring the click event of the password management plug-in display page in real time.
S103: and when a click event occurs on the password management plug-in display page, displaying a pre-stored password data list to enable a user to select.
S104: and acquiring the encrypted password from the IOS sandbox through the API according to the selection of the user, decrypting the encrypted password and filling the decrypted password into the password input box.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the hardware + program class embodiment, since it is substantially similar to the method embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment. Although embodiments of the present description provide method steps as described in embodiments or flowcharts, more or fewer steps may be included based on conventional or non-inventive means. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual apparatus or end product executes, it may execute sequentially or in parallel (e.g., parallel processors or multi-threaded environments, or even distributed data processing environments) according to the method shown in the embodiment or the figures. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the presence of additional identical or equivalent elements in a process, method, article, or apparatus that comprises the recited elements is not excluded. For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, in implementing the embodiments of the present description, the functions of each module may be implemented in one or more software and/or hardware, or a module implementing the same function may be implemented by a combination of multiple sub-modules or sub-units, and the like. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein. The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment. In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of an embodiment of the specification.
In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction. The above description is only an example of the embodiments of the present disclosure, and is not intended to limit the embodiments of the present disclosure. Various modifications and variations to the embodiments described herein will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the embodiments of the present specification should be included in the scope of the claims of the embodiments of the present specification.
Claims (10)
1. An iPhone mobile phone password automatic filling method is characterized by comprising the following steps:
monitoring click events occurring in an account number input box and a password input box in a current login page;
when a click event occurs in the account number input box and the password input box, popping up a password management plug-in display page, and monitoring the click event of the password management plug-in display page in real time;
when the password management plug-in display page has a click event, displaying a pre-stored password data list according to the click selection of the user so as to enable the user to select;
and acquiring an encrypted password from the IOS sandbox through the API according to the selection of the user, decrypting the encrypted password and filling the decrypted password into the password input box.
2. The iPhone mobile phone password automatic filling method of claim 1, wherein the monitoring click events occurring in an account number input box and a password input box in a current login page comprises:
identifying an account number input box and a password input box in the current login page;
and monitoring the account number input box and the password input box in real time.
3. The iPhone handset password auto-fill method of claim 2, wherein the password data list includes passwords for each landing page.
4. The iPhone handset password auto-fill method of claim 3, further comprising:
the password information input by the user is acquired, and the input information of the user is subjected to double encryption and then transmitted to the background server, so that the background server decrypts the password, then performs secondary encryption and stores the password into the background database.
5. An iPhone cell-phone password automatic filling device which characterized in that includes:
the login page monitoring unit is used for monitoring click events in an account number input box and a password input box in the current login page;
the password management plug-in popup unit is used for popping up a password management plug-in display page when a click event occurs in the account number input box and the password input box, and monitoring the click event of the password management plug-in display page in real time;
the list display unit is used for displaying a pre-stored password data list to enable a user to select when the password management plug-in display page has a click event;
and the decryption filling unit is used for acquiring the encrypted password from the IOS sandbox through the API according to the selection of the user, decrypting the encrypted password and filling the decrypted password into the password input box.
6. The iPhone cell phone password autofill apparatus of claim 5, wherein the landing page listening unit comprises:
the target identification unit is used for identifying an account number input box and a password input box in the current login page;
and the real-time monitoring unit is used for monitoring the account number input box and the password input box in real time.
7. The iPhone handset password autofill apparatus of claim 6, wherein the password data list includes a password for each landing page.
8. The iPhone handset password autofill apparatus of claim 7, further comprising:
and password information input by a user is acquired, and the password is subjected to double encryption and then transmitted to the background server, so that the background server decrypts the password, then performs secondary encryption and stores the password in the background database.
9. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the iPhone handset password autofill method of any of claims 1-4 when executing the program.
