WO2018014785A1 - Système, procédé, et dispositif destinés à traiter des informations de sous-compte - Google Patents

Système, procédé, et dispositif destinés à traiter des informations de sous-compte Download PDF

Info

Publication number
WO2018014785A1
WO2018014785A1 PCT/CN2017/092909 CN2017092909W WO2018014785A1 WO 2018014785 A1 WO2018014785 A1 WO 2018014785A1 CN 2017092909 W CN2017092909 W CN 2017092909W WO 2018014785 A1 WO2018014785 A1 WO 2018014785A1
Authority
WO
WIPO (PCT)
Prior art keywords
sub
account
information
password information
password
Prior art date
Application number
PCT/CN2017/092909
Other languages
English (en)
Chinese (zh)
Inventor
阳诚海
Original Assignee
口碑控股有限公司
阳诚海
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 口碑控股有限公司, 阳诚海 filed Critical 口碑控股有限公司
Publication of WO2018014785A1 publication Critical patent/WO2018014785A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Definitions

  • the present application relates to the field of Internet technologies, and in particular, to a sub-account information processing system, method, and apparatus.
  • the sub-account depends on the main account, and in the specific scenario, the authorization of the main account can exercise some rights on the main account, such as collection, transfer, and the like.
  • the existing sub-account creation and transmission process is mainly: the main account holding entity logs in the application system based on the main account, creates a sub-account, sets some processing rights of the sub-account and the login password of the sub-account, and sends the e-mail, short message, etc.
  • the method transmits the login password and the like of the created sub-account to the sub-account holding entity, and the sub-account holding entity exercises the relevant processing authority through the sub-account.
  • the sub-account holder Since the sub-account holder usually needs to bear the risk caused by the operation triggered by the sub-account, the sub-account holder has strict requirements on the confidentiality of the login password and the like of the sub-account, and the above process cannot guarantee the main The account holder does not tamper with and divulge sub-account information such as the login password of the sub-account.
  • the embodiment of the present invention provides a sub-account information processing system, method, and device, which are used to reduce the risk that a sub-account login information is tampered with and leaked during transmission.
  • the embodiment of the present application provides a sub-account information processing system, where the system includes a main device, at least one sub-device, and a server, where the main device logs in to the application through a primary account;
  • the master device is configured to send a sub-account information acquisition request to the server, and is configured to receive sub-account information returned by the server, where the sub-account information includes password information of the sub-account, and is used to send the password information to the Descriptive device
  • the server is configured to generate the sub-account information including the password information according to the sub-account information acquisition request, and transmit the sub-account information to the main device;
  • the sub-device is configured to receive password information sent by the main device.
  • Another embodiment of the present application provides a method for processing sub-account information, including:
  • the master device logs in to the application through the primary account.
  • Another embodiment of the present application provides a method for processing sub-account information, including:
  • the server receives the sub-account information acquisition request sent by the master device that logs in to the primary account;
  • Another embodiment of the present application provides a method for processing sub-account information, including:
  • the application is logged in based on the password information of the received sub-account.
  • the embodiment of the present application provides a terminal device for processing sub-account information, including:
  • Login module used to log in to the application through the primary account
  • a password requesting module configured to send a sub-account information obtaining request to the server, to request to obtain the password information of the sub-account;
  • a receiving module configured to receive sub-account information returned by the server, where the sub-account information includes Password information of the sub-account;
  • a password sending module configured to send the password information to the child device.
  • Another embodiment of the present application provides a server for processing sub-account information, including:
  • a receiving module configured to receive a sub-account information acquisition request sent by a primary device that logs in to the primary account
  • a generating module configured to generate sub-account information including password information of the sub-account according to the sub-account information obtaining request;
  • a sending module configured to transmit the sub-account information to the main device.
  • Another embodiment of the present application provides a terminal device for processing sub-account information, including:
  • a receiving module configured to receive password information of a sub-account sent by the main device; the password information of the sub-account is generated by the server;
  • the login module is configured to log in to the application based on the password information of the received sub-account.
  • the master device that logs in the primary account does not have the permission to set the password of the sub-account, but is generated by the server. After the server transmits the generated password of the sub-account to the master device, the master device can directly transmit through the background. Give a child device with a sub-account. In this way, since the password of the sub-account is not set by the user of the main account, the risk that the sub-account password is leaked by the main account user can be reduced.
