[go: up one dir, main page]

CN102638471A - Password protection and management method - Google Patents

Password protection and management method Download PDF

Info

Publication number
CN102638471A
CN102638471A CN2012101245219A CN201210124521A CN102638471A CN 102638471 A CN102638471 A CN 102638471A CN 2012101245219 A CN2012101245219 A CN 2012101245219A CN 201210124521 A CN201210124521 A CN 201210124521A CN 102638471 A CN102638471 A CN 102638471A
Authority
CN
China
Prior art keywords
password
user
authentication
password protection
user name
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101245219A
Other languages
Chinese (zh)
Inventor
李昀
郭志
邱柏云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HANGZHOU SHENGYUAN CHIP TECHNIQUE CO Ltd
Original Assignee
HANGZHOU SHENGYUAN CHIP TECHNIQUE CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HANGZHOU SHENGYUAN CHIP TECHNIQUE CO Ltd filed Critical HANGZHOU SHENGYUAN CHIP TECHNIQUE CO Ltd
Priority to CN2012101245219A priority Critical patent/CN102638471A/en
Publication of CN102638471A publication Critical patent/CN102638471A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to a password protection and management method which comprises the following steps: (1) when a user uses a password protection terminal for the first time, the identity authentication is carried out firstly; (2) the user connects the password protection terminal and carries out identity comparison authentication, and password-protecting password data is read and is synchronous to cloud data after passing the authentication; (3) the application of the user is detected, whether a user name and a password exist or not is detected, and the user name and the password are automatically used if the user name and the password exist; and (4) whether the user registration is carried out or not is detected if the user name and the password do not exist in the application of the user, a user name and a password are stored if the user registration is selected, or are manually input and are then stored if the registration is not carried out. The password protection and management method has the beneficial effects that the password security problem in the Internet age is solved, the protection of Internet passwords is pushed to the ultra-convenient age, a brain has no need of recording any password, and various passwords can be managed and applied only by virtue of inherent biological characteristics.

