CN103810431A - Password protection system and method - Google Patents
Password protection system and method Download PDFInfo
- Publication number
- CN103810431A CN103810431A CN201210459993.XA CN201210459993A CN103810431A CN 103810431 A CN103810431 A CN 103810431A CN 201210459993 A CN201210459993 A CN 201210459993A CN 103810431 A CN103810431 A CN 103810431A
- Authority
- CN
- China
- Prior art keywords
- password
- electronic installation
- user
- electronic device
- working cell
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
A password protection system and method are applied to a first electronic device; the first electronic device also comprises at least one work unit; the method comprises the steps of setting a first password and a second password in the initialization configuration process of the work unit and encrypting and storing the first password and the second password; when the first electronic device starts the work unit, receiving the password input by a user from the first electronic device; when the received password input by the user from the first electronic device is not same as the first password and exceeds the time limitation, locking the work unit; acquiring the password input by the user from a second electronic device; when the acquired password input by the user from the second electronic device is same as the second password, initializing the first password; logging in the user interface of the work unit after the first password is initialized. According to the password protection system and method, the work unit is prevented from being illegally used by the user.
Description
Technical field
The present invention relates to a kind of electronic installation cipher protection system and method.
Background technology
At present, for preventing that disabled user from logining operating system or application software, general all can operating system or application software initiated after a password is set while being about to login with interface and prevents that disabled user from using our operating system or application software, but, once password forgets, need reset system or recover former factory and arrange of user.So, forget Password and bring inconvenience to user.
Summary of the invention
In view of above content, be necessary to provide a kind of cipher protection system, it can be used for preventing that disabled user from using working cell.
In view of above content, be also necessary to provide a kind of cipher code protection method, it can be used for preventing that disabled user from using working cell.
A kind of cipher protection system, be applied to the first electronic installation, this first electronic installation also comprises at least one working cell, this system comprises: module is set, for carry out initial configuration process in working cell, first password and the second password are set, and encrypt described first and second password of storage, and described first password is for logining the use interface of described working cell, and described the second password is used for described first password initialization; Receiver module for after completing password and arranging, receives the password of user from described the first electronic installation input in the time that described the first electronic installation starts described working cell; Locking module, not identical with first password and when exceeding number of times and limiting from the password of described the first electronic installation input for working as received user, lock described working cell; Acquisition module, for obtaining the password of user from second electronic device input, described second electronic device communication is connected in described the first electronic installation, and user is from described second electronic device input password and send to described the first electronic installation; The described module that arranges, also for working as obtained user from the password of described second electronic device input with the second password when identical, by first password initialization; And login module, for logining the use interface of described working cell after being initialised at first password.
A kind of cipher code protection method, be applied to the first electronic installation, this first electronic installation also comprises at least one working cell, the method comprises: the first setting steps, carry out arranging in initial configuration process first password and the second password in working cell, and encrypt described first and second password of storage, and described first password is for logining the use interface of described working cell, and described the second password is used for described first password initialization; Receiving step after completing password and arranging, receives the password of user from described the first electronic installation input in the time that described the first electronic installation starts described working cell; Lock step, when received user is not identical with first password and when exceeding number of times and limiting from the password of described the first electronic installation input, locks described working cell; Obtaining step, obtains the password of user from second electronic device input, and described second electronic device communication is connected in described the first electronic installation, and user is from described second electronic device input password and send to described the first electronic installation; The second setting steps, when obtained user is from the password of described second electronic device input with the second password when identical, by first password initialization; And login step, after being initialised, logins first password the use interface of described working cell.
Compared to prior art; described cipher protection system and method; it can utilize first password to prevent that disabled user from using described working cell, and can be carried out first password described in initialization and be logined the use interface of described working cell by the second password in the time that user forgets described first password.
Accompanying drawing explanation
Fig. 1 is the running environment figure of cipher protection system of the present invention.
Fig. 2 is the functional block diagram of cipher protection system of the present invention.
Fig. 3 is the process flow diagram of the preferred embodiment of cipher code protection method of the present invention.
Main element symbol description
The first |
100 |
Second |
200 |
|
10 |
|
20 |
|
30 |
|
40 |
Module is set | 11 |
|
12 |
|
13 |
|
14 |
|
15 |
|
16 |
Following embodiment further illustrates the present invention in connection with above-mentioned accompanying drawing.
