[go: up one dir, main page]

CN113676443A - Login information input method, login information storage method and related device - Google Patents

Login information input method, login information storage method and related device Download PDF

Info

Publication number
CN113676443A
CN113676443A CN202110592836.5A CN202110592836A CN113676443A CN 113676443 A CN113676443 A CN 113676443A CN 202110592836 A CN202110592836 A CN 202110592836A CN 113676443 A CN113676443 A CN 113676443A
Authority
CN
China
Prior art keywords
information
login
login information
preset
biometric information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110592836.5A
Other languages
Chinese (zh)
Inventor
陈天雄
甘强
李想
李朋
季昀
张明修
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Device Co Ltd
Original Assignee
Huawei Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Device Co Ltd filed Critical Huawei Device Co Ltd
Priority to CN202110592836.5A priority Critical patent/CN113676443A/en
Publication of CN113676443A publication Critical patent/CN113676443A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

本发明实施例公开一种登录信息输入方法、登录信息保存方法及相关装置。该登录信息输入方法包括:识别出当前页面为应用程序的登录页面;识别出所述登录页面中用于输入登录信息的目标输入域;接收用户输入的生物特征信息;如果所述生物特征信息是预设生物特征信息,则从预设数据库中获取所述生物特征信息所表征的用户登录所述应用程序的登录信息;将所述登录信息填充到所述目标输入域中。上述方案可实现自动填充登录页面中的所述目标输入域,简化了用户的登录操作,并且适用范围广,不受应用程序开发平台的限制。

Figure 202110592836

Embodiments of the present invention disclose a method for inputting login information, a method for saving login information, and a related device. The login information input method includes: identifying the current page as a login page of an application; identifying a target input field for inputting login information in the login page; receiving biometric information input by a user; if the biometric information is If the biometric information is preset, the login information of the user represented by the biometric information for logging in to the application is obtained from a preset database; the login information is filled into the target input field. The above solution can automatically fill in the target input field in the login page, simplifies the user's login operation, has a wide range of applications, and is not limited by the application development platform.

