CN1282093C - Method of information automatic collecting and playback - Google Patents

Method of information automatic collecting and playback Download PDF

Info

Publication number
CN1282093C
CN1282093C CN 03157122 CN03157122A CN1282093C CN 1282093 C CN1282093 C CN 1282093C CN 03157122 CN03157122 CN 03157122 CN 03157122 A CN03157122 A CN 03157122A CN 1282093 C CN1282093 C CN 1282093C
Authority
CN
China
Prior art keywords
user
information
user profile
window
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
CN 03157122
Other languages
Chinese (zh)
Other versions
CN1598791A (en
Inventor
王一平
李明柱
张力
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN 03157122 priority Critical patent/CN1282093C/en
Publication of CN1598791A publication Critical patent/CN1598791A/en
Application granted granted Critical
Publication of CN1282093C publication Critical patent/CN1282093C/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention provides a method for automatically collecting and playing back information, which comprises the following steps: A) when a cursor is rested on an editing frame where user information is about to be inputed, the characteristic information of the current window is collected; B) the characteristic information of the current window collected in the step A is stored in window characteristic information which is collected previously to be retrieved, whether the same window characteristic information is retrieved or not is judged, if true, then the user information corresponding to the window characteristic information which is stored and collected previously is played back to the editing frame in the step A, else a step C is executed; C) the user information which is inputted into the editing frame by a user is collected; D) the user information collected in the step C and the window characteristic information collected in the step A are correspondingly stored. After the present invention is used for collecting the login information of the user, the user does not need to input any information of a user name, a password, etc. when the user logs in once more, and the automatic playback of the user information can be realized.