10. A computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, carries out the steps of the iPhone handset password auto-fill method of any of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110390663.9A CN113225317A (en) | 2021-04-12 | 2021-04-12 | iPhone mobile phone password automatic filling method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110390663.9A CN113225317A (en) | 2021-04-12 | 2021-04-12 | iPhone mobile phone password automatic filling method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113225317A true CN113225317A (en) | 2021-08-06 |
Family
ID=77087177
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110390663.9A Pending CN113225317A (en) | 2021-04-12 | 2021-04-12 | iPhone mobile phone password automatic filling method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113225317A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1485746A (en) * | 2002-09-27 | 2004-03-31 | 鸿富锦精密工业(深圳)有限公司 | Management system and method for user safety authority limit |
CN103067339A (en) * | 2011-10-20 | 2013-04-24 | 深圳市快播科技有限公司 | Multi-account secure login method and system of client-side web games |
CN103761469A (en) * | 2014-02-14 | 2014-04-30 | 百度在线网络技术(北京)有限公司 | Method and device for actuating password management in input method application |
CN106790686A (en) * | 2017-02-16 | 2017-05-31 | 上海斐讯数据通信技术有限公司 | A kind of user name password fill method and system |
US20170237726A1 (en) * | 2016-02-14 | 2017-08-17 | Ynjiun Paul Wang | Mobile Secure Login System and Method |
US20180349593A1 (en) * | 2017-06-04 | 2018-12-06 | Apple Inc. | Autofill for application login credentials |
CN109165490A (en) * | 2018-07-24 | 2019-01-08 | 北京全知科技有限公司 | A kind of data inputting method and device |
CN109635222A (en) * | 2018-12-07 | 2019-04-16 | 深圳前海微众银行股份有限公司 | Webpage privilege control method, apparatus, equipment and computer readable storage medium |
CN111209587A (en) * | 2019-12-24 | 2020-05-29 | 杭州安恒信息技术股份有限公司 | One-key login method based on js browser plug-in |
-
2021
- 2021-04-12 CN CN202110390663.9A patent/CN113225317A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1485746A (en) * | 2002-09-27 | 2004-03-31 | 鸿富锦精密工业(深圳)有限公司 | Management system and method for user safety authority limit |
CN103067339A (en) * | 2011-10-20 | 2013-04-24 | 深圳市快播科技有限公司 | Multi-account secure login method and system of client-side web games |
CN103761469A (en) * | 2014-02-14 | 2014-04-30 | 百度在线网络技术(北京)有限公司 | Method and device for actuating password management in input method application |
US20170237726A1 (en) * | 2016-02-14 | 2017-08-17 | Ynjiun Paul Wang | Mobile Secure Login System and Method |
CN106790686A (en) * | 2017-02-16 | 2017-05-31 | 上海斐讯数据通信技术有限公司 | A kind of user name password fill method and system |
US20180349593A1 (en) * | 2017-06-04 | 2018-12-06 | Apple Inc. | Autofill for application login credentials |
CN109165490A (en) * | 2018-07-24 | 2019-01-08 | 北京全知科技有限公司 | A kind of data inputting method and device |
CN109635222A (en) * | 2018-12-07 | 2019-04-16 | 深圳前海微众银行股份有限公司 | Webpage privilege control method, apparatus, equipment and computer readable storage medium |
CN111209587A (en) * | 2019-12-24 | 2020-05-29 | 杭州安恒信息技术股份有限公司 | One-key login method based on js browser plug-in |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107249004B (en) | Identity authentication method, device and client | |
US9553918B1 (en) | Stateful and stateless cookie operations servers | |
US9219787B1 (en) | Stateless cookie operations server | |
CN106937274B (en) | Profile switching method and device based on EUICC | |
CN107908632B (en) | Website file processing method and device, website file processing platform and storage medium | |
CN109818957B (en) | Intelligent contract calling method, device and system based on visual interface | |
US20100186004A1 (en) | Data analysis system and method | |
CN112039826A (en) | Login method and device applied to applet terminal | |
CN103036852A (en) | Method and device for achieving network login | |
CN106856474A (en) | A kind of processing method and processing device of checking information | |
CN113609147A (en) | Data sharing method and device and electronic equipment | |
US20120054299A1 (en) | System for and method of verifying packages | |
CN113127850A (en) | Browser password filling interaction control method and device | |
CN113225317A (en) | iPhone mobile phone password automatic filling method and device | |
CN113132369A (en) | Android mobile phone password automatic filling method and device | |
CN115567596A (en) | Cloud service resource deployment method, device, equipment and storage medium | |
CN115118520A (en) | Data processing method and device and server | |
CN112799744B (en) | Industrial APP calling method and device, computer readable medium and electronic equipment | |
CN110225010B (en) | Processing method of push message and related equipment | |
CN113992345A (en) | Method and device for encrypting and decrypting webpage sensitive data, electronic equipment and storage medium | |
CN114036364A (en) | Method, apparatus, device, medium and product for identifying a crawler | |
CN111241588A (en) | Method and device for realizing auxiliary function in application | |
CN112416210A (en) | Information encryption and decryption method, system, storage medium and electronic equipment | |
CN112100534A (en) | Information processing method, device, medium and electronic equipment in page sharing | |
CN116112172B (en) | Android client gRPC interface security verification method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210806 |