Figure 202110592836

Description

Login information input method, login information storage method and related device
Technical Field
The invention relates to the field of terminal interaction, in particular to a login information input method, a login information storage method and a related device.
Background
With the rapid development of electronic technology and internet technology, a large number of applications or websites can be used only after users register and log in, and therefore, the users need to memorize a large amount of information such as accounts and passwords. In order to ensure the security of the account, many people prefer to set different passwords for different applications or websites, so that although the security is achieved, a large burden is brought to memorization.
In order to provide secure management of login information such as passwords, a number of password management tools have been developed to help users remember various online or offline accounts and passwords. The user only needs to set a key of the password box (namely, management password) to safely access the information such as the account and the password stored in the password box.
However, the conventional password management tool is poor in usability, and a user needs to input a management password to open the password box first, and then copy and paste an account and a password into an input field for inputting the account and the password in an application program, which is troublesome in operation.
In the prior art, when a website is logged in by using a browser (such as an IE browser), a user may automatically store login information by setting "save a user name and a password on a form", so that when subsequently logging in the website, a saved account and password may be automatically filled in a login page to realize fast login. However, such a fast login method is poor in compatibility, and is only applicable to an application program that implements a form management function module, and is not compatible with other application programs.
Disclosure of Invention
The embodiment of the invention provides a login information input method, a login information storage method and a related device, which can realize automatic filling of a target input domain in a login page by identifying the target input domain in the login page of an application program, simplify the login operation of a user, have wide application range and are not limited by an application program development platform.
In a first aspect, the present invention discloses a login information input method, which includes:
identifying that the current page is a login page of an application program;
identifying a target input domain for inputting login information in the login page;
receiving biological characteristic information input by a user;
if the biological characteristic information is preset biological characteristic information, obtaining login information of a user, represented by the biological characteristic information, logging in the application program from a preset database;
and filling the login information into the target input field.
With reference to the first aspect, in a first possible implementation manner, the target input field includes at least two input fields; the populating the login information into the target input field includes: analyzing attributes of each of the at least two input domains; according to the attribute of each input domain, respectively acquiring login information which is consistent with the attribute of each input domain from the login information; and filling the login information corresponding to the attribute of each input field in each input field.
With reference to the first aspect, in a second possible implementation manner, the populating the login information into the target input field includes: receiving a selection operation input by a user, wherein the selection operation is used for selecting a target input field needing to be filled with login information; analyzing the attribute of the target input domain selected by the selection operation; acquiring login information which is consistent with the attribute of the selected target input domain from the login information according to the attribute of the selected target input domain; and filling the selected target input field with login information corresponding to the attribute of the selected target input field.
With reference to the first aspect, in a third possible implementation manner, if the biometric information is preset biometric information, acquiring login information of a user, which is represented by the biometric information, logging in the application program from a preset database, includes:
the target operating system sends the biological characteristic information to a trusted execution environment;
the trusted execution environment verifies whether the biological characteristic information is the preset biological characteristic information, if so, the trusted execution environment obtains login information of the user represented by the biological characteristic information for logging in the application program from a preset database and sends the login information to the target operating system.
With reference to the first aspect, or with reference to any one of the first to third possible implementation manners of the first aspect, in a fourth possible implementation manner, the login information in the preset database is login information encrypted by using a preset encryption rule; before the populating the login information into the target input field, the method further comprises: and decrypting the login information through a decryption rule corresponding to the preset encryption rule.
With reference to the fourth possible implementation manner of the first aspect, or with reference to the first or the second possible implementation manner of the first aspect, in a fifth possible implementation manner, the identifying a target input field used for inputting login information in the login page includes:
obtaining a context corresponding to the login page; the context is used for representing the control object and the resource which are referred by the login page;
and in the context corresponding to the login page, identifying the target input domain according to the preset context for identifying the target input domain.
In a second aspect, the present invention discloses a method for saving login information, including:
identifying that the current page is a login page of an application program;
identifying a target input domain for inputting login information in the login page;
receiving login information input by a user in the target input field;
receiving biological characteristic information input by a user;
and if the biological characteristic information is preset biological characteristic information, the login information is used as login information of the user represented by the biological characteristic information for logging in the application program, and the login information is stored in a preset database.
With reference to the second aspect, in a first possible implementation manner, if the biometric information is preset biometric information, the step of taking the login information as login information of the user represented by the biometric information to login the application program, and storing the login information in a preset database includes:
the target operating system sends the biological characteristic information to a trusted execution environment;
the trusted execution environment verifies whether the biological characteristic information is the preset biological characteristic information or not, and returns a verification result to the target operating system;
if the biological characteristic information is preset biological characteristic information, the target operating system sends the login information to the trusted execution environment;
and if the biological characteristic information is preset biological characteristic information, the trusted execution environment takes the login information as login information of a user represented by the biological characteristic information for logging in the application program, and the login information is stored in a preset database.
With reference to the second aspect, or with reference to the first possible implementation manner of the second aspect, in a second possible implementation manner, before the storing the login information in the preset database, the method further includes: and encrypting the login information according to a preset encryption rule.
With reference to the second aspect, in a third possible implementation manner, the identifying a target input field for inputting login information in the login page includes:
obtaining a context corresponding to the login page; the context is used for representing the control object and the resource which are referred by the login page;
and in the context corresponding to the login page, identifying the target input domain according to the preset context for identifying the target input domain.
In a third aspect, the present invention discloses a login information input device, including:
the first identification unit is used for identifying that the current page is a login page of the application program;
the second identification unit is used for identifying a target input domain for inputting login information in the login page;
a receiving unit for receiving biometric information input by a user;
the acquisition unit is used for acquiring login information of the user represented by the biological characteristic information for logging in the application program from a preset database if the biological characteristic information is preset biological characteristic information;
and the filling unit is used for filling the login information into the target input field.
With reference to the third aspect, in a first possible implementation manner, the target input field includes at least two input fields; the filling unit is specifically configured to: analyzing attributes of each of the at least two input domains; according to the attribute of each input domain, respectively acquiring login information which is consistent with the attribute of each input domain from the login information; and filling the login information corresponding to the attribute of each input field in each input field.
With reference to the third aspect, in a second possible implementation manner, the filling unit is specifically configured to: receiving a selection operation input by a user, wherein the selection operation is used for selecting a target input field needing to be filled with login information; analyzing the attribute of the target input domain selected by the selection operation; acquiring login information which is consistent with the attribute of the selected target input domain from the login information according to the attribute of the selected target input domain; and filling the selected target input field with login information corresponding to the attribute of the selected target input field.
With reference to the third aspect, in a third possible implementation manner, the obtaining unit is specifically configured to:
sending the biometric information to a trusted execution environment through a target operating system;
and verifying whether the biological characteristic information is the preset biological characteristic information or not through the trusted execution environment, if so, acquiring login information of the user represented by the biological characteristic information logging in the application program from a preset database through the trusted execution environment, and sending the login information to the target operating system.
With reference to the third aspect, or with reference to any one of the first to third possible implementation manners of the third aspect, in a fourth possible implementation manner, the login information in the preset database is login information encrypted by using a preset encryption rule; the device further comprises: and the decryption unit is used for decrypting the login information through a decryption rule corresponding to the preset encryption rule before the filling unit fills the login information into the target input domain.
With reference to the third aspect, or with reference to the first or second possible implementation manner of the third aspect, in a fifth possible implementation manner, the second identifying unit is specifically configured to: obtaining a context corresponding to the login page; the context is used for representing the control object and the resource which are referred by the login page; and in the context corresponding to the login page, identifying the target input domain according to the preset context for identifying the target input domain.
In a fourth aspect, the present invention discloses a login information saving apparatus, including:
the first identification unit is used for identifying that the current page is a login page of the application program;
the second identification unit is used for identifying a target input domain for inputting login information in the login page;
a first receiving unit, configured to receive login information input by a user in the target input field;
a second receiving unit for receiving the biometric information input by the user;
and the storage unit is used for taking the login information as login information of the user represented by the biological characteristic information for logging in the application program if the biological characteristic information is preset biological characteristic information, and storing the login information in a preset database.
With reference to the fourth aspect, in a first possible implementation manner, the saving unit is specifically configured to:
sending the biometric information to a trusted execution environment through a target operating system;
verifying whether the biological characteristic information is the preset biological characteristic information or not through the trusted execution environment, and returning a verification result to the target operating system;
if the biological characteristic information is preset biological characteristic information, the login information is sent to the trusted execution environment through the target operating system;
and if the biological characteristic information is preset biological characteristic information, the login information is used as login information of a user represented by the biological characteristic information for logging in the application program through the trusted execution environment, and the login information is stored in a preset database.
With reference to the fourth aspect, or with reference to the first possible implementation manner of the fourth aspect, the apparatus further includes: and the encryption unit is used for encrypting the login information according to a preset encryption rule before the storage unit stores the login information in a preset database.
With reference to the fourth aspect, in a third possible implementation manner, the second identifying unit is specifically configured to: obtaining a context corresponding to the login page; the context is used for representing the control object and the resource which are referred by the login page; and in the context corresponding to the login page, identifying the target input domain according to the preset context for identifying the target input domain.
In a fifth aspect, the present invention discloses a terminal, configured to implement the method in the first aspect, where the method includes: an input device, an output device, a memory, and a processor coupled with the memory, wherein:
the processor reads instructions stored in the memory for performing the steps of:
identifying that a current page displayed in the output device is a login page of an application program;
identifying a target input domain for inputting login information in the login page;
receiving biometric information input by a user through the input device;
if the biological characteristic information is preset biological characteristic information, obtaining login information of a user, represented by the biological characteristic information, logging in the application program from a preset database;
and filling the login information into the target input field.
With reference to the fifth aspect, in a first possible implementation manner, the target input field includes at least two input fields; the step of populating the login information into the target input field includes:
analyzing, by the processor, attributes of each of the at least two input domains;
the processor respectively acquires login information which is consistent with the attribute of each input domain from the login information according to the attribute of each input domain;
and the processor fills the login information which is consistent with the attribute of each input field in each input field.
With reference to the fifth aspect, in a second possible implementation manner, the step of populating the login information into the target input field includes:
the processor receives a selection operation input by a user through the input device, wherein the selection operation is used for selecting a target input field needing to be filled with login information; analyzing the attribute of the target input domain selected by the selection operation; acquiring login information which is consistent with the attribute of the selected target input domain from the login information according to the attribute of the selected target input domain; and filling the selected target input field with login information corresponding to the attribute of the selected target input field.
With reference to the fifth aspect, in a third possible implementation manner, if the biometric information is preset biometric information, the step of obtaining login information of the user, which is characterized by the biometric information, logging in the application program from a preset database includes:
the processor sends the biometric information to a trusted execution environment through a target operating system;
the processor verifies whether the biological characteristic information is the preset biological characteristic information through the trusted execution environment, if the biological characteristic information is the preset biological characteristic information, login information of a user, represented by the biological characteristic information, logging in the application program is obtained from a preset database through the trusted execution environment, and the login information is sent to the target operating system through the trusted execution environment.
With reference to the fifth aspect, or with reference to any one of the first to third possible implementation manners of the fifth aspect, in a fourth possible implementation manner, the login information in the preset database is login information encrypted by using a preset encryption rule; the processor is further configured to: and before the login information is filled into the target input domain, decrypting the login information through a decryption rule corresponding to the preset encryption rule.