Description

The method of a kind of automatic information collecting and playback
Skill is the field not
The present invention relates to the computer information safety technique field, be meant the method for a kind of automatic information collecting and playback especially.
Background technology
Along with the development of computer and network technologies, the application program that the user can visit and the network information are more and more.Based on the consideration of security, the random visit that major part has the application program of authority restriction and login authentication mode that the network information has all adopted user name to add password to come limited subscriber.The user is if wish visit this class application program or network information, just must in each login authentication process, import the user name and password, therefore the user name and password that causes the user to remember is increasing, the memory of these the user name and passwords is become at present user's a difficult problem.The user may use various approach to simplify the user name and password, with convenient memory.For example,, use unified user name and unified password, perhaps use simple user name and password all login authentication processes.Simplify memory though do like this, brought great potential safety hazard, and can not avoid the manual input of repetition of log-on message in each login process.
User login information can be gathered and preserve to computer system automatically at present, and realize the automatic playback of user login information.For example, for the login of application program or the login of webpage, can be set to preserve user login information and realize automatic login.Below describe with the example that logs on as of webpage.The function of the automatic memory password that network resource manager (IE, Internet Explorer) provides makes the user need not remove repetitive memory again and repeat to enter password by hand.When the user imported the user name and password first, IE gathered these user profile; When logining once more later on, after the user inputed user name, IE inquired about the password of this user name correspondence automatically, and password is played back to the relevant position automatically.
But, for IE, require the user will remember to login the employed different user name of different web pages at least, IE only after the user inputs user name, could inquire about the also password of playback correspondence according to user name.For an a large number of users name that the user registered, occur the user unavoidably and forget which webpage uses the situation of which user name.
In addition, IE leaves these the user name and passwords concentratedly, also makes security exist hidden danger.For example, when IE carried out the user name playback, current operator not only can see the user name of oneself, also can view previous other operators' that gather of IE user name simultaneously.The leakage of user name causes user information confidentiality and privacy to exist hidden danger.In addition if this user has used IE to remember the function of password automatically, also may be found its user name and login, so security is lower by other users.
Summary of the invention
In view of this, fundamental purpose of the present invention provides the method for a kind of automatic information collecting and playback, after having gathered user login information, does not need to import any information such as the user name and password when the user logins once more, just can realize the automatic playback of user profile.
Realize the present invention, need following steps:
A, when cursor rests on the edit box that will import user profile, gather current window feature information;
B, the window feature information of steps A collection is retrieved in the window feature information of the previous collection of preserving, judge whether to retrieve identical window feature information, if then will decipher and be played back in the edit box of steps A with the uniform window characteristic information user information corresponding that has that retrieves; Otherwise, execution in step C;
The user profile that C, collection user import in edit box;
Carry out corresponding preservation with the window feature information of steps A collection after D, the user profile encryption with step C collection.
Wherein, the described edit box of steps A further comprises: user name input frame and password input frame.Described user profile further comprises: the user name and password.Described window feature information further comprises: window handle, URL(uniform resource locator), application name, window name and control ID.
Further comprise when wherein, step D preserves the user profile of step C collection: preserve again after the user profile of step C collection is encrypted; Step B is during with the user profile playback, playback again after at first user profile being decrypted.
Wherein, this method further comprises, sets in advance a safety chip on computers, generates symmetric key by safety chip user profile is carried out encryption and decryption.Simultaneously, safety chip is that different users generates different symmetric keys, with symmetric key active user's user profile is carried out encryption and decryption.
Wherein, this method further comprises: safety chip is that different users generates different public private key pairs, and with PKI symmetric key is encrypted; With private key encrypted symmetric key is decrypted.
Wherein, before steps A, can input the password of enabling needed user name of this method and correspondence in advance and carry out authentication.Wherein, enabling the needed password of this method is generated by safety chip.
By said method as can be seen, the present invention in the process of playback automatically, does not need the user to import Any user name and password after having gathered user login information automatically.Because the user only needs to remember enabling the required a pair of the user name and password of this method; and need not repetitive memory and repeat to import a large number of users name and password, extremely easy to use, and; enabling the required a pair of the user name and password of this method can be provided by safety chip, carries out hardware protection.Simultaneously, the user name and password information of storage is carried out the double-encryption protection by PKI and the symmetric key that safety chip produces, and makes user name and password information obtain tight safeguard protection.In addition, for different users, safety chip provides different public private key pairs and different symmetric keys, therefore the encryption of this user profile had user's uniqueness, during replaying user information, can not decrypt any information of other users that gathered preservation, improve the confidentiality and the privacy of user profile.In addition, except that the safety chip of this machine, can't on other computing machines, discern deciphering based on the user profile of safety chip hardware encipher and read, further improve the security of user profile storage.
Description of drawings
Fig. 1 is the functional block diagram of automatic information collecting of the present invention and playback.
Fig. 2 realizes the synoptic diagram of encryption and decryption for security module.
Fig. 3 is the process flow diagram of automatic information collecting of the present invention and playback.
Embodiment
Fig. 1 is the functional block diagram of automatic information collecting of the present invention and playback.Realize the present invention, need be with lower module: information acquisition module, information playback module, information be preserved module, information management module and security module.
Wherein, information acquisition module utilizes the existing information acquisition technique, when the user logins, the user profile of user's input and the window feature information of current application program or webpage is gathered.
The information playback module is corresponding with information acquisition module, when the user logins, according to the window feature information of current application program or webpage, the user profile of the previous collection of correspondence is filled in the login window automatically.
Information is preserved module and is used to preserve the application program of information acquisition module collection and the window feature information of webpage, and preserves the user login information that information acquisition module is gathered, as user name or password etc.
Information management module is a supplementary module, be used for the active user's that gathered user profile is managed, for example preserve module institute stored user information by information management module deletion information, perhaps the configuration information acquisition module is forbidden user profile gathered etc.