  • the password information of the sub-account can be transmitted through the NFC data transmission channel. Since the NFC transmission needs to bring the two devices close to each other to complete the entire transmission process, the password information of the sub-account can be guaranteed to be the primary account. The holder and the sub-account recipient transmit in person, further ensuring the confidentiality and integrity of the password information.
  • the server may encrypt the password information of the transmitted sub-account, and after receiving the encrypted password information, the main device transmits the encrypted information to the sub-device, so that the password can be further ensured. Confidentiality of information and security during transmission.
  • FIG. 1 is a schematic structural diagram of a sub-account information processing system according to an embodiment of the present application
  • FIG. 2 is a flowchart of a method for processing sub-account information according to Embodiment 1 of the present application;
  • FIG. 3 is a flowchart of a method for processing sub-account information according to Embodiment 2 of the present application;
  • FIG. 4 is a schematic structural diagram of a terminal device for processing sub-account information according to Embodiment 3 of the present application;
  • FIG. 5 is a schematic structural diagram of a server for processing sub-account information according to Embodiment 4 of the present application;
  • FIG. 6 is a schematic structural diagram of a terminal device for processing sub-account information according to Embodiment 5 of the present application.
  • the embodiment of the present application is applied to a scenario in which a primary account holder needs to set up multiple sub-accounts to perform some authorization operations.
  • the main account holder of the chain store can set up multiple sub-accounts, and the chain stores distributed in each place use one of the sub-accounts to perform the collection and transfer operations. Since the sub-account is equivalent to performing the authorization operation of the main account, the operation result of the sub-account is recorded under the main account name.
  • the sub-account information processing system 10 includes a main device 11 , at least one sub-device 12 , and a server 13 .
  • the main device 11 logs in to the application through a primary account.
  • the server 13 is configured to use the sub-account
  • the information acquisition request generates sub-account information including the password information, and transmits the information to the main device 11;
  • the sub-device 12 is configured to receive the password information sent by the main device 11.
  • a flowchart of a method for processing sub-account information includes the following steps:
  • S201 The master device logs in to the application through the primary account, and sends a sub-account information acquisition request to the server.
  • Applications here can refer to APP, websites, web pages, and the like.
  • the user opens the login page of the APP, website, or webpage through the master device, and enters the login password of the primary account and the primary account on the login page to log in to the application.
  • the main device user can input the basic of the sub-account in the login application interface.
  • Information such as sub-accounts, sub-account processing rights (can provide options for users to choose), the number of sub-accounts, etc., and send this information to the server.
  • the sub-account can be created by the server in addition to the main device, that is, the server can generate each sub-account and its corresponding password information for the main device.
  • the server in the embodiment of the present application may refer to a server where the server of the application is located, or may be a server dedicated to providing password information.
  • an application includes a server and a client.
  • the server of the application may be deployed on the server that provides the password information in the embodiment of the present application, or may be deployed on other servers.
  • the client of the application is deployed in the embodiment of the present application. On the master and child devices.
  • S202 The server acquires the sub-account information including the password information according to the sub-account information acquisition request, and transmits the sub-account information to the main device.
  • the server may randomly generate password information for the sub-account and save the information in the server. Then, the server may transmit the status information of the sub-account password creation success and the generated password information corresponding to each sub-account to the main device.
  • the master device receives the sub-account information returned by the server, where the sub-account information includes the password information of the sub-account, and sends the password information to the sub-device.
  • the master device may automatically save the password information of the sub-account in the background, and then send the automatically saved password information to the sub-device in the background; in the process, the sub-account
  • the password information is always invisible to the user.
  • the saved password information may be in an encrypted state, where the encryption may include the first encryption described below, or the first encryption and the second encryption.
  • the server may perform the first encryption on the sub-account information, and transmit the first encrypted sub-account information to the main device; the main device receives the first encrypted Sub-account information; the first encrypted password information corresponding to the sub-account is sent to the sub-device.
  • the sub-account information after the server performs the first encryption may include the sub-account and its corresponding password information, and the master device may directly send the first encrypted sub-account and its corresponding password information to the sub-device.
  • the child device may first decrypt the password information by using the opened application.
  • the client can only decrypt the password information from other clients, but cannot decrypt the password information from the server, so that the master device can receive the encryption status sent by the server.