With reference to the fifth aspect, or with reference to any one of the first or second possible implementation manners of the fifth aspect, in a fifth possible implementation manner, the identifying a target input field for inputting login information in the login page includes:
the processor acquires a context corresponding to the login page; the context is used for representing the control object and the resource which are referred by the login page;
and the processor identifies the target input domain according to a preset context for identifying the target input domain in the context corresponding to the login page.
In a sixth aspect, the present invention discloses a terminal, configured to implement the method in the second aspect, including: an input device, an output device, a memory, and a processor coupled with the memory, wherein:
the processor reads instructions stored in the memory for performing the steps of:
identifying that a current page displayed in the output device is a login page of an application program;
identifying a target input domain for inputting login information in the login page;
receiving login information input by a user in the target input field through the input device;
receiving biometric information input by a user through the input device;
and if the biological characteristic information is preset biological characteristic information, the login information is used as login information of the user represented by the biological characteristic information for logging in the application program, and the login information is stored in a preset database.
With reference to the sixth aspect, in a first possible implementation manner, if the biometric information is preset biometric information, the step of using the login information as login information of the user represented by the biometric information to login the application program, and saving the login information in a preset database includes:
the processor sends the biometric information to a trusted execution environment through a target operating system;
the processor verifies whether the biological characteristic information is the preset biological characteristic information through the trusted execution environment and returns a verification result to the target operating system;
if the biological characteristic information is preset biological characteristic information, the processor sends the login information to the trusted execution environment through the target operating system;
and if the biological characteristic information is preset biological characteristic information, the processor takes the login information as login information of a user represented by the biological characteristic information to log in the application program through the trusted execution environment, and stores the login information in a preset database.
With reference to the sixth aspect, or the first possible implementation manner of the sixth aspect, in a second possible implementation manner, the processor is further configured to: and before storing the login information in a preset database, encrypting the login information according to a preset encryption rule.
With reference to the sixth aspect, in a third possible implementation manner, the identifying a target input field for inputting login information in the login page includes:
obtaining a context corresponding to the login page; the context is used for representing the control object and the resource which are referred by the login page;
and in the context corresponding to the login page, identifying the target input domain according to the preset context for identifying the target input domain.
By implementing the embodiment of the invention, the target input domain used for inputting the login information in the login page of the application program is identified, the biological characteristic information input by the user is verified, if the biological characteristic information is verified, the login information of the user for logging in the application program is acquired from the preset database, and the login information is filled in the target input domain, so that the target input domain in the login page can be automatically filled, the login operation of the user is simplified, the application range is wide, and the application range is not limited by an application program development platform.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the description of the embodiments will be briefly introduced below.
Fig. 1 is a schematic flowchart of a login information saving method according to an embodiment of the present invention;
FIG. 2A is an exemplary landing page of an application provided by an embodiment of the present invention;
FIG. 2B is an exemplary interface for saving login information according to an embodiment of the present invention;
FIG. 2C is an exemplary interface for identity verification to store login information according to an embodiment of the present invention;
fig. 3A is a schematic diagram of a login information encryption process according to an embodiment of the present invention;
fig. 3B is a schematic diagram of a generation process of an encryption key according to an embodiment of the present invention;
fig. 3C is a schematic diagram of another login information encryption process provided by the embodiment of the present invention;
FIG. 3D is a diagram illustrating a generation process of a verification code according to an embodiment of the present invention;
fig. 4 is a schematic flowchart of a login information input method according to an embodiment of the present invention;
FIG. 5A is an exemplary interface for entry of login information provided by embodiments of the present invention;
FIG. 5B is an exemplary interface for authentication of login information according to an embodiment of the present invention;
FIG. 6A is a diagram illustrating a decryption process for login information according to an embodiment of the present invention;
fig. 6B is a schematic diagram of a decryption key generation process according to an embodiment of the present invention;
FIG. 6C is a diagram illustrating another decryption process for login information according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a login information holding apparatus according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a login information input device according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a terminal for implementing a login information saving method according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a terminal for implementing a login information input method according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly described below with reference to the drawings in the embodiments of the present invention. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention can be realized by a mobile terminal, and can also be realized by computing equipment such as a personal computer, network equipment and the like. The following description will be given taking a mobile terminal as an example.
Preferably, the solution of the present invention can be implemented by an APP installed and running in a mobile terminal. Specifically, the scheme of the present invention can be implemented by an APP running in the background all the time. Furthermore, the scheme of the invention can be integrated in an APP running in the background all the time as a functional module.
Here, the mobile terminal includes, but is not limited to, any handheld electronic product based on a smart operating system, which can perform human-computer interaction with a user through an input device such as a keyboard, a virtual keyboard, a touch pad, a touch screen, and a voice control device, such as a smart phone, a tablet computer, and the like. The smart operating system includes, but is not limited to, any operating system that enriches device functionality by providing various mobile applications to the mobile device, such as Android (Android), IOS, Windows Phone, etc.
Referring to fig. 1, fig. 1 is a schematic flowchart of a method for saving login information according to an embodiment of the present invention. In the login information saving method shown in fig. 1, the mobile terminal identifies a target input field for inputting login information in a login page of an application program, and if the biometric information input by the user passes verification, the login information input in the target input field is used as the login information of the user for logging in the application program and is saved in a preset database, so that the login information input by the user on the login page can be automatically saved in the preset data, and support is provided for a login information input method described later in the invention. As shown in fig. 1, the method includes:
s101, identifying that the current page is a login page of the application program.
S103, identifying a target input domain for inputting login information in the login page.
And S105, receiving login information input by the user in the target input domain.
And S107, receiving the biological characteristic information input by the user.
And S109, if the biological characteristic information is preset biological characteristic information, using the login information as login information of the user represented by the biological characteristic information to login the application program, and storing the login information in a preset database.
Specifically, the application program related to the embodiment of the present invention refers to an application program currently opened by a user, and may be a Web application (Web App), a Hybrid App (Hybrid App), or a Native App (Native App). The login page related to the embodiment of the invention refers to a page provided by the application program for the user to input login information. The login information related to the embodiment of the invention refers to information required by the user to login the application program, specifically, a user name, a password and the like.
In a specific implementation, the mobile terminal may identify the application program to which the current page belongs according to the interface element included in the current page. For example, the application program to which the current page belongs is identified according to information such as characters, pictures or trademarks in a title bar of the current page. In practical applications, the mobile terminal may further identify the application program to which the current page belongs according to other information, for example, a prompt in a pop-up window, which is not limited herein.
Further, the mobile terminal needs to identify whether the current page is the login page.
In one implementation, the mobile terminal may analyze whether the current page is the login page according to interface elements included in the current page. For example, if the current page contains a "login" control for triggering a login request, the mobile terminal may determine that the current page is the login page.
In another implementation manner, the terminal may determine whether the target input domain exists in the current page, and if the target input domain exists, determine that the current page is the login page.
In the embodiment of the invention, the terminal can obtain the context corresponding to the login page and identify the target input domain according to the context.
The context is used to characterize the control objects and resources referenced by the landing page. For example, in Android, an interface Context (Activity Context) is created when an application interface (Activity) is started, mainly to save references to current interface controls and resources.
Here, control objects include, but are not limited to: input type controls for receiving user input, such as buttons (Button), text input boxes (e.g., EditText in Android), etc., and output type controls for displaying information to the user, such as labels (Label), text display boxes (e.g., TextView in Android), etc. Here, resources include, but are not limited to: and displaying resources such as characters and pictures in the output type control.
In a specific implementation, the mobile terminal may first identify an input field for inputting text information in a current page according to the control type. For example, as shown in fig. 2A, the mobile terminal may recognize a control object in the login page 301, in which the control type is a text input box, as an input field, including: input field 302, input field 304, and input field 306.
It should be noted that the login information according to the embodiment of the present invention does not include dynamic information such as a dynamic authentication code that is temporarily generated to prevent malicious login. Accordingly, the target input field does not include an input field for inputting temporary login information such as a dynamic authentication code.
In a specific implementation, the mobile terminal may preset a context for identifying the target input domain, and identify the target input domain according to the preset context for identifying the target input domain in the context corresponding to the login page. The context corresponding to the target input field may include: the target input field comprises adjacent controls on the page layout and resources referenced by the adjacent controls.
For example, the adjacent control of the user name field is preset as a text display box, and the text resources referred by the adjacent control comprise: a user name, an account number, a mailbox and other character strings. Then, the mobile terminal may recognize an input field after the text display box in fig. 2A, in which the contents are displayed as a "user name", as a user name field.
It should be noted that the context corresponding to the target input field may also be customized by the user. For example, third party software needs to log in with an identification number. Then, the third party may use the text display box displaying the content as "identification number" as the adjacent control of the username domain.
The example is only one implementation manner of the embodiment of the present invention, and may be different in practical applications, and should not be construed as a limitation.
Further, the mobile terminal may analyze the attribute of the target input domain according to the context corresponding to the target input domain. Here, the attribute of the target input field may be used to indicate a type of information received by the target input field.
For example, in FIG. 2A, the adjacent control of input field 302 is a text display box displaying "username" and the adjacent control of input field 304 is a text display box displaying "password". Then, the mobile terminal may decide: the input field 302 is a username field for receiving a username; the input field 304 is a password field for receiving a password. The example is only one implementation manner of the embodiment of the present invention, and may be different in practical application, and should not be construed as a limitation.
It can be understood that the target input domain is identified by analyzing the context of the login page in the embodiment of the invention, the method is not limited by a development platform of an application program, and has wide application range and good compatibility.
In a specific implementation, after the target input domain in the login page is identified, the mobile terminal may monitor the target input domain, determine whether information is input in the target input domain, and if information is input, store the login information input in the target input domain in a preset database for secure storage.
For example, as shown in fig. 2B, when detecting that there is an information input in the target input field, the mobile terminal may pop up a prompt box on the login page to prompt the user to save the login information input in the target input field.
In the embodiment of the invention, the preset database is used for safely storing the login information of the user. Before the user accesses the preset database, the mobile terminal needs to perform identity authentication on the user, and the user who passes the authentication can: writing information into the preset database, or changing the information in the preset database, or reading the information in the preset database.
In a specific implementation, before storing the login information input in the target input domain in the preset database, the mobile terminal may receive biometric information input by a user, and if the biometric information is preset biometric information, the login information input in the target input domain is used as login information of the user, represented by the biometric information, for logging in the application program, and the login information is stored in the preset database.
For example, as shown in fig. 2C, the mobile terminal may verify the user identity by scanning the user's fingerprint. The example is only one implementation manner of the embodiment of the present invention, and in practical applications, the mobile terminal may also verify the identity of the user by verifying biometric information input by the user through face recognition, iris recognition, voice feature recognition, and the like, which is not limited herein. Of course, in addition to verifying the biometric information, the mobile terminal may also verify the user identity through other verification methods, such as password verification, and the embodiments of the present invention are not limited thereto.
In the embodiment of the present invention, the preset database may be as shown in table 1, and is only used for storing login information of a single legal user:
Figure BDA0003089848960000131
TABLE 1
The preset database shown in table 1 stores login information of the single legitimate user login "application 1" and "application 2". The user has 2 login information (i.e. 2 login accounts) for logging in the application program 2, which are respectively: login information B and login information C.
In the embodiment of the present invention, the preset database may also be used to store login information of a plurality of valid users as shown in table 2:
Figure BDA0003089848960000141
TABLE 2
The preset database shown in table 2 stores legitimate users: "user 1" and "user 2" log in the login information of "application 1" and "application 2". Wherein, the "user 1" corresponds to login information of 2 login "application programs 2", which are respectively: login information B and login information C; "user 2" corresponds to login information for 2 login "application 1", which are: login information D and login information E.
It should be noted that the single legal user may correspond to one (or more) preset biometric information. Each user of the plurality of valid users may also correspond to one (or more) preset biometric information. Namely: one (or more) predetermined biometric information may be used to characterize a legitimate user.
In practice, the user may set the preset biometric information (e.g., fingerprint) when using (or enrolling) the scheme of the present invention for the first time.