Embodiment
As shown in Figure 1, be the running environment figure of cipher protection system of the present invention.In the present embodiment, cipher protection system 10 runs in the first electronic installation 100, and this first electronic installation 100 comprises at least one working cell 20, and described working cell 20 can be operating system or application software.
In the present embodiment; described cipher protection system 10 is for arranging first password and prevent that disabled user from logining the use interface of described working cell 20 and in the time that user forgetting described first password; user can be connected to second electronic device 200 communications described the first electronic installation 100; input the second set password and send to described the first electronic installation 100 from described second electronic device 200; described cipher protection system 10 gets after the second password, by described first password initialization and login the use interface of described working cell 20.
Described first and second electronic installation 100,200 can be the electronic equipments such as computing machine, mobile phone, and can pass through for example NFC(Near FieldCommunication of cable network, wireless network, near-field communication), bluetooth, the mode such as infrared set up communication and connect.For example; described second electronic device 200 can send to described the first electronic installation 100 by the second password with short message mode, reads out after the second sent password described first password initialization and login the use interface of described working cell 20 note that described cipher protection system 10 can receive from described the first electronic installation 100.
Described second electronic device 200 also can send to described the first electronic installation 100 by described the second password to send a for example text form of file that stores the second password, and described cipher protection system 10 can read out after described the second password described first password initialization and login the use interface of described working cell 20 from received file.
Described storer 30 for storing various data, for example, is stored the sequencing code of described cipher protection system 10.In the present embodiment, described cipher protection system 10 can be divided into one or more modules, and described one or more modules are stored in described storer 30 and by processor 40 and carry out, to complete function provided by the invention.For example, consult shown in Fig. 2, described cipher protection system 10 is divided into and module 11, receiver module 12, judge module 13 are set, login module 14, locking module 15 and acquisition module 16.Function about each module will specifically describe in the process flow diagram of Fig. 3.
As shown in Figure 3, be the process flow diagram of the preferred embodiment of cipher code protection method of the present invention.
Step S1, module 11 is set first password and the second password are set in initial configuration process is carried out in working cell 20, and encrypt and store described first and second password, described first password is for logining the use interface of described working cell 20, and described the second password is used for described first password initialization.
The present embodiment illustrates take described working cell 20 as Windows operating systems, particularly, after having installed Windows operating system, described the first electronic installation 100 can restart, in restarting process, Windows operating system need be carried out initial configuration, now can first and second password be set by the described module 11 that arranges, for example, first password be set for " password.123 ", the second password is also encrypted and is stored in described storer 30 for " password.321 ".
Step S2, when described the first electronic installation 100 is during in the described working cell 20 of follow-up startup, user need input password and can login the use interface of described working cell 20.Receiver module 12 receives the password that user inputs from the first electronic installation 100.
Particularly, can start completely in described working cell 20 and while entering with interface, show that a window inputs password and login the use interface of described working cell 20 from described the first electronic installation 100 for user, for example user inputs password for " password ", and described receiver module 12 receives this user and inputs password " password ".
Step S3, whether judge module 13 is deciphered the password that stored first password the user that receives of judgement input from the first electronic installation 100 identical with first password, if execution step S4, if the password that user inputs from the first electronic installation 100 be user not identical with first password inputs password mistake, now perform step S5.
Step S4, logins module 14 and logins the use interface of working cell 20.
Step S5, judge module 13 judges whether the number of times that user inputs password mistake continuously from the first electronic installation 100 reaches number of times restriction, if perform step S6, otherwise gets back to step S2, continues to receive the password that user inputs from the first electronic installation 100.
For example, the continuous input error password of user number of times reaches number of times restriction (as 3 times), and flow performing is to step S6.
Step S6, locking module 15 locks described working cell 20.For example can no longer show for user and input the window of password and only show that a miscue information is as " input error password exceedes number of times restriction continuously " from described the first electronic installation 100.
Step S7, is connected to the first electronic installation 100 by second electronic device 200 communications, for example, make described second electronic device 200 set up communication with described the first electronic installation 100 by communication modes such as bluetooth, infrared, NFC and be connected.User inputs password by second electronic device 200 and sends to the first electronic installation 100, and acquisition module 16 obtains the password that this user inputs from second electronic device 200.