  • the password information cannot be decrypted, which further enhances the security of the sub-account password information.
  • the master device may further perform second encryption on the password information of the sub-account, and send the second encrypted password information to the sub-device to further The security of the password transmission process is improved; after receiving the second encrypted password information sent by the master device, the child device performs second decryption and first decryption on the password information.
  • the master device can transmit the password information of the sub-account to the sub-device through various communication methods, such as Bluetooth, wireless fidelity (wifi), data connection, and the like.
  • the master device may send the password information of the sub-account to the sub-device through a Near Field Communication (NFC) data transmission channel.
  • NFC Near Field Communication
  • the password information of the sub-account can be transmitted through the NFC Peer-to-Peer (P2P) mode to ensure that the sub-account password information is transmitted by the primary account holder and the sub-account recipient.
  • P2P NFC Peer-to-Peer
  • the confidentiality and integrity of the password information are ensured; and, based on the NFC transmission method, the entire transmission process can be completed by simply bringing the two devices close to each other, thereby eliminating the cumbersome long search and connection pairing process, thereby simplifying the user. Operation on mobile devices.
  • the master device can establish an NFC data transmission channel with the child device by touching the child device.
  • the touch process is a new type of interaction that simulates a handshake. It can be seen as a process of acceptance and confirmation, which can play a role of non-repudiation.
  • the decoding manner of decrypting the encrypted information in the encrypted state may be preset.
  • the specific password transmission channel such as an NFC data transmission channel, a Bluetooth data transmission channel, etc.
  • the sub-device determines the decoding mode according to the cipher transmission channel that receives the cipher information, and uses the cryptographic information in the encrypted state based on the determined decoding mode. Decrypt. For example, the decoding mode corresponding to the NFC data transmission channel can be set. After the master device sends the password information to the child device through the NFC data transmission channel, the child device determines that the password information is from the NFC data transmission channel, and according to the NFC data transmission channel.
  • the corresponding decoding method is used for decryption.
  • the use permission of the decoding mode can be defined in the application. For example, only the password information is from the NFC data transmission channel, and the password information can be decrypted using the decoding method corresponding to the NFC data transmission channel, thereby further ensuring the security of the password.
  • the master device may prompt the user without displaying the password, for example, by prompting changes in the brightness of the application interface (for example, when the master device initiates a request to the server) After that, the brightness of the application interface is dimmed. After receiving the password information fed back by the server, the brightness of the application interface is bright, indicating that the user can operate the application at this time, or directly prompting the user that the password is successfully obtained through the information, and can be sent to the child device. .
  • the master device may also send the information of the application, such as the name or identifier of the application, to the child device, while transmitting the information of the sub-account (including the password information, the sub-account, and the like) to the sub-device.
  • the information of the sub-account can be a string used to trigger an open application, and so on.
  • the child device can open the application based on the information of the application sent by the master device, and log in the sub-account based on the password information in the opened application, as described in detail with respect to S204.
  • the child device can also actively open the application under the trigger of the user, and does not need the information sent by the master device to trigger.
  • the sub-device receives the password information of the sub-account sent by the main device, and logs in the application based on the password information of the received sub-account.
  • the sub-device after receiving the sub-account and the corresponding password information sent by the main device, the sub-device sends the received sub-account and the corresponding password information to the server for authentication based on the opened application.
  • the server compares the password information of the sub-account sent by the sub-device with the password information of the sub-account saved by the server. After determining that the two are consistent, the server confirms that the authentication is successful. At this time, the server allows the sub-device to successfully log in to the application. After the sub-device successfully logs in, you can set the initial password, which can be to modify the system default initial password, or set the initial password based on the default password. code.
  • the second embodiment introduces a preferred embodiment under the guidance of the idea of the present application.
  • a flowchart of a method for processing sub-account information provided in Embodiment 2 of the present application includes:
  • S301 The master device logs in to the primary account, and sends a sub-account information obtaining request to the server, for requesting to obtain the password information of the sub-account.
  • the master device may carry the sub-account created by the master device in the sub-account information acquisition request, or may not carry, and the server creates a sub-account and corresponding password information at the same time.