It should be noted that the preset databases shown in table 1 and table 2 are only one implementation manner of the embodiment of the present invention, and may be different in practical application, and should not be limited. The data storage form of the preset database may include, but is not limited to: databases, files, tables, and the like.
In the embodiment of the present invention, in order to enhance the security of the preset database, when saving the login information input in the target input field, the mobile terminal may encrypt the login information according to a preset encryption rule, and save the encrypted login information in the database.
The encryption process of the login information according to the embodiment of the present invention may be as shown in fig. 3A, where the mobile terminal encrypts the login information through a symmetric encryption algorithm (e.g., AES 256). Wherein, the encryption key may be a preset encryption key.
In the embodiment of the present invention, the mobile terminal may set the management password of the preset database, where the management password is used to generate the encryption and decryption keys of the symmetric encryption algorithm, that is, the encryption and decryption keys of the symmetric encryption algorithm do not need to be stored, and only the management password needs to be stored. In a specific implementation, the mobile terminal may store the management password in a Trusted Execution Environment (TEE) corresponding to preset biometric information, where the preset biometric information may be a credential for obtaining the management password.
In practice, the user may set the management password when using (or registering) the scheme of the present invention for the first time.
As shown in fig. 3B, the mobile terminal may generate an encryption key from the management password through a salt adding algorithm, so as to increase encryption complexity and improve security.
Preferably, an encryption process of login information according to an embodiment of the present invention may be as shown in fig. 3C, where the encryption process includes:
A. after the biometric information (such as a fingerprint) is verified, taking the management password from the TEE;
B. generating the taken out management password into data to be verified through a salt adding algorithm, wherein a salt value 2 can be preset;
C. comparing whether the data to be verified is consistent with the verification code, if so, indicating that the taken out management password is correct, and executing step D; the generation process of the verification code can be as shown in fig. 3D;
D. generating an encryption key by a salt adding algorithm by using the management password, wherein a salt value 1 can be preset;
E. the login information is encrypted by a symmetric encryption algorithm (such as AES256) using the encryption key to generate encrypted login information.
As can be seen from the encryption process shown in fig. 3C, after the management password is taken out from the TEE, the mobile terminal may verify whether the taken out management password is correct, and if so, the encryption key is generated by using the taken out management password to encrypt the login information, so that the correctness and the security of the encryption can be ensured, and a basis is provided for subsequently decrypting the login information.
It should be noted that, in practical applications, other encryption algorithms, such as an asymmetric encryption algorithm, may also be used in the encryption process of the login information according to the embodiment of the present invention, which is not limited herein.
In order to further enhance the security of the scheme of the present invention, it may be preferable that the steps related to user authentication and login information saving are performed by a Trusted Execution Environment (TEE), and the steps related to input and output of human-computer interaction (such as S101 to S107 described above) are performed by a target operating system. The trusted execution environment and a target operating system communicate with each other. The target operating system may typically be an open operating system.
Specifically, the specific implementation manner of S109 may include:
the target operating system may send the biometric information received in S107 above to a trusted execution environment;
the trusted execution environment verifies whether the biological characteristic information is the preset biological characteristic information or not, and returns a verification result to the target operating system;
if the biological characteristic information is preset biological characteristic information, the target operating system sends the login information to the trusted execution environment;
and if the biological characteristic information is preset biological characteristic information, the trusted execution environment takes the login information as login information of a user represented by the biological characteristic information for logging in the application program, and the login information is stored in a preset database.
The steps related to the scheme of the invention are respectively executed by the trusted execution environment and the target operating system, so that the steps of user identity authentication and login information storage caused by malicious attack on the target operating system can be prevented from being maliciously tampered, and the safety of the scheme of the invention can be enhanced.
By implementing the embodiment of the invention, the mobile terminal can identify the target input domain for inputting the login information in the login page of the application program and verify the biological characteristic information input by the user, if the biological characteristic information passes the verification, the login information input in the target input domain is used as the login information of the user for logging in the application program and is stored in the preset database, so that the login information input by the user on the login page can be automatically stored, and support is provided for the login information input method described later in the invention.
Referring to fig. 4, fig. 4 is a schematic flowchart of a login information input method according to an embodiment of the present invention. In the login information input method shown in fig. 4, the mobile terminal identifies a target input field for inputting login information in a login page of an application program, and if the biometric information input by the user passes verification, the login information of the user logging in the application program is acquired from a preset database, and the login information is filled in the target input field, so that the target input field in the login page can be automatically filled, and the login operation of the user is simplified. As shown in fig. 4, the method includes:
s401, identifying that the current page is a login page of the application program.
S403, identifying a target input domain for inputting login information in the login page.
S405, receiving the biological feature information input by the user.
S407, if the biological characteristic information is preset biological characteristic information, obtaining login information of the user represented by the biological characteristic information for logging in the application program from a preset database.
S409, filling the login information into the target input domain.
Specifically, S401 and S403 may refer to relevant contents in the embodiment of fig. 1, which is not described herein again. That is, the mobile terminal may recognize the target input field in the login page through S401 and S403, and further analyze the attribute of the target input field.
In a specific implementation, as shown in fig. 5A, after the user opens the login page of the application program, the mobile terminal may query the preset database, determine whether login information of the application program exists in the preset database, and if so, pop up a prompt box on the login page to prompt the user to fill the target input field.
In the embodiment of the invention, the preset database is used for safely storing the login information of the user. Before the user accesses the preset database, the mobile terminal needs to perform identity authentication on the user, and the user who passes the authentication can: writing information into the preset database, or changing the information in the preset database, or reading the information in the preset database.
In a specific implementation, before obtaining login information of a user logging in the application program from the preset database, the mobile terminal may receive biometric information input by the user, and if the biometric information is preset biometric information, obtain login information of the user logging in the application program, which is represented by the biometric information, from the preset database, and fill the obtained login information in the target input domain.
For example, as shown in fig. 5B, the mobile terminal may verify the user identity by scanning the user's fingerprint. The example is only one implementation manner of the embodiment of the present invention, and in practical applications, the mobile terminal may also verify the identity of the user by verifying biometric information input by the user through face recognition, iris recognition, voice feature recognition, and the like, which is not limited herein. Of course, in addition to verifying the biometric information, the mobile terminal may also verify the user identity through other verification methods, such as password verification, and the embodiments of the present invention are not limited thereto.
In the embodiment of the present invention, the preset database may be only used to store login information of a single legal user, as shown in table 1 in the embodiment of fig. 1. In this embodiment of the present invention, the preset database may also be used to store login information of a plurality of valid users, as shown in table 2 in the embodiment of fig. 1.
It should be noted that the single legal user may correspond to one (or more) preset biometric information. Each user of the plurality of valid users may also correspond to one (or more) preset biometric information. Namely: one (or more) predetermined biometric information may be used to characterize a legitimate user.
In practice, the user may set the preset biometric information (e.g., fingerprint) when using (or enrolling) the scheme of the present invention for the first time.
In an embodiment of the present invention, the target input field may include at least two input fields, such as a username field and a password field. When the at least two input fields are filled, the mobile terminal may obtain, from the login information, login information that conforms to the attribute of each input field according to the attribute of each input field of the at least two input fields, and fill, in each input field, login information that conforms to the attribute of each input field.
Referring to the contents of the embodiment of fig. 1, the attribute of the target input field may be used to indicate the type of information received by the target input field. That is, the username domain is used to receive a username and the password domain is used to receive a password.
The filling of the target input field is described in detail below by taking the username field and the password field as examples:
if both the username domain and password domain are blank. Then, the mobile terminal may obtain, according to the identifier of the application program and the identifier of the user represented by the biometric information, a user name and a password of the user logging in the application program from the preset database, fill the user name into a blank user name field, and fill the password into a blank password field.
It should be noted that, if one user corresponds to multiple login information sets, that is, one user has multiple login accounts (for example, "user 1" in the foregoing table 2 corresponds to login information for 2 login "application 2"), the mobile terminal may preferably pop up a selection interface when filling the target input field, so that the user selects one account from the multiple login accounts to log in.
If the username field is not blank, the password field is blank. Then, the mobile terminal may obtain, from the preset database, a password for the user to log in the application program through the user name according to the identifier of the application program, the identifier of the user represented by the biometric information, and the user name input in the user name field, and fill the password in the blank password field.
Optionally, in this embodiment of the present invention, the mobile terminal may selectively fill the target input field according to a selection operation of the user.
Specifically, the mobile terminal may receive a selection operation input by a user, obtain login information that matches the attribute of the selected target input field from the login information (i.e., login information of the application program logged in by the user represented by the biometric information received in S405) according to the attribute of the target input field selected by the selection operation, and fill the selected target input field with login information that matches the attribute of the selected target input field.
For example, the user may select a target input field to fill in at the landing page by a single finger touch. Preferably, the mobile terminal may perform the above S405 while receiving the single-finger touch selection of the user. That is, the mobile terminal may acquire the fingerprint information of the user while receiving a selection operation (touch operation) of the user. Therefore, the operation times of the user can be reduced, and the user experience is improved.
It should be noted that, the user may select the target input field to be filled by using one finger on the login page, and input the fingerprint information by using another finger. In practical applications, the user may also select the target input field to be filled by other means, such as pressing the target input field for a long time, which is not limited herein.
Referring to the embodiment of fig. 1, in order to enhance the security of the preset database, the login information in the preset database may be login information encrypted by a preset encryption rule. Accordingly, the mobile terminal needs to decrypt the login information obtained in S407. The decryption rule may be a preset decryption rule corresponding to the preset encryption rule.
If the encryption process of the login information is as shown in fig. 3A, the mobile terminal may similarly decrypt the encrypted login information through a symmetric encryption algorithm as shown in fig. 6A. Wherein the decryption key is the same as the encryption key.
As can be seen from the content of the embodiment in fig. 1, the mobile terminal may set a management password of the preset database, where the management password is used to generate the encryption and decryption keys of the symmetric encryption algorithm, that is, the encryption and decryption keys of the symmetric encryption algorithm do not need to be stored, and only the management password needs to be stored. In a specific implementation, the mobile terminal may store the management password and preset biometric information in a Trusted Execution Environment (TEE) in a corresponding manner, where the preset biometric information may be a credential for obtaining the management password.
In practice, the user may set the management password when using (or registering) the scheme of the present invention for the first time.
If the generation process of the encryption key is as shown in fig. 3B, then in order to maintain the consistency of the encryption and decryption keys, the mobile terminal may likewise generate the decryption key using the management password as shown in fig. 6B.
If the encryption process of the login information is as shown in fig. 3C, then, correspondingly, the decryption process of the encrypted login information may be as shown in fig. 6C, including:
A. after the biometric information (such as a fingerprint) is verified, taking the management password from the TEE;
B. generating the taken out management password into data to be verified through a salt adding algorithm, wherein a salt value 2 can be preset;
C. comparing whether the data to be verified is consistent with the verification code, if so, indicating that the taken out management password is correct, and executing step D; the generation process of the verification code may be as shown in fig. 3D;
D. generating a decryption key by a salt adding algorithm by using the management password, wherein a salt value 1 can be preset;
E. and D, decrypting the encrypted login information by using a decryption key generated by D through a symmetric encryption algorithm (such as AES256) to obtain the original login information.
As can be seen from the decryption process shown in fig. 6C, after the management password is taken out from the TEE, the mobile terminal needs to verify whether the taken out management password is correct, and if the management password is correct, the mobile terminal generates the decryption key by using the taken out management password to decrypt the login information, so that the correctness and the security of the whole encryption and decryption process can be ensured.
It should be noted that the decryption rule of the encrypted login information may also be other decryption rules corresponding to the encryption rule of the login information, such as a decryption process agreed by an asymmetric encryption algorithm, which is not limited herein.
In order to further enhance the security of the scheme of the present invention, it may be preferable that the steps related to user authentication and login information acquisition are performed by a Trusted Execution Environment (TEE), and the steps related to input and output of human-computer interaction (such as S401 to S405, S409) are performed by a target operating system. The trusted execution environment and a target operating system communicate with each other. The target operating system may typically be an open operating system.
Specifically, the specific implementation manner of S407 may include:
the target operating system sends the biometric information received in the above S405 to a trusted execution environment;
the trusted execution environment verifies whether the biological characteristic information is the preset biological characteristic information, if so, the trusted execution environment obtains login information of the user represented by the biological characteristic information for logging in the application program from a preset database and sends the login information to the target operating system. Correspondingly, the target operating system acquires the login information sent by the trusted execution environment.