Description

A kind of cryptoguard and management method
Technical field
The present invention relates to field of information security technology and cloud computing security fields, especially a kind of cryptoguard and management method.
Background technology
Along with Internet development, password has become us will face everyday, and mailbox is wanted password, and password is wanted in the website; Look into telephone expenses and want password, password is also wanted in shopping online, and panoramic password makes our brain expand most of people; Possible all websites, mailbox all are with identical password, once revealed, all passwords are all revealed; Even want to revise password, also be a great engineering, if each mailbox; Different ciphers is all adopted in the website, may well ask whose brain, can remember so many password.
Along with password is revealed taking place frequently of incident, a cover safety and easily the password method for using become everybody urgent demand gradually.If a plurality of websites use same password to be easy to finished off with one blow, if all use different complicated passwords to be difficult to memory again.Therefore we need a cover to help the safety problem that we solve password about the total solution of Password Management and cryptoguard
To cryptoguard and management, adopt the pattern of pure software mostly at present, adopt software records user's various user names, the mode of password.This mode provides convenience to the user, can help user record and administrator password.But this mode has individual shortcoming, and the user need remember at least one password at least, in case this password has forgotten that the information that possibly be correlated with has all been got to return.Also having a shortcoming is that professional platform independence is poor, and this type of software is local operation mostly, generally can on other computers or terminal, use, but use be complicated through modes such as derivation importings, and convenience is not enough.Therefore need a cover, need not remember any password, can realize again easy to be cross-platform, the how Password Management of point operation and protection scheme.
Domestic patent: 200920089497 disclose a kind of off-line fingerprint code management device; This patent substitutes password through fingerprint; But only be the process that substitutes cipher authentication through finger print identifying; Just the object information of authentication output is used for judging, can't compatible various the Internets and local the application, must use on the system that supports this device.Can't accomplish Password Management, and limitation is big.
Domestic patent: 200720190468.7 disclose a kind of electric signing tools with cryptography management function; It is through at the safe data storage unit and the Data Management Unit of set inside, storage and management input with related data login account or password, and can directly obtain said number of the account or code data through the computer that is connected with this electric signing tools or the output device of electric signing tools; This patent; That this patent can't realize is cross-platform, striding equipment, interdepartmental system is seamless shares the data that access to your password synchronously, after the electric signing tools of this patent is lost, can't give code data for change; The safety measure of this equipment itself is not set forth clear yet; Like the no any data protection measure of this equipment itself, after obtaining, others might utilize this equipment to land relevant number of the account, like this equipment cryptoguard mechanism is arranged itself; Then the user still must write down at least one password, the same risk of forgeing and revealing that exists.
In summary, it is safe in utilization to password to only depend on existing Password Management and guard method to satisfy the user, property easy to use, and the demand of ease for use presses for a kind of adaptation intelligent user name cryptoguard and management method current the Internet era.
Summary of the invention
The object of the invention will solve the deficiency that above-mentioned technology exists just, and a kind of cryptoguard and management method are provided.
The present invention solves the technical scheme that its technical problem adopts: this cryptoguard and management method, and this method step is following:
(1), when the user uses the password protection terminal for the first time, carries out authentication earlier, i.e. the registration of user's biological characteristic;
(2), the user connects the password protection terminal, carries out identity comparison authentication; After authentication is passed through, read the password protection code data and with the cloud data sync;
(3), detect user's application, detect user name and password and whether exist; If exist, then user name and password use automatically;
(4) if do not have name in an account book and password in user's the application, then detect and whether carry out user's registration, if select user's registration, then store user name and password; If do not register, then manually input user name and password, store user name and password again.
As preferably, concrete steps are following in step (1): connect and the password protection terminal is installed; The user carries out first authentication; , register and test biological characteristic; Simultaneous user's identity information; Register successfully.
As preferably, password protection is following with the step of the Cloud Server backed up in synchronization of far-end: the user is connected the password protection terminal, carries out identity comparison authentication; After authentication is passed through, the local and high in the clouds code data of contrast; Detect total information and upload local update; Upload and download differential password data local and high in the clouds; Success synchronously.
As preferably, the concrete steps that back reduction password protection is lost in password protection are following: the user connects new password protection terminal, carries out identity comparison authentication; After authentication is passed through, download user name, password and account information, updated account synchronously; The account reduces success.
As preferably, the built-in safe storage in password protection terminal, hardware store user name and encrypted message; When breaking away from the Internet, system can't be synchronous with Cloud Server, and the local password data are imported from the password protection terminal; When detecting the user and using corresponding the application, call the local password data and carry out associative operation.
The effect that the present invention is useful is: the safety problem of password Internet era of the invention solves; Utilize high-tech technology such as biometrics identification technology, cloud computing technology, the Internet programming technique; Push the protection of the Internet password to the ultra convenient epoch; Brain need not to write down any password, simply by virtue of self biological characteristic, can manage and use various passwords.Thereby fundamentally solve the user the Internet era to the protection of cryptosecurity and the problem of memory management.
Description of drawings
Fig. 1 is that system of the present invention connects sketch map;
Fig. 2 is that password protection software of the present invention connects sketch map;
Fig. 3 is that password protection entire system of the present invention is used sketch map;
Fig. 4 is a schematic flow sheet of the present invention;
Fig. 5 is a first use password protection system flow sketch map of the present invention;
Fig. 6 is a password protection backed up in synchronization schematic flow sheet;
Fig. 7 is that back reduction password protection schematic flow sheet is lost in password protection;
Fig. 8 is that off line is used the password protection schematic flow sheet.
Embodiment
Below in conjunction with accompanying drawing and embodiment the present invention is described further:
Defective to existing password protection and management; The present invention utilizes the unique biological characteristic of human body through exclusive password protection terminal, substitutes basic password; Thereby realize not remembering any encrypted message; Can manage all users and encrypted message, adopt state-of-the-art cloud computing technology simultaneously, realize the seamless synchronous of identity information and encrypted message; Realize that the password of user when different computers uses uses and problem of management, and the information after the password protection lost terminal of having realized is passed through the synchronous reduction problem behind the biological characteristic authentication.Thoroughly solve user's cipher memory and management aspect, the demand of Bindery security and convenience.
Based on the cryptoguard management system of cloud security, as shown in Figure 1, mainly form by three parts:
The password protection terminal:
Biological characteristic identification function: adopt password protection terminal based on living things feature recognition; Through the living things feature recognition user; Take leave of on the market similar products or software and still land the present situation of management through password; Really accomplish the foolization, basic password of user all need not be remembered, and directly can manage and use password protection through my biological characteristic that comprises fingerprint.
The function of local comparison authentication of password protection biological support characteristic and long-range comparison authentication.Be applied to different application scenes respectively
Itself possesses memory function password protection, and thousands of user name passwords can be stored in inside, can realize the off-grid operation during local the use, uses relevant local password.Can carry out synchronously simultaneously through software kit and password protection cloud service, operation such as reduction.
Various communication interfaces is supported in password protection simultaneously; Comprise interfaces such as USB, serial ports, bluetooth, wifi, TCP/IP, SDIO, tonepulse; Can directly connect terminals such as desktop computer, panel computer, handheld device, mobile phone; During wireless connections such as use wifi, a plurality of terminals of more can plugging into are simultaneously shared simultaneously and are used.
The password protection application software: as shown in Figure 2,
The application software of password protection system support mainly contains Password Management, cloud management, Identity Management:
Password is used: comprise functions such as Password Management, password use, code extraction, password storage
Cloud is used: comprise functions such as password backup, cryptosync
Identity is used: comprise that user identity backup, user identity are reported the loss, user identity reduction holder function
The password protection cloud service:
Powerful password protection Cloud Server utilizes the advantage of cloud computing, storage user's identity and encrypted message, and the use of being convenient to the user realizes with system, can realize seamless cross-platform password application.
The password protection entire system is used sketch map: as shown in Figure 3,
Password protection is inputed the various passwords of having stored automatically, as is not had the website or the application of stored user name and password through detecting user's operation automatically; Can take manual registration and the automatic process registration of system; When registering automatically, the website produces 32 random ciphers at random and preserves, and the user need not to be concerned about actual password; Had user name and password like the user, can import by hand and select whether to preserve.Under idiographic flow example such as Fig. 4:
(1), when the user uses the password protection terminal for the first time, carries out authentication earlier, i.e. the registration of user's biological characteristic;
(2), the user connects the password protection terminal, carries out identity comparison authentication; After authentication is passed through, read the password protection code data and with the cloud data sync;
(3), detect user's application, detect user name and password and whether exist; If exist, then user name and password use automatically;
(4) if do not have name in an account book and password in user's the application, then detect and whether carry out user's registration, if select user's registration, then store user name and password; If do not register, then manually input user name and password, store user name and password again.
The first password protection system flow that uses: as shown in Figure 5,
When the user uses this system for the first time; At first to carry out authentication; Be the registration of my biological characteristic, we recommend to have the foundation of the ripe fingerprint of using as biological characteristic, support the access of other biological characteristics such as pupil, sound, face, custom simultaneously.Concrete registering flow path is shown in the following figure: connect and installation password protection terminal; The user carries out first authentication; , register and test biological characteristic; Simultaneous user's identity information; Register successfully.
Password protection backed up in synchronization flow process: as shown in Figure 6.
The user connects the password protection terminal, carries out identity comparison authentication; After authentication is passed through, the local and high in the clouds code data of contrast; Detect total information and upload local update; Upload and download differential password data local and high in the clouds; Success synchronously.
Password protection through can with the Cloud Server backed up in synchronization of far-end, in conjunction with the password protection terminal, no matter in work computer; Or the PC of oneself; Still handheld terminal, or other where, latest data synchronously; Be to be with password to walk all over the world, fundamentally solved the branch problem of password.
The built-in international standard enciphering and deciphering algorithm of synchro system is supported international standard algorithms such as DES/3DES, AES, RSA, ECC, and the HASH algorithm utilizes these algorithms can realize the encryption storage of code data, adds the Miyun transmission.
Back reduction password protection flow process is lost in password protection:
Lost password protection if you are unfortunate, you do not worry there is not your biological characteristic yet, and others can't use the password protection terminal, can't obtain the password of the inside.Simultaneously, can then through the biological characteristic of self, give the code data office identity data in the cloud service for change through buying or applying for new password protection terminal equipment.Adopt the mode of far-end biological characteristic authentication, through the biological characteristic authentication identity, again with original information synchronously to new password protection terminal, thereby accomplish that code data and identity information never lose.
The flow process of specifically fetching is as shown in Figure 7: the user connects new password protection terminal, carries out identity comparison authentication; After authentication is passed through, download user name, password and account information, updated account synchronously; The account reduces success.
Off line is used the password protection flow process:
When off line is used (when breaking away from the Internet), system can't be synchronous with Cloud Server, and this moment, data local password data imported from the password protection terminal hardware, when detecting the user and using corresponding the application, calls the local password data and carry out associative operation.
The concrete flow process of using is as shown in Figure 8: the built-in safe storage in password protection terminal; Hardware store user name and encrypted message; When breaking away from the Internet, system can't be synchronous with Cloud Server, and the local password data are imported from the password protection terminal; When detecting the user and using corresponding the application, call the local password data and carry out associative operation.
Terminological interpretation:
Cloud computing: be a kind of account form based on the Internet, in this way, software and hardware resources of sharing and information can offer computer and other equipment as required.The whole service mode is the spitting image of electrical network.
Data security: refer to the safety of data itself here, mainly be meant and adopt the modern password algorithm that data are carried out active protection,, data integrity secret, bidirectional strength authentication etc. like data.
Biological identification: claim bio-identification again, be through computer utilize human body intrinsic physiological characteristic or behavioural characteristic carry out personal identification and identify.Biological characteristic commonly used comprises face picture, iris, fingerprint, palmmprint, sound, person's handwriting etc., and many countries are studied it as the strategic technology in great basis.Americanologist is crossed legislation and is explicitly called for this technology of employing in the national security field.International Civil Aviation Organization also requires its affiliated 188 member states and area since the end of the year 2004 biological characteristic to be added in the individual passport a few days ago, to confirm identity.
Password: the common name that is pass word (password) in Chinese." password " inputed when Website login, E-mail address and bank debits strictness in fact should only be known as pass word, because it is not " encrypted code " on the original meaning, but also can be called secret number.
Except that the foregoing description, the present invention can also have other execution modes.All employings are equal to the technical scheme of replacement or equivalent transformation formation, all drop on the protection range of requirement of the present invention.