Security module is used for the user profile of gathering is encrypted and the deciphering during playback automatically, and wherein security module can be realized by the safety chip that is installed on the computer motherboard.
Fig. 2 realizes the synoptic diagram of encryption and decryption for security module.The user is first when using method of the present invention, safety chip requires the user that user name is provided, and generate a pair of public private key pair for this user, generate and offer the password of this this private key of user capture then, after having only the user that its user name and corresponding password are carried out input authentication, just can enable method of the present invention.Safety chip is that different users generates different public private key pairs, and each is with the different passwords that safety chip was provided the one's own public private key pair in the safety chip being conducted interviews per family.Safety chip produces a random number simultaneously as symmetric key, with this symmetric key the user profile that collects is carried out encryption and decryption, and the PKI in this user's that the then further use of symmetric key itself the is above-mentioned public private key pair carries out encrypting storing.For each user, safety chip provides different public private key pairs, therefore, the cryptographic algorithm of the user profile of different user has uniqueness, after only this user authenticates through safety chip, just can realize encrypt or playback, and can't decipher user profile after playback goes out other users' encryption his user profile.
Fig. 3 is the process flow diagram of automatic information collecting of the present invention and playback.Following with reference to Fig. 3, the present invention is described in more detail.
Step 301: the user inputs the password of desired user name of security module of the present invention and visit private key, carries out authentication through security module, obtains symmetric key.At first, the required the user name and password of the inventive method is enabled in user's input, be security module user name that requires and the password of visiting private key, after security module obtains the password of this user name and visit private key, passing to safety chip authenticates, behind the authentication success, security module uses the private key deciphering in this user's public private key pair to restore symmetric key, with the deciphering that is used for step 304 and the ciphering process in the step 306.
Step 302: the user is in the process of login application program or webpage, when cursor rests on the edit box that will import user profile, user name input frame or password input frame as application program or webpage, information acquisition module is gathered window feature information by the existing information acquisition technique.
At first, information acquisition module obtains the handle (Handle) or the URL(uniform resource locator) (URL, Uniform Resource Locator) of cursor place window.For application program, handle is used for forms of unique identification under an application program, can pass through api function, obtains window handle as GetWindow and GetWindowText function.For webpage, with webpage of URL unique identification.
Then, information acquisition module obtains the concrete characteristic information of current window, comprises application name, current window name and control ID etc.For the login of application program, the window feature information that gather comprises title, the condition code of the input frame that will gather, i.e. input frame sequence number in top parent window etc. of top parent window of process name, the login frame of current application; For the login of webpage, the window feature information that gather comprises the name of login frame, the name of login frame place window etc.
Step 303-304: do the window feature information of gathering as a whole, in information preservation module, retrieve, compare with the window feature information of the previous collection of preserving, if in information preservation module, retrieve identical window feature information, then the current window characteristic information had been gathered in expression, active user's login is not login for the first time, then can carry out information playback, the information playback module is preserved the user name and password that accesses this window feature information correspondence the module from information, and by the symmetric key after step 301 deciphering user profile of wanting playback is decrypted, be filled into then in the user name and password input frame of current window correspondence.If preserve the window feature information that does not retrieve step 302 collection in the module in information, then execution in step 305.
Step 305: information acquisition module detects and gathers the user profile that the user keys at edit box, comprises the user name and password etc.
Step 306: the symmetric key after the user profile that information acquisition module is gathered step 305 is deciphered by step 301 is encrypted, and the information after the encryption is preserved in the module with the corresponding information that is kept at of window feature information that step 302 is gathered.Wherein, can corresponding a plurality of different user names and password to same window feature information, when playback, together be shown to the user, select required the user name and password by the user.
More than with the user name and password be example the present invention will be described, but the present invention is not limited to collection and playback to the user name and password, also comprises other information are gathered and playback.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1, the method for a kind of automatic information collecting and playback is used for the information acquisition and the playback of computing machine, it is characterized in that this method may further comprise the steps:
A, when cursor rests on the edit box that will import user profile, gather current window feature information;
B, the window feature information of steps A collection is retrieved in the window feature information of the previous collection of preserving, judge whether to retrieve identical window feature information, if then will decipher and be played back in the edit box of steps A with the uniform window characteristic information user information corresponding that has that retrieves; Otherwise, execution in step C;
The user profile that C, collection user import in edit box;
Carry out corresponding preservation with the window feature information of steps A collection after D, the user profile encryption with step C collection.
2, method according to claim 1 is characterized in that, the described edit box of steps A further comprises: user name input frame and password input frame.
3, method according to claim 1 is characterized in that, the described user profile of steps A further comprises: the user name and password.
4, method according to claim 1 is characterized in that, the described window feature information of steps A further comprises: window handle, uniform resource position mark URL, application name, window name and control ID.
5, method according to claim 1 is characterized in that, the user profile that step D gathers step C further comprises when preserving: preserve after the user profile of step C collection is encrypted again;
Step B is during with the user profile playback, playback again after at first user profile being decrypted.
6, method according to claim 5 is characterized in that, sets in advance a safety chip on computers, generates symmetric key by safety chip user profile is carried out encryption and decryption.
7, method according to claim 6 is characterized in that, this method further comprises: safety chip is that different users generates different symmetric keys, with symmetric key active user's user profile is carried out encryption and decryption.
8, method according to claim 6 is characterized in that, this method further comprises: safety chip is that different users generates different public private key pairs, and with PKI symmetric key is encrypted; With private key encrypted symmetric key is decrypted.
9, method according to claim 1 is characterized in that, before steps A, the needed user name of this method is enabled in input in advance and corresponding password carries out authentication.
10, method according to claim 9 is characterized in that, enables the needed password of this method and is generated by safety chip.
CN 03157122 2003-09-15 2003-09-15 Method of information automatic collecting and playback Expired - Lifetime CN1282093C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 03157122 CN1282093C (en) 2003-09-15 2003-09-15 Method of information automatic collecting and playback