  • the server generates sub-account information, and performs first encryption on the sub-account information and transmits the information to the main device.
  • the sub-account information here includes the password information of the sub-account, or includes the sub-account and the corresponding password information.
  • the master device After receiving the sub-account information returned by the server, the master device performs second encryption on the sub-account information, and automatically saves the background information.
  • the master device After obtaining the sub-account information, the master device performs second encryption on the sub-account information, automatically saves it into the memory through the background, and prompts the user to establish an NFC data transmission channel.
  • S304 The master device initiates a request for establishing an NFC data transmission channel to the child device by touching the child device, and the child device responds to the request, and establishes an NFC data transmission channel with the master device.
  • S305 The master device sends the information of the application system and the second encrypted sub-account information to the child device through the NFC data transmission channel.
  • the master device sends the saved sub-account information to the sub-device through the background, and the password information is not displayed to the user in the whole process.
  • the child device opens the application system, and performs second decryption on the second encrypted sub-account information.
  • the child device sends the decrypted sub-account information to the server for authentication.
  • the server enters the password information of the sub-account sent by the sub-device based on the password information of the sub-account previously saved. Line authentication.
  • S309 Set the initial password.
  • the sub-device user can view his own processing permission information and the like in the logged-in application system.
  • the embodiment of the present application further provides a sub-account information transmission device corresponding to the sub-account information processing method, and the principle of solving the problem is similar to the sub-account information processing method in the embodiment of the present application.
  • the implementation of the device can be referred to the implementation of the method, and the repeated description will not be repeated.
  • FIG. 4 it is a schematic structural diagram of a terminal device for processing sub-account information provided in Embodiment 3 of the present application, where the terminal device may specifically refer to the master device described in the foregoing embodiment, and includes:
  • the login module 41 is configured to log in to the application by using a primary account.
  • the password requesting module 42 is configured to send a sub-account information obtaining request to the server to request to obtain the password information of the sub-account;
  • the receiving module 43 is configured to receive sub-account information returned by the server, where the sub-account information includes password information of the sub-account;
  • the password sending module 44 is configured to send the password information to the child device.
  • the password sending module 44 is specifically configured to:
  • the password information is sent to the child device through a near field communication NFC data transmission channel.
  • the receiving module 43 is specifically configured to:
  • the password sending module 44 is specifically configured to:
  • the password sending module 44 is specifically configured to:
  • the password sending module 44 is specifically configured to:
  • the password information of the sub-account is automatically saved in the background, and the password information automatically saved in the background is sent to the sub-device; wherein the password information automatically saved in the background is Encryption status.
  • the password sending module 44 is specifically configured to:
  • a schematic structural diagram of a server for processing sub-account information provided in Embodiment 4 of the present application includes:
  • the receiving module 51 is configured to receive a sub-account information acquisition request sent by the master device that logs in the primary account.
  • the generating module 52 is configured to generate sub-account information including password information of the sub-account according to the sub-account information obtaining request;
  • the sending module 53 is configured to transmit the sub-account information to the main device.
  • the sending module 53 is specifically configured to:
  • FIG. 6 a schematic diagram of a structure of a terminal device for processing sub-account information provided in Embodiment 5 of the present application, where the terminal device may specifically refer to a sub-device in the foregoing embodiment, including:
  • the receiving module 61 is configured to receive password information of a sub-account sent by the main device; the password information of the sub-account is generated by the server;
  • the login module 62 is configured to log in to the application based on the password information of the received sub-account.
  • the receiving module 61 is specifically configured to:
  • the password information of the sub-account sent by the master device is received through the near field communication NFC data transmission channel.
  • the receiving module 61 is specifically configured to:
  • the terminal device further includes:
  • the decryption module 63 is configured to perform first decryption on the first encrypted password information by using the application.
  • the receiving module 61 is specifically configured to:
  • the second encryption is encryption performed by the primary device on the first encrypted password information
  • the decryption module 63 is also used to:
  • the receiving module 61 is specifically configured to:
  • the decryption module 63 is also used to:
  • embodiments of the present application can be provided as a method, system, or computer program product.
  • the present application can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment in combination of software and hardware.
  • the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