Claims (5)

1. cryptoguard and management method, it is characterized in that: this method step is following:
(1), when the user uses the password protection terminal for the first time, carries out authentication earlier, i.e. the registration of user's biological characteristic;
(2), the user connects the password protection terminal, carries out identity comparison authentication; After authentication is passed through, read the password protection code data and with the cloud data sync;
(3), detect user's application, detect user name and password and whether exist; If exist, then user name and password use automatically;
(4) if do not have name in an account book and password in user's the application, then detect and whether carry out user's registration, if select user's registration, then store user name and password; If do not register, then manually input user name and password, store user name and password again.
2. cryptoguard according to claim 1 and management method is characterized in that: concrete steps are following in step (1): connect and installation password protection terminal; The user carries out first authentication; , register and test biological characteristic; Simultaneous user's identity information; Register successfully.
3. cryptoguard according to claim 1 and management method is characterized in that: password protection is following with the step of the Cloud Server backed up in synchronization of far-end: the user is connected the password protection terminal, carries out identity comparison authentication; After authentication is passed through, the local and high in the clouds code data of contrast; Detect total information and upload local update; Upload and download differential password data local and high in the clouds; Success synchronously.
4. cryptoguard according to claim 1 and management method is characterized in that: the concrete steps that back reduction password protection is lost in password protection are following: the user connects new password protection terminal, carries out identity comparison authentication; After authentication is passed through, download user name, password and account information, updated account synchronously; The account reduces success.
5. cryptoguard according to claim 1 and management method; It is characterized in that: the built-in safe storage in password protection terminal, hardware store user name and encrypted message are when breaking away from the Internet; System can't be synchronous with Cloud Server; The local password data are imported from the password protection terminal, when detecting the user and using corresponding the application, call the local password data and carry out associative operation.
CN2012101245219A 2012-04-25 2012-04-25 Password protection and management method Pending CN102638471A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101245219A CN102638471A (en) 2012-04-25 2012-04-25 Password protection and management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101245219A CN102638471A (en) 2012-04-25 2012-04-25 Password protection and management method

Publications (1)

Publication Number Publication Date
CN102638471A true CN102638471A (en) 2012-08-15

Family

ID=46622714

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101245219A Pending CN102638471A (en) 2012-04-25 2012-04-25 Password protection and management method

Country Status (1)