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 03157122 CN1282093C (en) 2003-09-15 2003-09-15 Method of information automatic collecting and playback

Publications (2)

Publication Number Publication Date
CN1598791A CN1598791A (en) 2005-03-23
CN1282093C true CN1282093C (en) 2006-10-25

Family

ID=34660203

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 03157122 Expired - Lifetime CN1282093C (en) 2003-09-15 2003-09-15 Method of information automatic collecting and playback

Country Status (1)

Country Link
CN (1) CN1282093C (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104615924A (en) * 2015-03-04 2015-05-13 陈佩珊 System and method for storing account numbers and passwords for account numbers
CN106161710B (en) * 2015-04-24 2019-02-15 合肥高维数据技术有限公司 A kind of user account safety management system based on smart phone
CN105574401A (en) * 2015-12-18 2016-05-11 北京奇虎科技有限公司 Method and device for entering password in webpage

Also Published As

Publication number Publication date
CN1598791A (en) 2005-03-23

Similar Documents

Publication Publication Date Title
US8185942B2 (en) Client-server opaque token passing apparatus and method
US9070112B2 (en) Method and system for securing documents on a remote shared storage resource
JP3466025B2 (en) Method and apparatus for protecting masquerade attack in computer network
JP2018170802A (en) Multiple authority data security and access
JP6884642B2 (en) Computer implementation systems and methods for protecting sensitive data through data re-encryption
US20040010699A1 (en) Secure data management techniques
US6981156B1 (en) Method, server system and device for making safe a communication network
US20090022319A1 (en) Method and apparatus for securing data and communication
US20030210791A1 (en) Key management
US8619978B2 (en) Multiple account authentication
CN103246850A (en) Method and device for processing file
CA2799936A1 (en) System and method for protecting access to authentication systems
WO2000079368A1 (en) Software smart card
JP2006155554A (en) Database encryption and access control method, and security management device
CN1588365A (en) Ciphertext global search technology
US10623400B2 (en) Method and device for credential and data protection
CN1409234A (en) Outward leakage preventing system for secrete information
US8307209B2 (en) Universal authentication method
CN1282093C (en) Method of information automatic collecting and playback
JPH11168460A (en) Cryptographic network system and method
Olanrewaju et al. Enhancing cloud data security using hybrid of advanced encryption standard and blowfish encryption algorithms
CN109960945A (en) The guard method of browser active safety and system
Belose et al. Data security using Armstrong numbers
CN109635574A (en) File encryption-decryption method, system and storage medium in a kind of cloud storage system
CN1224925C (en) Method of digit identity authentication based on features of non-biophysics

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CX01 Expiry of patent term
CX01 Expiry of patent term

Granted publication date: 20061025