Particularly, user can set up a text at described second electronic device 200, in text file, input password and preserve, text file is sent to described the first electronic installation 100 by modes such as bluetooth, infrared, NFC by described text, the text file that described acquisition module 16 receives from described the first electronic installation 100, read out the password of described user from input described in second electronic device 200.For example getting the password that user inputs from described second electronic device 200 is " password.321 ".
User also can send to described the first electronic installation 100 with short message mode by described the second password from described second electronic device 200, and 16 of described acquisition modules read out the password that user inputs from described second electronic device 200 from received note.
Step S8, whether judge module 13 is deciphered the password that the second stored password the user that obtains of judgement input from second electronic device 200 identical with the second password, if perform step S9, otherwise, get back to step S7, continue to receive the password that user inputs from second electronic device 200.
Step S9, arranges module 11 by first password initialization.For example first password is initialized as " 1234 ", after initialization, gets back to process step S4, login module 14 and login the use interface of described working cell 20 after first password is initialised.Follow-up described the first electronic installation 100 is starting when described working cell 20, and user can the password from the first electronic installation 100 input initializations can login the use interface of described working cell 20.
Finally it should be noted that, above embodiment is only unrestricted in order to technical scheme of the present invention to be described, although the present invention is had been described in detail with reference to preferred embodiment, those of ordinary skill in the art is to be understood that, can modify or be equal to replacement technical scheme of the present invention, and not depart from the spirit and scope of technical solution of the present invention.
Claims (8)
1. a cipher protection system, is applied to the first electronic installation, and this first electronic installation comprises at least one working cell, it is characterized in that, this system comprises:
Module is set, for carry out initial configuration process in working cell, first password and the second password are set, and encrypt described first and second password of storage, and described first password is for logining the use interface of described working cell, and described the second password is used for described first password initialization;
Receiver module for after completing password and arranging, receives the password of user from described the first electronic installation input in the time that described the first electronic installation starts described working cell;
Locking module, while exceeding restriction, locks described working cell for working as received user from the password number of times not identical with first password and input password mistake of described the first electronic installation input;
Acquisition module, for obtaining the password of user from second electronic device input, described second electronic device communication is connected in described the first electronic installation, and user is from described second electronic device input password and send to described the first electronic installation;
The described module that arranges, also for working as obtained user from the password of described second electronic device input with the second password when identical, by first password initialization; And
Login module, for logining the use interface of described working cell after being initialised at first password.
2. cipher protection system as claimed in claim 1, is characterized in that, described working cell is operating system or application software.
3. cipher protection system as claimed in claim 1; it is characterized in that; in the time that user sends to described the first electronic installation with short message mode by the described password from second electronic device input, the note that described acquisition module receives from described the first electronic installation, read the password of user from described second electronic device input.
4. cipher protection system as claimed in claim 1; it is characterized in that; in the time that user sends to described the first electronic installation with text form by the described password from second electronic device input, described acquisition module reads the password of user from described second electronic device input from the received text of described the first electronic installation.
5. a cipher code protection method, is applied to the first electronic installation, and this first electronic installation comprises at least one working cell, it is characterized in that, the method comprises:
The first setting steps, carry out arranging in initial configuration process first password and the second password in working cell, and encrypt described first and second password of storage, and described first password is for logining the use interface of described working cell, and described the second password is used for described first password initialization;
Receiving step after completing password and arranging, receives the password of user from described the first electronic installation input in the time that described the first electronic installation starts described working cell;
Lock step, in the time that received user exceedes restriction from the password number of times not identical with first password and input password mistake of described the first electronic installation input, locks described working cell;
Obtaining step, obtains the password of user from second electronic device input, and described second electronic device communication is connected in described the first electronic installation, and user is from described second electronic device input password and send to described the first electronic installation;
The second setting steps, when obtained user is from the password of described second electronic device input with the second password when identical, by first password initialization; And
Login step, after first password is initialised, login the use interface of described working cell.
6. cipher code protection method as claimed in claim 5, is characterized in that, described working cell is operating system or application software.
7. cipher code protection method as claimed in claim 5; it is characterized in that; in the time that user sends to described the first electronic installation with short message mode by the described password from second electronic device input, the note that described obtaining step receives from described the first electronic installation, read the password of user from described second electronic device input.