La présente invention concerne le domaine de la technologie internet et, plus particulièrement, un système, un procédé, et un dispositif destinés à traiter des informations de sous-compte afin de réduire le risque d'altération des informations de connexion de sous-compte ou des fuites pendant une transmission. Le système destiné au traitement d'informations de sous-compte fourni par des modes de réalisation de la présente invention comprend : un dispositif maître, au moins un sous-dispositif, et un serveur. Le dispositif maître se connecte à une application par l'intermédiaire d'un compte maître, et le dispositif maître est configuré afin : de transmettre une demande d'acquisition d'informations de sous-compte au serveur, de recevoir des informations de sous-compte renvoyées par le serveur, lesdites informations de sous-compte comprenant des informations de mot de passe d'un sous-compte, et de transmettre les informations de mot de passe au sous-dispositif. Le serveur est configuré afin : de générer, conformément à la demande d'acquisition d'informations de sous-compte, les informations de sous-compte comprenant les informations de mot de passe et de transmettre les informations de sous-compte au dispositif maître. Le sous-dispositif est configuré afin de recevoir les informations de mot de passe transmises par le dispositif maître.
PCT/CN2017/092909 2016-07-21 2017-07-14 Système, procédé, et dispositif destinés à traiter des informations de sous-compte WO2018014785A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610581320.X 2016-07-21
CN201610581320.XA CN106911659B (zh) 2016-07-21 2016-07-21 一种子账号信息处理系统、方法及装置