Country Link
CN (1) CN102638471A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632127A (en) * 2012-08-21 2014-03-12 北京恒泰天宇科技有限公司 An intelligent biological characteristic identification system based on cloud computing
CN103795682A (en) * 2012-10-29 2014-05-14 腾讯科技(深圳)有限公司 Password list management method and device
CN103841107A (en) * 2014-03-11 2014-06-04 网神信息技术(北京)股份有限公司 Method and device for identity authentication of security gateway administrator
CN103873307A (en) * 2014-04-11 2014-06-18 北京极科极客科技有限公司 Method for PPPOE user name and password backup and restoration
CN104092550A (en) * 2014-07-23 2014-10-08 三星电子(中国)研发中心 Password protection method, system and device
CN104182670A (en) * 2013-05-21 2014-12-03 百度在线网络技术(北京)有限公司 Method for authenticating by virtue of wearable equipment and wearable equipment
CN104378338A (en) * 2013-08-16 2015-02-25 深圳市腾讯计算机系统有限公司 Password protection information maintenance method and device
CN104506557A (en) * 2015-01-07 2015-04-08 北京深思数盾科技有限公司 Method and device for managing login information
CN104574048A (en) * 2014-12-27 2015-04-29 小米科技有限责任公司 Resource transfer method and device
CN104794376A (en) * 2014-01-17 2015-07-22 联想(北京)有限公司 Terminal equipment and information processing method
CN107026818A (en) * 2016-01-29 2017-08-08 中兴通讯股份有限公司 A kind of method of cipher authentication, equipment and application server
CN107332668A (en) * 2017-06-05 2017-11-07 国政通科技股份有限公司 A kind of method and apparatus for handling encrypted message
CN108933623A (en) * 2018-09-10 2018-12-04 西安天问智能科技有限公司 A kind of register method, the apparatus and system of unmanned plane and cloud platform
WO2018227354A1 (en) * 2017-06-13 2018-12-20 上海传英信息技术有限公司 Wireless connection password management method for intelligent terminal
CN112055355A (en) * 2020-09-01 2020-12-08 紫光云(南京)数字技术有限公司 Internet password management system based on 5G super SIM card
CN112235258A (en) * 2020-09-24 2021-01-15 黄杰 Encryption/decryption method, encryption/decryption system, and encryption/decryption device for information transmission

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101547219A (en) * 2009-05-05 2009-09-30 汤淼 System and method for data storage
US20090265769A1 (en) * 2008-04-22 2009-10-22 Feitian Technologies Co., Ltd. Method for automatically generating and filling in login information and system for the same
CN101895513A (en) * 2009-05-20 2010-11-24 广州盛华信息技术有限公司 Log-in authentication system for service website and implementation method
CN201689428U (en) * 2009-04-10 2010-12-29 凯迈(洛阳)电子有限公司 Offline fingerprint password manager

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090265769A1 (en) * 2008-04-22 2009-10-22 Feitian Technologies Co., Ltd. Method for automatically generating and filling in login information and system for the same
CN201689428U (en) * 2009-04-10 2010-12-29 凯迈(洛阳)电子有限公司 Offline fingerprint password manager
CN101547219A (en) * 2009-05-05 2009-09-30 汤淼 System and method for data storage
CN101895513A (en) * 2009-05-20 2010-11-24 广州盛华信息技术有限公司 Log-in authentication system for service website and implementation method