The steps related to the scheme of the invention are respectively executed by the trusted execution environment and the target operating system, so that the steps of user identity authentication and login information acquisition caused by malicious attack on the target operating system can be prevented from being maliciously tampered, and the safety of the scheme of the invention can be enhanced.
By implementing the embodiment of the invention, the mobile terminal can identify the target input domain for inputting the login information in the login page of the application program and verify the biological characteristic information input by the user, if the biological characteristic information passes the verification, the login information of the user for logging in the application program is obtained from the preset database, and the login information is filled in the target input domain, so that the target input domain in the login page can be automatically filled, the login operation of the user is simplified, the application range is wide, and the application range is not limited by an application program development platform.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a login information storage apparatus according to an embodiment of the present invention. As shown in fig. 7, the login information holding means 70 may include: first identifying section 701, second identifying section 703, first receiving section 705, second receiving section 707, and holding section 709. Wherein:
a first identifying unit 701, configured to identify that a current page is a login page of an application;
a second identifying unit 703, configured to identify a target input field for inputting login information in the login page;
a first receiving unit 705, configured to receive login information input by a user in the target input field;
a second receiving unit 707 for receiving biometric information input by a user;
a saving unit 709, configured to take the login information as login information of the user represented by the biometric information to log in the application, and save the login information in a preset database.
Specifically, the application program related to the embodiment of the present invention refers to an application program currently opened by a user, and may be a Web application (Web App), a Hybrid App (Hybrid App), or a Native App (Native App). The login page related to the embodiment of the invention refers to a page provided by the application program for the user to input login information. The login information related to the embodiment of the invention refers to information required by the user to login the application program, specifically, a user name, a password and the like.
In a specific implementation, the login information saving device 70 may identify the application program to which the current page belongs according to the interface element included in the current page. For example, the application program to which the current page belongs is identified according to information such as characters, pictures or trademarks in a title bar of the current page. In practical applications, the login information storage device 70 may also identify the application program to which the current page belongs according to other information, such as a prompt in a pop-up window, which is not limited herein.
Further, the first identifying unit 701 needs to identify whether the current page is the login page.
In one implementation manner, the first identifying unit 701 may analyze whether the current page is the login page according to interface elements included in the current page. For example, if the current page contains a "login" control for triggering a login request, the first identifying unit 701 may determine that the current page is the login page.
In another implementation manner, the first identifying unit 701 may determine whether the target input field exists in the current page, and if the target input field exists, determine that the current page is the login page.
In this embodiment of the present invention, the second identifying unit 703 may obtain a context corresponding to the login page, and identify the target input domain according to the context.
The context is used to characterize the control objects and resources referenced by the landing page. . For example, in Android, an interface Context (Activity Context) is created when an application interface (Activity) is started, mainly to save references to current interface controls and resources.
Here, control objects include, but are not limited to: input type controls for receiving user input, such as buttons (Button), text input boxes (e.g., EditText in Android), etc., and output type controls for displaying information to the user, such as labels (Label), text display boxes (e.g., TextView in Android), etc. Here, resources include, but are not limited to: and displaying resources such as characters and pictures in the output type control.
In a specific implementation, the second identifying unit 703 may preset a context for identifying the target input field, and identify the target input field according to a preset context for identifying the target input field in the context corresponding to the login page. The context corresponding to the target input field may include: the target input field comprises adjacent controls on the page layout and resources referenced by the adjacent controls.
In the embodiment of the invention, the preset database is used for safely storing the login information of the user. Before the user accesses the preset database, the user needs to be authenticated, and the authenticated user can: writing information into the preset database, or changing the information in the preset database, or reading the information in the preset database.
In a specific implementation, before the saving unit 709 saves the login information input in the target input field in the preset database, the second receiving unit 707 may receive the biometric information input by the user, and if the biometric information is preset biometric information, the saving unit 709 saves the login information input in the target input field in the preset database as the login information of the user logged in the application program represented by the biometric information.
It should be noted that one (or more) predetermined biometric information may be used to characterize a legitimate user.
In practice, the user may set the preset biometric information (e.g., fingerprint) when using (or enrolling) the scheme of the present invention for the first time.
In the embodiment of the present invention, in order to enhance the security of the preset database, when saving the login information input in the target input field, the login information saving device 70 needs to encrypt the login information.
Further, the login information holding means 70 includes: the first identifying unit 701, the second identifying unit 703, the first receiving unit 705, the second receiving unit 707, and the storing unit 709 may further include: an encrypting unit, configured to encrypt the login information according to a preset encryption rule before the storing unit 709 stores the login information in a preset database.
Further, to further enhance the security of the present solution, the saving unit 709 may preferably perform steps related to user authentication and login information saving through a Trusted Execution Environment (TEE). The trusted execution environment and a target operating system communicate with each other. The target operating system may typically be an open operating system.
In a specific implementation, the saving unit 709 may be specifically configured to:
sending, by the target operating system, the biometric information to a trusted execution environment;
verifying whether the biological characteristic information is the preset biological characteristic information or not through the trusted execution environment, and returning a verification result to the target operating system;
if the biological characteristic information is preset biological characteristic information, the login information is sent to the trusted execution environment through the target operating system;
and if the biological characteristic information is preset biological characteristic information, the login information is used as login information of a user represented by the biological characteristic information for logging in the application program through the trusted execution environment, and the login information is stored in a preset database.
The storing unit 709 executes the relevant steps of the scheme of the present invention through the trusted execution environment and the target operating system, so as to avoid the step of user authentication and login information storage from being maliciously tampered due to the target operating system being maliciously attacked, and enhance the security of the scheme of the present invention.
It is understood that the specific implementation of each functional module of the login information saving device 70 may also refer to the method in the embodiment of fig. 1, and is not described herein again.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a login information input device according to an embodiment of the present invention. As shown in fig. 8, the login information input means 80 may include: a first recognition unit 801, a second recognition unit 803, a receiving unit 805, an obtaining unit 807 and a padding unit 809. Wherein:
a first identifying unit 801, configured to identify that a current page is a login page of an application;
a second identifying unit 803, configured to identify a target input field for inputting login information in the login page;
a receiving unit 805 for receiving biometric information input by a user;
an obtaining unit 807 configured to obtain login information of the user represented by the biometric information logging in the application program from a preset database if the biometric information is preset biometric information;
a filling unit 809 for filling the login information into the target input field.
Specifically, the first identifying unit 801 needs to identify whether the current page is the login page.
In one implementation, the first identifying unit 801 may analyze whether the current page is the login page according to interface elements included in the current page. For example, if the current page contains a "login" control for triggering a login request, the first identifying unit 801 may determine that the current page is the login page.
In another implementation manner, the first identifying unit 801 may determine whether the target input field exists in the current page, and if the target input field exists in the current page, determine that the current page is the login page.
In this embodiment of the present invention, the second identifying unit 803 may obtain a context corresponding to the login page, and identify the target input domain according to the context.
The context is used to characterize the control objects and resources referenced by the landing page. Here, control objects include, but are not limited to: input type controls for receiving user input, such as buttons (Button), text input boxes (e.g., EditText in Android), etc., and output type controls for displaying information to the user, such as labels (Label), text display boxes (e.g., TextView in Android), etc. Here, resources include, but are not limited to: and displaying resources such as characters and pictures in the output type control.
In a specific implementation, the second identifying unit 803 may preset a context for identifying the target input domain, and identify the target input domain according to a preset context for identifying the target input domain in the context corresponding to the login page. The context corresponding to the target input field may include: the target input field comprises adjacent controls on the page layout and resources referenced by the adjacent controls.
In the embodiment of the invention, the preset database is used for safely storing the login information of the user. Before the user accesses the preset database, the user needs to be authenticated, and the authenticated user can: writing information into the preset database, or changing the information in the preset database, or reading the information in the preset database.
In a specific implementation, before the obtaining unit 807 obtains the login information of the user logging in the application program from the preset database, the receiving unit 805 may receive the biometric information input by the user, if the biometric information is preset biometric information, the obtaining unit 807 obtains the login information of the user logging in the application program, which is characterized by the biometric information, from the preset database, and then the filling unit 809 fills the obtained login information into the target input field.
It should be noted that one (or more) predetermined biometric information may be used to characterize a legitimate user.
In practice, the user may set the preset biometric information (e.g., fingerprint) when using (or enrolling) the scheme of the present invention for the first time.
In an embodiment of the present invention, the target input field may include at least two input fields, such as a username field and a password field. When the filling unit 809 fills the at least two input fields, the obtaining unit 807 may obtain, from the login information, login information that conforms to the attribute of each of the at least two input fields, respectively, according to the attribute of each of the at least two input fields, and trigger the filling unit 809 to fill the login information that conforms to the attribute of each of the input fields in each of the input fields.
Optionally, in this embodiment of the present invention, the filling unit 809 may selectively fill the target input field according to a selection operation of a user.
Specifically, the filling unit 809 may receive a selection operation input by a user, obtain login information corresponding to the attribute of the selected target input field from the login information according to the attribute of the target input field selected by the selection operation, and fill login information corresponding to the attribute of the selected target input field in the selected target input field.
In order to enhance the security of the preset database, the login information in the preset database may be login information encrypted by a preset encryption rule.
Accordingly, the login information input device 80 needs to decrypt the login information obtained by the obtaining unit 807.
Further, the login information input means 80 includes: the first identifying unit 801, the second identifying unit 803, the receiving unit 805, the obtaining unit 807 and the filling unit 809 may further include: a decryption unit, configured to decrypt the login information according to a decryption rule corresponding to the preset encryption rule before the padding unit 809 pads the login information in the target input domain.
Furthermore, in order to further enhance the security of the inventive solution, the obtaining unit 807 may preferably perform steps related to user authentication and login information obtaining through a Trusted Execution Environment (TEE). The trusted execution environment and a target operating system communicate with each other. The target operating system may typically be an open operating system.
In a specific implementation, the obtaining unit 807 may be specifically configured to:
sending the biometric information to a trusted execution environment through a target operating system;
and verifying whether the biological characteristic information is the preset biological characteristic information or not through the trusted execution environment, if so, acquiring login information of the user represented by the biological characteristic information logging in the application program from a preset database through the trusted execution environment, and sending the login information to the target operating system.
The obtaining unit 807 executes the relevant steps of the scheme of the present invention respectively through the trusted execution environment and the target operating system, so as to avoid the steps of user authentication and login information obtaining from being maliciously tampered due to the target operating system being maliciously attacked, and enhance the security of the scheme of the present invention.
It is understood that the specific implementation of each functional module of the login information input device 80 may also refer to the method in the embodiment of fig. 4, and will not be described herein again.
In order to implement the embodiment of the present invention, the present invention provides a terminal, which is used to implement the login information storage method described in the embodiment of fig. 1. Referring to fig. 9, the terminal 100 may include: baseband chip 100, memory 105 (which may include one or more computer-readable storage media), Radio Frequency (RF) module 106, peripheral system 107, display (LCD)113, camera 114, audio circuitry 115, touch screen 116, and sensors 117 (which may include one or more sensors). Among them, the baseband chip 100 may integrally include: one or more processors 101, a clock module 102, and a power management module 103. These components may communicate over one or more communication buses 104.
It should be understood that terminal 100 is only one example of the invention and that terminal 100 may have more or fewer components than shown, may combine two or more components, or may have a different configuration implementation of the components.
Memory 105 is coupled to processor 101 for storing various software programs and/or sets of instructions. In particular implementations, memory 105 may include high speed random access memory and may also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid state storage devices.
The Radio Frequency (RF) module 106 is used to receive and transmit radio frequency signals. The Radio Frequency (RF) module 106 communicates with a communication network and other communication devices through radio frequency signals. In particular implementations, the Radio Frequency (RF) module 106 may include, but is not limited to: an antenna system, an RF transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal processor, a CODEC chip, a SIM card, a storage medium, and the like. In some embodiments, the Radio Frequency (RF) module 106 may be implemented on a separate chip.
The peripheral system 107 is mainly used to implement an interactive function between the terminal 100 and a user/external environment, and mainly includes an input and output device of the terminal 200. In a specific implementation, the peripheral system 107 may include: a display (LCD) controller 108, a camera controller 109, an audio controller 110, a touch screen controller 111, and a sensor management module 112. Wherein each controller may be coupled with a respective peripheral device. In some embodiments, the peripheral system 107 may also include controllers for other I/O peripherals.