8. cipher code protection method as claimed in claim 5; it is characterized in that; in the time that user sends to described the first electronic installation with text form by the described password from second electronic device input, described obtaining step reads the password of user from described second electronic device input from the received text of described the first electronic installation.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210459993.XA CN103810431A (en) | 2012-11-15 | 2012-11-15 | Password protection system and method |
TW101144073A TW201419025A (en) | 2012-11-15 | 2012-11-23 | Password protecting system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210459993.XA CN103810431A (en) | 2012-11-15 | 2012-11-15 | Password protection system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103810431A true CN103810431A (en) | 2014-05-21 |
Family
ID=50707184
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210459993.XA Pending CN103810431A (en) | 2012-11-15 | 2012-11-15 | Password protection system and method |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN103810431A (en) |
TW (1) | TW201419025A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109032442A (en) * | 2018-06-26 | 2018-12-18 | Oppo(重庆)智能科技有限公司 | Content display method, device, storage medium and electronic equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6067621A (en) * | 1996-10-05 | 2000-05-23 | Samsung Electronics Co., Ltd. | User authentication system for authenticating an authorized user of an IC card |
TW200811686A (en) * | 2006-08-25 | 2008-03-01 | Compal Electronics Inc | Identification mathod |
CN101742060A (en) * | 2008-11-21 | 2010-06-16 | 康佳集团股份有限公司 | Dynamic password control method |
-
2012
- 2012-11-15 CN CN201210459993.XA patent/CN103810431A/en active Pending
- 2012-11-23 TW TW101144073A patent/TW201419025A/en unknown
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6067621A (en) * | 1996-10-05 | 2000-05-23 | Samsung Electronics Co., Ltd. | User authentication system for authenticating an authorized user of an IC card |
TW200811686A (en) * | 2006-08-25 | 2008-03-01 | Compal Electronics Inc | Identification mathod |
CN101742060A (en) * | 2008-11-21 | 2010-06-16 | 康佳集团股份有限公司 | Dynamic password control method |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109032442A (en) * | 2018-06-26 | 2018-12-18 | Oppo(重庆)智能科技有限公司 | Content display method, device, storage medium and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
TW201419025A (en) | 2014-05-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2023202028B2 (en) | Wireless access credential system | |
US11216549B2 (en) | Security verification method and device | |
EP3123660B1 (en) | Method and apparatus for supporting login through user terminal | |
US9451454B2 (en) | Mobile device identification for secure device access | |
US10154026B2 (en) | Secure remote modification of device credentials using device-generated credentials | |
CN102708324B (en) | A kind of screen unlocking system and method | |
WO2013182119A1 (en) | Screen unlocking method, device and terminal | |
US20150024688A1 (en) | Automatic Pairing of a Vehicle and a Mobile Communications Device | |
US9699656B2 (en) | Systems and methods of authenticating and controlling access over customer data | |
CN101997678A (en) | A method and terminal for obtaining a password | |
US9779568B2 (en) | Locking control device, locking control system, and locking control method | |
CN104952128A (en) | Intelligent handheld terminal based electronic unlocking system and unlocking method thereof | |
US20150072646A1 (en) | Mobile device password reset | |
WO2013152136A1 (en) | Authentication token | |
US9946859B2 (en) | Systems and methods for enabling a lock screen of an electronic device | |
CN105812398A (en) | Remote login authorization method and remote login authorization device | |
CN103414560A (en) | Starting method of application, device thereof, system thereof and application server | |
CN107105082B (en) | Method for unlocking network of terminal, method and device for starting terminal | |
CN101268712B (en) | Method and a device to suspend the access to a service | |
CN103810431A (en) | Password protection system and method | |
CA3006190A1 (en) | Electric lock and control method thereof | |
CN112751803B (en) | Method, apparatus, and computer-readable storage medium for managing objects | |
US20160050066A1 (en) | Management of an encryption key for a secure data storage device on a trusted device paired to the secure device over a personal area network | |
US11812266B2 (en) | Systems and methods for network-based authentication for connected vehicle access | |
CN103366131A (en) | NFC mouse, data transmission method and login method of mouse |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140521 |
|
RJ01 | Rejection of invention patent application after publication |