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632127A (en) * 2012-08-21 2014-03-12 北京恒泰天宇科技有限公司 An intelligent biological characteristic identification system based on cloud computing
CN103795682A (en) * 2012-10-29 2014-05-14 腾讯科技(深圳)有限公司 Password list management method and device
CN103795682B (en) * 2012-10-29 2015-08-19 腾讯科技(深圳)有限公司 Cipher table list management method and device
CN104182670A (en) * 2013-05-21 2014-12-03 百度在线网络技术(北京)有限公司 Method for authenticating by virtue of wearable equipment and wearable equipment
CN104182670B (en) * 2013-05-21 2017-12-22 百度在线网络技术(北京)有限公司 The method and Wearable being authenticated by Wearable
CN104378338A (en) * 2013-08-16 2015-02-25 深圳市腾讯计算机系统有限公司 Password protection information maintenance method and device
CN104378338B (en) * 2013-08-16 2019-02-26 深圳市腾讯计算机系统有限公司 Password protected information maintaining method and device
CN104794376A (en) * 2014-01-17 2015-07-22 联想(北京)有限公司 Terminal equipment and information processing method
CN103841107A (en) * 2014-03-11 2014-06-04 网神信息技术(北京)股份有限公司 Method and device for identity authentication of security gateway administrator
CN103873307A (en) * 2014-04-11 2014-06-18 北京极科极客科技有限公司 Method for PPPOE user name and password backup and restoration
CN104092550B (en) * 2014-07-23 2017-10-17 三星电子(中国)研发中心 Cipher code protection method, system and device
CN104092550A (en) * 2014-07-23 2014-10-08 三星电子(中国)研发中心 Password protection method, system and device
CN104574048A (en) * 2014-12-27 2015-04-29 小米科技有限责任公司 Resource transfer method and device
CN104574048B (en) * 2014-12-27 2018-04-06 小米科技有限责任公司 Resource transfers method and device
CN104506557A (en) * 2015-01-07 2015-04-08 北京深思数盾科技有限公司 Method and device for managing login information
CN107026818A (en) * 2016-01-29 2017-08-08 中兴通讯股份有限公司 A kind of method of cipher authentication, equipment and application server
CN107332668A (en) * 2017-06-05 2017-11-07 国政通科技股份有限公司 A kind of method and apparatus for handling encrypted message
WO2018227354A1 (en) * 2017-06-13 2018-12-20 上海传英信息技术有限公司 Wireless connection password management method for intelligent terminal
CN108933623A (en) * 2018-09-10 2018-12-04 西安天问智能科技有限公司 A kind of register method, the apparatus and system of unmanned plane and cloud platform
CN112055355A (en) * 2020-09-01 2020-12-08 紫光云(南京)数字技术有限公司 Internet password management system based on 5G super SIM card
CN112235258A (en) * 2020-09-24 2021-01-15 黄杰 Encryption/decryption method, encryption/decryption system, and encryption/decryption device for information transmission

Similar Documents

Publication Publication Date Title
CN102638471A (en) Password protection and management method
JP3222165U (en) System to realize universal distributed solution for user authentication by mutual authentication configuration
EP2798777B1 (en) Method and system for distributed off-line logon using one-time passwords
CN103310142B (en) Based on the human-computer fusion safety certifying method of wearable device
CN104735021B (en) A kind of account number login method, device and system
EP3200417B1 (en) Method and device for information interaction and association between human biological feature data and account
CN102932518A (en) A method, system and mobile terminal for user login/switching
CN103366107A (en) A method, device and mobile phone for protecting application program access rights
CN104239815A (en) Electronic document encryption and decryption method and method based on iris identification
CN103177206A (en) Information privacy method and electronic terminal
CN109462848A (en) Access method, Wi-Fi Hotspot equipment and the user equipment of Wi-Fi Hotspot equipment
US9465974B2 (en) Electronic device providing downloading of enrollment finger biometric data via short-range wireless communication
CN107506635B (en) Online function opening method for identity card, mobile phone, trusted terminal and verification server
CN110321757B (en) Cross-end biological feature recognition system, biological feature management system, method and device
FR3048530B1 (en) OPEN AND SECURE SYSTEM OF ELECTRONIC SIGNATURE AND ASSOCIATED METHOD
CN104881648A (en) Fingerprint verification system arranged in valid identity card
CN104579665B (en) Method for authenticating and device
TWI474705B (en) Handheld device and unlocking method thereof
KR101305901B1 (en) Authentication method and system
US20150016697A1 (en) Finger biometric sensor data synchronization via a cloud computing device and related methods
CN107196971A (en) Information processing method, device, electronic equipment and server
CN106778178A (en) Method and device for calling fingerprint business card
CN109951598A (en) Display methods, device, computer equipment and the storage medium of application interface
JP6938579B2 (en) Mobile device privacy protection methods and devices, as well as mobile devices
CN105991512A (en) Method and device for implementing multi-user login mode

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: The city of Hangzhou in West Zhejiang province 311121 No. 998 Building 9 East Sea Park

Applicant after: Hangzhou Shengyuan Chip Technique Co., Ltd.

Address before: 310012, room 17, building 176, 203 Tianmu Mountain Road, Hangzhou, Zhejiang, Xihu District

Applicant before: Hangzhou Shengyuan Chip Technique Co., Ltd.

C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: Hangzhou City, Zhejiang province 311121 Yuhang Wuchang Street No. 998 West Sea Park Building 9 East

Applicant after: Hangzhou Shengyuan Chip Technique Co., Ltd.

Address before: The city of Hangzhou in West Zhejiang province 311121 No. 998 Building 9 East Sea Park

Applicant before: Hangzhou Shengyuan Chip Technique Co., Ltd.

C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120815