The clock module 102 integrated in the baseband chip 100 is mainly used for generating clocks required for data transmission and timing control for the processor 101. The power management module 103 integrated in the baseband chip 100 is mainly used for providing stable and high-precision voltage for the processor 101, the rf module 106 and peripheral systems. The processor 101 integrated in the baseband chip 100 is mainly used for calling the log-in information saving program stored in the memory 105, and executing the following steps:
recognizing that the current page displayed in the display 113 is a login page of the application;
identifying a target input domain for inputting login information in the login page;
receiving login information input by a user in the target input field through the touch screen 116;
receiving biometric information input by a user through the camera 114 or the sensor 117;
and if the biological characteristic information is preset biological characteristic information, the login information is used as login information of the user represented by the biological characteristic information for logging in the application program, and the login information is stored in a preset database.
In the embodiment of the invention, the biometric information can be fingerprint information. The processor 101 may receive a user input fingerprint through a fingerprint sensor.
In the embodiment of the present invention, the biometric information may also be voice feature information. The processor 101 may receive user input of voice information via the audio circuit 115.
In the embodiment of the invention, the biological characteristic information can also be iris information. The processor 101 may scan and acquire the iris information of the user through the camera 114.
In practical applications, the biometric information may also be other information, such as human face information, which is not limited herein. The processor 101 may obtain face information of the user through the camera 114.
The application program related to the embodiment of the invention refers to the application program which is currently opened by a user. The login page related to the embodiment of the invention refers to a page provided by the application program for the user to input login information. The login information related to the embodiment of the invention refers to information required by the user to login the application program, specifically, a user name, a password and the like.
In one implementation, the processor 101 may analyze whether the current page is the login page according to the interface elements included in the current page. For example, if the current page contains a "login" control for triggering a login request, then the processor 101 may determine that the current page is the login page.
In another implementation, the processor 101 may determine whether the target input field exists in the current page, and if the target input field exists, determine that the current page is the login page.
In the embodiment of the invention, the terminal can obtain the context corresponding to the login page and identify the target input domain according to the context.
The context is used to characterize the control objects and resources referenced by the landing page. . For example, in Android, an interface Context (Activity Context) is created when an application interface (Activity) is started, mainly to save references to current interface controls and resources.
Here, control objects include, but are not limited to: input type controls for receiving user input, such as buttons (Button), text input boxes (e.g., EditText in Android), etc., and output type controls for displaying information to the user, such as labels (Label), text display boxes (e.g., TextView in Android), etc. Here, resources include, but are not limited to: and displaying resources such as characters and pictures in the output type control.
In a specific implementation, the processor 101 may preset a context for identifying the target input domain, and identify the target input domain according to a preset context for identifying the target input domain in the context corresponding to the login page. The context corresponding to the target input field may include: the target input field comprises adjacent controls on the page layout and resources referenced by the adjacent controls.
For example, the adjacent control of the user name field is preset as a text display box, and the text resources referred by the adjacent control comprise: a user name, an account number, a mailbox and other character strings. Then the processor 101 may identify as the username field the input field following the text display box in fig. 2A displaying content as "username".
In a specific implementation, a preset context for identifying the target input field may be stored in the memory 105.
In the embodiment of the invention, the preset database is used for safely storing the login information of the user. The preset database may be located in the memory 105, and the data storage form of the preset database may include, but is not limited to: databases, files, tables, and the like. Before the user accesses the preset database, the processor 101 needs to authenticate the user, and the authenticated user can: writing information into the preset database, or changing the information in the preset database, or reading the information in the preset database.
In a specific implementation, before saving the login information input in the target input field in the preset database, the processor 101 may receive biometric information input by a user, and if the biometric information is preset biometric information, the login information is used as login information of the user represented by the biometric information to log in the application program, and the login information is saved in the preset database.
It should be noted that one (or more) predetermined biometric information may be used to characterize a legitimate user.
In this embodiment of the present invention, in order to enhance the security of the preset database, when saving the login information input in the target input field, the processor 101 may encrypt the login information according to a preset encryption rule, and save the encrypted login information in the database.
In order to further enhance the security of the scheme of the present invention, it may be preferable that the steps relating to user authentication and login information saving are performed by a Trusted Execution Environment (TEE), and the steps relating to input and output of human-computer interaction are performed by a target operating system. The trusted execution environment and a target operating system communicate with each other. The target operating system may typically be an open operating system.
In a specific implementation manner, the processor 101 may send the biometric information to a trusted execution environment through a target operating system, and then the processor 101 may verify whether the biometric information is the preset biometric information through the trusted execution environment, and return a verification result to the target operating system;
if the biometric information is preset biometric information, the processor 101 may send the login information to the trusted execution environment through the target operating system;
if the biometric information is preset biometric information, the processor 101 may use the login information as login information of the user represented by the biometric information to log in the application program through the trusted execution environment, and store the login information in a preset database.
The processor 101 executes the relevant steps of the scheme of the present invention through the trusted execution environment and the target operating system respectively, so that the steps of user identity authentication and login information storage caused by malicious attack on the target operating system can be avoided from being maliciously tampered, and the security of the scheme of the present invention can be enhanced.
It is understood that the steps executed by the processor 101 can also refer to the content of the embodiment in fig. 1, and are not described herein again.
In order to implement the embodiment of the present invention, the present invention provides a terminal, which is used to implement the login information input method described in the embodiment of fig. 4.
Referring to fig. 10, the terminal 200 may include: baseband chip 200, memory 205 (which may include one or more computer-readable storage media), Radio Frequency (RF) module 206, peripheral system 207, display (LCD)113, camera 114, audio circuitry 115, touch screen 116, and sensors 117 (which may include one or more sensors). Among them, the baseband chip 200 may integrally include: one or more processors 201, a clock module 202, and a power management module 203. These components may communicate over one or more communication buses 204.
It should be understood that terminal 200 is only one example of the present invention and that terminal 200 may have more or fewer components than shown, may combine two or more components, or may have a different configuration implementation of components.
A memory 205 is coupled to the processor 201 for storing various software programs and/or sets of instructions. In particular implementations, memory 205 may include high speed random access memory and may also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid state storage devices.
A Radio Frequency (RF) module 206 is used to receive and transmit RF signals. Radio Frequency (RF) module 206 communicates with a communication network and other communication devices via radio frequency signals. In particular implementations, the Radio Frequency (RF) module 206 may include, but is not limited to: an antenna system, an RF transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal processor, a CODEC chip, a SIM card, a storage medium, and the like. In some embodiments, the Radio Frequency (RF) module 206 may be implemented on a separate chip.
The peripheral system 207 is mainly used to implement an interactive function between the terminal 200 and a user/external environment, and mainly includes an input and output device of the terminal 200. In a specific implementation, the peripheral system 207 may include: a display (LCD) controller 208, a camera controller 209, an audio controller 210, a touch screen controller 111, and a sensor management module 112. Wherein each controller may be coupled with a respective peripheral device. In some embodiments, the peripheral system 207 may also include controllers for other I/O peripherals.
The clock module 202 integrated in the baseband chip 200 is mainly used for generating clocks required for data transmission and timing control for the processor 201. The power management module 203 integrated in the baseband chip 200 is mainly used for providing stable and high-precision voltage for the processor 201, the rf module 206 and peripheral systems. The processor 201 integrated in the baseband chip 200 is mainly used for calling the log-in information saving program stored in the memory 205 and executing the following steps:
recognizing that a current page displayed on a display (LCD)213 is a login page of an application;
identifying a target input domain for inputting login information in the login page;
receiving biometric information input by a user through the camera 214 or the sensor 217;
if the biological characteristic information is preset biological characteristic information, obtaining login information of a user, represented by the biological characteristic information, logging in the application program from a preset database;
and filling the login information into the target input field.
In the embodiment of the invention, the biometric information can be fingerprint information. The processor 201 may receive a user input fingerprint through a fingerprint sensor.
In the embodiment of the present invention, the biometric information may also be voice feature information. The processor 201 may receive user input of voice information via the audio circuitry 215.
In the embodiment of the invention, the biological characteristic information can also be iris information. The processor 201 may scan and acquire the iris information of the user through the camera 214.
In practical applications, the biometric information may also be other information, such as human face information, which is not limited herein. The processor 201 may acquire face information of the user through the camera 214.
In one implementation, the processor 201 may analyze whether the current page is the login page according to the interface elements included in the current page. For example, if the current page contains a "login" control for triggering a login request, the processor 201 may determine that the current page is the login page.
In another implementation, the processor 201 may determine whether the target input field exists in the current page, and if the target input field exists, determine that the current page is the login page.
The context is used to characterize the control objects and resources referenced by the landing page. Here, control objects include, but are not limited to: input type controls for receiving user input, such as buttons (Button), text input boxes (e.g., EditText in Android), etc., and output type controls for displaying information to the user, such as labels (Label), text display boxes (e.g., TextView in Android), etc. Here, resources include, but are not limited to: and displaying resources such as characters and pictures in the output type control.
In a specific implementation, the processor 201 may preset a context for identifying the target input domain, and identify the target input domain according to a preset context for identifying the target input domain in the context corresponding to the login page. The context corresponding to the target input field may include: the target input field comprises adjacent controls on the page layout and resources referenced by the adjacent controls.
In the embodiment of the invention, the preset database is used for safely storing the login information of the user. The preset database may be located in the memory 205, and the data storage form of the preset database may include, but is not limited to: databases, files, tables, and the like. Before the user accesses the preset database, the processor 201 may need to authenticate the user, and the authenticated user can: writing information into the preset database, or changing the information in the preset database, or reading the information in the preset database.
In a specific implementation, before obtaining login information of the user logging in the application program from the preset database, the processor 201 may receive biometric information input by the user, and if the biometric information is preset biometric information, obtain login information of the user logging in the application program, which is represented by the biometric information, from the preset database, and fill the obtained login information in the target input field.
It should be noted that one (or more) predetermined biometric information may be used to characterize a legitimate user.
In an embodiment of the present invention, the target input field may include at least two input fields, such as a username field and a password field. In populating the at least two input fields, the processor 201 may obtain login information corresponding to the attribute of each of the at least two input fields from the login information according to the attribute of each of the at least two input fields, and populate login information corresponding to the attribute of each of the at least two input fields with the login information.
Optionally, in this embodiment of the present invention, the processor 201 may selectively fill the target input field according to a selection operation of the user.
Specifically, the processor 201 may receive a selection operation input by a user, obtain login information corresponding to an attribute of a selected target input field from the login information according to the attribute of the target input field selected by the selection operation, and fill the login information corresponding to the attribute of the selected target input field in the selected target input field.
In the embodiment of the present invention, the login information in the preset database may be login information encrypted by a preset encryption rule. Accordingly, the processor 201 needs to decrypt the login information. The decryption rule may be a preset decryption rule corresponding to the preset encryption rule.
To further enhance the security of the inventive solution, it may be preferable that the steps relating to user authentication and login information acquisition are performed by a Trusted Execution Environment (TEE), and the steps relating to input and output of human-computer interaction are performed by a target operating system. The trusted execution environment and a target operating system communicate with each other. The target operating system may typically be an open operating system.
In a specific implementation manner, the processor sends the biometric information to a trusted execution environment through a target operating system;
the processor 101 may verify whether the biometric information is the preset biometric information through the trusted execution environment, and if the biometric information is the preset biometric information, may obtain login information of the user, which is represented by the biometric information, logging in the application program from a preset database through the trusted execution environment, and send the login information to the target operating system through the trusted execution environment.
The processor 101 executes the relevant steps of the scheme of the present invention through the trusted execution environment and the target operating system respectively, so that the steps of user identity authentication and login information acquisition caused by the target operating system suffering from malicious attack can be prevented from being maliciously tampered, and the security of the scheme of the present invention can be enhanced.
It is understood that the steps executed by the processor 201 can also refer to the content of the embodiment in fig. 4, and are not described herein again.
In summary, with the embodiments of the present invention, by identifying the target input field for inputting the login information in the login page of the application program and verifying the biometric information input by the user, if the biometric information is verified, the login information of the user logging in the application program is obtained from the preset database, and the login information is filled in the target input field, the target input field in the login page can be automatically filled, the login operation of the user is simplified, and the application range is wide and is not limited by the application program development platform.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
While the invention has been described with reference to a number of embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (20)