Publications (1)

Publication Number Publication Date
WO2018014785A1 true WO2018014785A1 (fr) 2018-01-25

Family

ID=59206757

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/092909 WO2018014785A1 (fr) 2016-07-21 2017-07-14 Système, procédé, et dispositif destinés à traiter des informations de sous-compte

Country Status (3)

Country Link
CN (1) CN106911659B (fr)
TW (1) TW201807614A (fr)
WO (1) WO2018014785A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112967012A (zh) * 2021-02-18 2021-06-15 江苏通付盾科技有限公司 一种企业云平台账号的设计方法和系统
CN113221128A (zh) * 2020-01-21 2021-08-06 中国移动通信集团山东有限公司 账号和密码的存储方法及注册管理系统
CN116723057A (zh) * 2023-08-09 2023-09-08 上海凯翔信息科技有限公司 一种云端nas多账号存储系统

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911659B (zh) * 2016-07-21 2020-08-04 口碑控股有限公司 一种子账号信息处理系统、方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932341A (zh) * 2012-10-25 2013-02-13 北京小米科技有限责任公司 一种密码处理方法、装置及设备
CN104283874A (zh) * 2014-09-28 2015-01-14 小米科技有限责任公司 基于云服务器的数据权限控制方法及装置
CN105337933A (zh) * 2014-07-03 2016-02-17 阿里巴巴集团控股有限公司 创建子账户的方法、系统以及主账户装置和子账户装置
CN106911659A (zh) * 2016-07-21 2017-06-30 口碑控股有限公司 一种子账号信息处理系统、方法及装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9667626B2 (en) * 2010-01-27 2017-05-30 Keypasco Ab Network authentication method and device for implementing the same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102932341A (zh) * 2012-10-25 2013-02-13 北京小米科技有限责任公司 一种密码处理方法、装置及设备
CN105337933A (zh) * 2014-07-03 2016-02-17 阿里巴巴集团控股有限公司 创建子账户的方法、系统以及主账户装置和子账户装置
CN104283874A (zh) * 2014-09-28 2015-01-14 小米科技有限责任公司 基于云服务器的数据权限控制方法及装置
CN106911659A (zh) * 2016-07-21 2017-06-30 口碑控股有限公司 一种子账号信息处理系统、方法及装置

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113221128A (zh) * 2020-01-21 2021-08-06 中国移动通信集团山东有限公司 账号和密码的存储方法及注册管理系统
CN112967012A (zh) * 2021-02-18 2021-06-15 江苏通付盾科技有限公司 一种企业云平台账号的设计方法和系统
CN116723057A (zh) * 2023-08-09 2023-09-08 上海凯翔信息科技有限公司 一种云端nas多账号存储系统
CN116723057B (zh) * 2023-08-09 2023-11-10 上海凯翔信息科技有限公司 一种云端nas多账号存储系统

Also Published As

Publication number Publication date
TW201807614A (zh) 2018-03-01
CN106911659B (zh) 2020-08-04
CN106911659A (zh) 2017-06-30

Similar Documents

Publication Publication Date Title
US10554420B2 (en) Wireless connections to a wireless access point
JP6416402B2 (ja) クラウドストレージ方法及びシステム
EP2314090B1 (fr) Association de dispositif portatif
WO2019020051A1 (fr) Procédé et appareil d'authentification de sécurité
JP2015130633A (ja) 認証システム
WO2018014785A1 (fr) Système, procédé, et dispositif destinés à traiter des informations de sous-compte
CN102739642A (zh) 许可访问网络
KR20220086580A (ko) 분산형 컴퓨터 애플리케이션들을 구축하기 위한 비-보관 툴
SE1451209A1 (en) Improved installation of a terminal in a secure system
CN103905204A (zh) 数据的传输方法和传输系统
SE1451210A1 (en) Generating a symmetric encryption key
TW201926943A (zh) 資料傳輸方法及系統
CN109362074A (zh) 一种混合模式APP中h5与服务端安全通讯的方法
CN104253801A (zh) 实现登录认证的方法、装置和系统
WO2018113337A1 (fr) Procédé et système d'établissement d'un environnement de communication sécurisé pour un dispositif vestimentaire
SE540133C2 (en) Improved system for establishing a secure communication channel
CN102404337A (zh) 数据加密方法和装置
SE542460C2 (en) Improved security through authenticaton tokens
WO2015117437A1 (fr) Procédé et dispositif de cryptage/décryptage de fichier
CN106161363B (zh) 一种ssl连接建立的方法及系统
WO2017050152A1 (fr) Système de sécurité de mot de passe adopté par un appareil mobile et procédé de saisie de mot de passe sécurisé de celui-ci
US20160210596A1 (en) Method, device and system for controlling presentation of application
JP2016019233A (ja) 通信システム、通信装置、鍵管理装置、及び通信方法
CN109075966B (zh) 通信安全系统和方法
CN108933766B (zh) 一种提高设备id安全性的方法和客户端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17830419

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17830419

Country of ref document: EP

Kind code of ref document: A1