1.一种登录信息输入方法,其特征在于,包括:1. a login information input method, is characterized in that, comprises: 识别出当前页面为应用程序的登录页面;Identify the current page as the login page of the application; 识别出所述登录页面中用于输入登录信息的目标输入域;Identifying a target input field for inputting login information in the login page; 接收用户输入的生物特征信息;Receive biometric information entered by the user; 如果所述生物特征信息是预设生物特征信息,则从预设数据库中获取所述生物特征信息所表征的用户登录所述应用程序的登录信息;If the biometric information is preset biometric information, obtain the login information of the user represented by the biometric information for logging in to the application from a preset database; 将所述登录信息填充到所述目标输入域中;Filling the login information into the target input field; 其中,从预设数据库中获取所述生物特征信息所表征的用户登录所述应用程序的登录信息包括:Wherein, obtaining the login information of the user represented by the biometric information to log in to the application program from the preset database includes: 从可信执行环境中取出所述管理密码;retrieving the administrative password from the trusted execution environment; 通过加盐算法将取出的所述管理密码生成待验证数据;Generate the data to be verified by taking out the management password through a salting algorithm; 确定所述待验证数据与验证码相匹配;determine that the data to be verified matches the verification code; 根据所述管理密码通过加盐算法生成解密密钥;Generate a decryption key through a salting algorithm according to the management password; 根据解密密钥通过对称加密算法对已加密的登录信息进行解密,得到原始的登录信息。The encrypted login information is decrypted through the symmetric encryption algorithm according to the decryption key to obtain the original login information. 2.如权利要求1所述的方法,其特征在于,所述目标输入域包括至少两个输入域;所述将所述登录信息填充到所述目标输入域中,包括:2. The method of claim 1, wherein the target input field comprises at least two input fields; and the filling the login information into the target input field comprises: 分析出所述至少两个输入域中的各个输入域的属性;analyzing the attributes of each of the at least two input fields; 根据所述各个输入域的属性,从所述登录信息中分别获取与所述各个输入域的属性相符合的登录信息;According to the attributes of the respective input fields, respectively obtain the login information corresponding to the attributes of the respective input fields from the login information; 在所述各个输入域中分别填充与各个输入域的属性相符合的登录信息。The respective input fields are filled with login information corresponding to the attributes of the respective input fields. 3.如权利要求1所述的方法,其特征在于,所述将所述登录信息填充到所述目标输入域中,包括:接收用户输入的选择操作,所述选择操作用于选择需要填充登录信息的目标输入域;分析出所述选择操作选中的目标输入域的属性;根据所述选中的目标输入域的属性,从所述登录信息中获取与所述选中的目标输入域的属性相符合登录信息;在所述选中的目标输入域中填充与所述选中的目标输入域的属性相符合登录信息。3. The method according to claim 1, wherein the filling the login information into the target input field comprises: receiving a selection operation input by a user, wherein the selection operation is used to select a login that needs to be filled in The target input field of the information; analyze the attributes of the target input field selected by the selection operation; according to the attributes of the selected target input field, obtain from the login information the attributes that match the attributes of the selected target input field Login information; the selected target input field is filled with login information that matches the attributes of the selected target input field. 4.如权利要求1所述的方法,其特征在于,所述如果所述生物特征信息是预设生物特征信息,则从预设数据库中获取所述生物特征信息所表征的用户登录所述应用程序的登录信息,包括:4. The method according to claim 1, wherein, if the biometric information is preset biometric information, obtaining a user represented by the biometric information from a preset database to log in to the application Program login information, including: 目标操作系统将所述生物特征信息发送给可信执行环境;The target operating system sends the biometric information to the trusted execution environment; 所述可信执行环境验证所述生物特征信息是否是所述预设生物特征信息,如果所述生物特征信息是预设生物特征信息,则所述可信执行环境从预设数据库中获取所述生物特征信息所表征的用户登录所述应用程序的登录信息,并将所述登录信息发送给所述目标操作系统。The trusted execution environment verifies whether the biometric information is the preset biometric information, and if the biometric information is the preset biometric information, the trusted execution environment obtains the biometric information from a preset database The user represented by the biometric information logs in the login information of the application, and sends the login information to the target operating system. 5.如权利要求1-4中任一项所述的方法,其特征在于,所述预设数据库中的登录信息是通过预设加密规则进行加密的登录信息;所述将所述登录信息填充到所述目标输入域之前,还包括:通过所述预设加密规则对应的解密规则解密所述登录信息。5. The method according to any one of claims 1-4, wherein the login information in the preset database is the login information encrypted by a preset encryption rule; the login information is filled with the login information Before reaching the target input field, the method further includes: decrypting the login information through a decryption rule corresponding to the preset encryption rule. 6.如权利要求1-3中任一项所述的方法,其特征在于,所述识别出所述登录页面中用于输入登录信息的目标输入域,包括:6. The method according to any one of claims 1-3, wherein the identifying a target input field for inputting login information in the login page comprises: 获取所述登录页面对应的上下文;所述上下文用于表征所述登录页面所引用的控件对象和资源;Acquire the context corresponding to the login page; the context is used to represent the control objects and resources referenced by the login page; 在所述登录页面对应的上下文中,根据预设的用于识别所述目标输入域的上下文识别出所述目标输入域。In the context corresponding to the login page, the target input field is identified according to a preset context for identifying the target input field. 7.一种登录信息保存方法,其特征在于,包括:7. A method for saving login information, comprising: 识别出当前页面为应用程序的登录页面;Identify the current page as the login page of the application; 识别出所述登录页面中用于输入登录信息的目标输入域;Identifying a target input field for inputting login information in the login page; 接收用户在所述目标输入域中输入的登录信息;receiving the login information entered by the user in the target input field; 接收用户输入的生物特征信息;Receive biometric information entered by the user; 如果所述生物特征信息是预设生物特征信息,则将所述登录信息作为所述生物特征信息所表征的用户登录所述应用程序的登录信息,保存所述登录信息到预设数据库中;If the biometric information is preset biometric information, use the login information as the login information for the user represented by the biometric information to log in to the application, and save the login information in a preset database; 其中,将所述登录信息作为所述生物特征信息所表征的用户登录所述应用程序的登录信息,保存所述登录信息到预设数据库中包括:Wherein, using the login information as the login information of the user represented by the biometric information to log in to the application, and saving the login information to the preset database includes: 从可信执行环境中取出所述管理密码;retrieving the administrative password from the trusted execution environment; 通过加盐算法将取出的所述管理密码生成待验证数据Generate the data to be verified from the management password taken out through the salting algorithm 确定所述待验证数据与验证码相匹配;determine that the data to be verified matches the verification code; 根据所述管理密码通过加盐算法生成加密密钥Generate an encryption key through a salting algorithm according to the management password 根据所述加密密钥通过对称加密算法对登录信息进行加密,生成已加密的登录信息。The login information is encrypted by a symmetric encryption algorithm according to the encryption key to generate encrypted login information. 8.如权利要求7所述的方法,其特征在于,所述如果所述生物特征信息是预设生物特征信息,则将所述登录信息作为所述生物特征信息所表征的用户登录所述应用程序的登录信息,保存所述登录信息到预设数据库中,包括:8 . The method of claim 7 , wherein, if the biometric information is preset biometric information, logging into the application using the login information as a user represented by the biometric information. 9 . The login information of the program, save the login information to the preset database, including: 目标操作系统将所述生物特征信息发送给可信执行环境;The target operating system sends the biometric information to the trusted execution environment; 所述可信执行环境验证所述生物特征信息是否是所述预设生物特征信息,并将验证结果返回给所述目标操作系统;The trusted execution environment verifies whether the biometric information is the preset biometric information, and returns the verification result to the target operating system; 如果所述生物特征信息是预设生物特征信息,则所述目标操作系统将所述登录信息发送给所述可信执行环境;If the biometric information is preset biometric information, the target operating system sends the login information to the trusted execution environment; 如果所述生物特征信息是预设生物特征信息,则所述可信执行环境将所述登录信息作为所述生物特征信息所表征的用户登录所述应用程序的登录信息,保存所述登录信息到预设数据库中。If the biometric information is preset biometric information, the trusted execution environment uses the login information as the login information for the user represented by the biometric information to log in to the application, and saves the login information to preset database. 9.如权利要求7或8所述的方法,其特征在于,在所述保存所述登录信息到预设数据库中之前,还包括:按照预设加密规则加密所述登录信息。9 . The method according to claim 7 or 8 , wherein before the saving the login information into a preset database, the method further comprises: encrypting the login information according to a preset encryption rule. 10 . 10.如权利要求7所述的方法,其特征在于,所述识别出所述登录页面中用于输入登录信息的目标输入域,包括:10. The method of claim 7, wherein the identifying a target input field for inputting login information in the login page comprises: 获取所述登录页面对应的上下文;所述上下文用于表征所述登录页面所引用的控件对象和资源;Acquire the context corresponding to the login page; the context is used to represent the control objects and resources referenced by the login page; 在所述登录页面对应的上下文中,根据预设的用于识别所述目标输入域的上下文识别出所述目标输入域。In the context corresponding to the login page, the target input field is identified according to a preset context for identifying the target input field. 11.一种终端,其特征在于,包括:输入装置、输出装置、存储器和与所述存储器耦合的处理器,其中:11. A terminal, comprising: an input device, an output device, a memory, and a processor coupled with the memory, wherein: 所述处理器读取所述存储器中存储的指令,用于执行以下步骤:The processor reads the instructions stored in the memory for performing the following steps: 识别出显示于所述输出装置中的当前页面为应用程序的登录页面;Identifying that the current page displayed in the output device is the login page of the application; 识别出所述登录页面中用于输入登录信息的目标输入域;Identifying a target input field for inputting login information in the login page; 通过所述输入装置接收用户输入的生物特征信息;Receive the biometric information input by the user through the input device; 如果所述生物特征信息是预设生物特征信息,则从预设数据库中获取所述生物特征信息所表征的用户登录所述应用程序的登录信息;If the biometric information is preset biometric information, obtain the login information of the user represented by the biometric information for logging in to the application from a preset database; 将所述登录信息填充到所述目标输入域中;Filling the login information into the target input field; 其中,从预设数据库中获取所述生物特征信息所表征的用户登录所述应用程序的登录信息包括:Wherein, obtaining the login information of the user represented by the biometric information to log in to the application program from the preset database includes: 从可信执行环境中取出所述管理密码;retrieving the administrative password from the trusted execution environment; 通过加盐算法将取出的所述管理密码生成待验证数据;Generate the data to be verified by taking out the management password through a salting algorithm; 确定所述待验证数据与验证码相匹配;determine that the data to be verified matches the verification code; 根据所述管理密码通过加盐算法生成解密密钥;Generate a decryption key through a salting algorithm according to the management password; 根据解密密钥通过对称加密算法对已加密的登录信息进行解密,得到原始的登录信息。The encrypted login information is decrypted through the symmetric encryption algorithm according to the decryption key to obtain the original login information. 12.如权利要求11所述的终端,其特征在于,所述目标输入域包括至少两个输入域;所述将所述登录信息填充到所述目标输入域中的步骤,包括:12. The terminal according to claim 11, wherein the target input field comprises at least two input fields; and the step of filling the login information into the target input field comprises: 所述处理器分析出所述至少两个输入域中的各个输入域的属性;the processor analyzes attributes of each of the at least two input fields; 所述处理器根据所述各个输入域的属性,从所述登录信息中分别获取与所述各个输入域的属性相符合的登录信息;The processor obtains, according to the attributes of the respective input fields, login information corresponding to the attributes of the respective input fields from the login information respectively; 所述处理器在所述各个输入域中分别填充与各个输入域的属性相符合的登录信息。The processor fills the respective input fields with login information corresponding to the attributes of the respective input fields. 13.如权利要求11所述的终端,其特征在于,所述将所述登录信息填充到所述目标输入域中的步骤,包括:13. The terminal according to claim 11, wherein the step of filling the login information into the target input field comprises: 所述处理器通过所述输入装置接收用户输入的选择操作,所述选择操作用于选择需要填充登录信息的目标输入域;分析出所述选择操作选中的目标输入域的属性;根据所述选中的目标输入域的属性,从所述登录信息中获取与所述选中的目标输入域的属性相符合登录信息;在所述选中的目标输入域中填充与所述选中的目标输入域的属性相符合登录信息。The processor receives a selection operation input by the user through the input device, and the selection operation is used to select a target input field that needs to be filled with login information; analyzes the attributes of the target input field selected by the selection operation; The attribute of the target input field of the selected target input field, obtain the log-in information from the login information that is consistent with the attribute of the selected target input field; fill the attribute of the selected target input field with the attribute of the selected target input field. Match the login information. 14.如权利要求11所述的终端,其特征在于,所述如果所述生物特征信息是预设生物特征信息,则从预设数据库中获取所述生物特征信息所表征的用户登录所述应用程序的登录信息的步骤,包括:14 . The terminal according to claim 11 , wherein, if the biometric information is preset biometric information, obtaining the user represented by the biometric information from a preset database to log in to the application 14 . The steps for the login information of the program include: 所述处理器通过目标操作系统将所述生物特征信息发送给可信执行环境;The processor sends the biometric information to the trusted execution environment through the target operating system; 所述处理器通过所述可信执行环境验证所述生物特征信息是否是所述预设生物特征信息,如果所述生物特征信息是预设生物特征信息,则通过所述可信执行环境从预设数据库中获取所述生物特征信息所表征的用户登录所述应用程序的登录信息,并通过所述可信执行环境将所述登录信息发送给所述目标操作系统。The processor verifies whether the biometric information is the preset biometric information through the trusted execution environment, and if the biometric information is the preset biometric information, executes the trusted execution environment from the preset biometric information. It is assumed that the login information of the user represented by the biometric information for logging in to the application is obtained from the database, and the login information is sent to the target operating system through the trusted execution environment. 15.如权利要求11-14中任一项所述的终端,其特征在于,所述预设数据库中的登录信息是通过预设加密规则进行加密的登录信息;所述处理器还用于:在将所述登录信息填充到所述目标输入域之前,通过所述预设加密规则对应的解密规则解密所述登录信息。15. The terminal according to any one of claims 11-14, wherein the login information in the preset database is the login information encrypted by a preset encryption rule; the processor is further configured to: Before filling the login information into the target input field, decrypt the login information through a decryption rule corresponding to the preset encryption rule. 16.如权利要求11-13中任一项所述的终端,其特征在于,所述识别出所述登录页面中用于输入登录信息的目标输入域的步骤,包括:16. The terminal according to any one of claims 11-13, wherein the step of identifying a target input field for inputting login information in the login page comprises: 所述处理器获取所述登录页面对应的上下文;所述上下文用于表征所述登录页面所引用的控件对象和资源;obtaining, by the processor, a context corresponding to the login page; the context is used to represent the control objects and resources referenced by the login page; 所述处理器在所述登录页面对应的上下文中,根据预设的用于识别所述目标输入域的上下文识别出所述目标输入域。The processor identifies the target input field in a context corresponding to the login page according to a preset context for identifying the target input field. 17.一种终端,其特征在于,包括:输入装置、输出装置、存储器和与所述存储器耦合的处理器,其中:17. A terminal, comprising: an input device, an output device, a memory, and a processor coupled with the memory, wherein: 所述处理器读取所述存储器中存储的指令,用于执行以下步骤:The processor reads the instructions stored in the memory for performing the following steps: 识别出显示于所述输出装置中的当前页面为应用程序的登录页面;Identifying that the current page displayed in the output device is the login page of the application; 识别出所述登录页面中用于输入登录信息的目标输入域;Identifying a target input field for inputting login information in the login page; 通过所述输入装置接收用户在所述目标输入域中输入的登录信息;receiving, through the input device, login information input by the user in the target input field; 通过所述输入装置接收用户输入的生物特征信息;Receive the biometric information input by the user through the input device; 如果所述生物特征信息是预设生物特征信息,则将所述登录信息作为所述生物特征信息所表征的用户登录所述应用程序的登录信息,保存所述登录信息到预设数据库中;If the biometric information is preset biometric information, use the login information as the login information for the user represented by the biometric information to log in to the application, and save the login information in a preset database; 其中,将所述登录信息作为所述生物特征信息所表征的用户登录所述应用程序的登录信息,保存所述登录信息到预设数据库中包括:Wherein, using the login information as the login information of the user represented by the biometric information to log in to the application, and saving the login information to the preset database includes: 从可信执行环境中取出所述管理密码;retrieving the administrative password from the trusted execution environment; 通过加盐算法将取出的所述管理密码生成待验证数据Generate the data to be verified from the management password taken out through the salting algorithm 确定所述待验证数据与验证码相匹配;determine that the data to be verified matches the verification code; 根据所述管理密码通过加盐算法生成加密密钥Generate an encryption key through a salting algorithm according to the management password 根据所述加密密钥通过对称加密算法对登录信息进行加密,生成已加密的登录信息。The login information is encrypted by a symmetric encryption algorithm according to the encryption key to generate encrypted login information. 18.如权利要求17所述的终端,其特征在于,所述如果所述生物特征信息是预设生物特征信息,则将所述登录信息作为所述生物特征信息所表征的用户登录所述应用程序的登录信息,保存所述登录信息到预设数据库中的步骤,包括:18 . The terminal according to claim 17 , wherein, if the biometric information is preset biometric information, the login information is used as a user represented by the biometric information to log in to the application. 18 . The login information of the program, and the steps of saving the login information to the preset database include: 所述处理器通过目标操作系统将所述生物特征信息发送给可信执行环境;The processor sends the biometric information to the trusted execution environment through the target operating system; 所述处理器通过所述可信执行环境验证所述生物特征信息是否是所述预设生物特征信息,并将验证结果返回给所述目标操作系统;The processor verifies whether the biometric information is the preset biometric information through the trusted execution environment, and returns the verification result to the target operating system; 如果所述生物特征信息是预设生物特征信息,则所述处理器通过所述目标操作系统将所述登录信息发送给所述可信执行环境;If the biometric information is preset biometric information, the processor sends the login information to the trusted execution environment through the target operating system; 如果所述生物特征信息是预设生物特征信息,则所述处理器通过所述可信执行环境将所述登录信息作为所述生物特征信息所表征的用户登录所述应用程序的登录信息,保存所述登录信息到预设数据库中。If the biometric information is preset biometric information, the processor uses the trusted execution environment to use the login information as the login information for the user represented by the biometric information to log in to the application, and saves The login information is stored in a preset database. 19.如权利要求17或18所述的终端,其特征在于,所述处理器还用于:在保存所述登录信息到预设数据库中之前,按照预设加密规则加密所述登录信息。The terminal according to claim 17 or 18, wherein the processor is further configured to: encrypt the login information according to a preset encryption rule before saving the login information in a preset database. 20.如权利要求17所述的终端,其特征在于,所述识别出所述登录页面中用于输入登录信息的目标输入域的步骤,包括:20. The terminal according to claim 17, wherein the step of identifying a target input field for inputting login information in the login page comprises: 获取所述登录页面对应的上下文;所述上下文用于表征所述登录页面所引用的控件对象和资源;Acquire the context corresponding to the login page; the context is used to represent the control objects and resources referenced by the login page; 在所述登录页面对应的上下文中,根据预设的用于识别所述目标输入域的上下文识别出所述目标输入域。In the context corresponding to the login page, the target input field is identified according to a preset context for identifying the target input field.
CN202110592836.5A 2015-09-21 2015-09-21 Login information input method, login information storage method and related device Pending CN113676443A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110592836.5A CN113676443A (en) 2015-09-21 2015-09-21 Login information input method, login information storage method and related device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110592836.5A CN113676443A (en) 2015-09-21 2015-09-21 Login information input method, login information storage method and related device
CN201510604757.6A CN106549920B (en) 2015-09-21 2015-09-21 Login information input method, login information storage method and related device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201510604757.6A Division CN106549920B (en) 2015-09-21 2015-09-21 Login information input method, login information storage method and related device

Publications (1)

Publication Number Publication Date
CN113676443A true CN113676443A (en) 2021-11-19

Family

ID=58365142

Family Applications (4)

Application Number Title Priority Date Filing Date
CN202110592836.5A Pending CN113676443A (en) 2015-09-21 2015-09-21 Login information input method, login information storage method and related device
CN202010275669.7A Active CN111585964B (en) 2015-09-21 2015-09-21 Login information input method, login information storage method and related device
CN202110595078.2A Pending CN113452678A (en) 2015-09-21 2015-09-21 Login information input method, login information storage method and related device
CN201510604757.6A Active CN106549920B (en) 2015-09-21 2015-09-21 Login information input method, login information storage method and related device

Family Applications After (3)

Application Number Title Priority Date Filing Date
CN202010275669.7A Active CN111585964B (en) 2015-09-21 2015-09-21 Login information input method, login information storage method and related device
CN202110595078.2A Pending CN113452678A (en) 2015-09-21 2015-09-21 Login information input method, login information storage method and related device
CN201510604757.6A Active CN106549920B (en) 2015-09-21 2015-09-21 Login information input method, login information storage method and related device

Country Status (2)

Country Link
CN (4) CN113676443A (en)
WO (1) WO2017050093A1 (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113676443A (en) * 2015-09-21 2021-11-19 华为终端有限公司 Login information input method, login information storage method and related device
CN107357562B (en) * 2017-05-24 2023-09-05 青岛海信移动通信技术股份有限公司 Information filling method, device and client
CN107480516A (en) * 2017-07-14 2017-12-15 青岛海信移动通信技术股份有限公司 A kind of method and apparatus for filling input frame
CN107797677B (en) * 2017-07-26 2020-12-22 深圳壹账通智能科技有限公司 Login parameter input method, device, platform and readable storage medium
CN110650110B (en) * 2018-06-26 2022-03-22 深信服科技股份有限公司 Login page identification method and related equipment
WO2020093214A1 (en) * 2018-11-05 2020-05-14 深圳市欢太科技有限公司 Application program login method, application program login device and mobile terminal
CN109992939B (en) * 2019-03-29 2021-08-20 维沃移动通信有限公司 A login method and terminal device
CN110007823B (en) * 2019-04-01 2020-12-04 钱咸升(北京)网络科技股份公司 Information input method and device
CN110175442A (en) * 2019-04-15 2019-08-27 深圳壹账通智能科技有限公司 Based on APP means of defence, device, equipment and the storage medium for shielding lower fingerprint
CN110414246B (en) * 2019-06-19 2023-05-30 平安科技(深圳)有限公司 Shared file security management method, device, terminal and storage medium
CN111639919B (en) * 2020-06-05 2024-04-09 中国银行股份有限公司 Information acquisition method and device
CN111831991A (en) * 2020-07-24 2020-10-27 中国工商银行股份有限公司 Input operation detection method, device, computing equipment and medium
CN112311805B (en) * 2020-11-06 2022-04-12 支付宝(杭州)信息技术有限公司 Login-free authentication processing method and device based on trusted execution environment
CN112947834A (en) * 2021-01-27 2021-06-11 维沃移动通信有限公司 Information input method and device and electronic equipment
CN112990913A (en) * 2021-03-26 2021-06-18 中国工商银行股份有限公司 Automatic filling method, server and system for browser payment login page
CN113709181A (en) * 2021-09-10 2021-11-26 未鲲(上海)科技服务有限公司 Website login method, device, equipment and storage medium based on browser plug-in
CN114281197B (en) * 2021-12-14 2024-07-26 Oppo广东移动通信有限公司 Information filling method and device, electronic equipment and storage medium
CN114860360B (en) * 2022-04-08 2024-09-17 南京四维智联科技有限公司 Login page generation method and device and electronic equipment
CN116257837B (en) * 2023-05-16 2023-08-22 深圳竹云科技股份有限公司 Application system login method and device, computer equipment and storage medium
CN117993857B (en) * 2024-02-05 2024-08-30 北京睿企信息科技有限公司 Instruction text sending system

Citations (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9625925D0 (en) * 1995-12-15 1997-01-29 Lotus Dev Corp Differential work factor cryptography method and system
US5787169A (en) * 1995-12-28 1998-07-28 International Business Machines Corp. Method and apparatus for controlling access to encrypted data files in a computer system
US6064736A (en) * 1997-09-15 2000-05-16 International Business Machines Corporation Systems, methods and computer program products that use an encrypted session for additional password verification
JP2000221881A (en) * 1999-02-01 2000-08-11 Nec Corp Electronic signature terminal device, electronic signature management device and electronic signature system
JP2001265735A (en) * 2000-03-22 2001-09-28 Ntt Communications Kk Authentication method, signature method, and communication method and system using ID / password
US20030163737A1 (en) * 2002-02-26 2003-08-28 James Roskind Simple secure login with multiple-authentication providers
JP2007142504A (en) * 2005-11-14 2007-06-07 Kotohaco:Kk Information processing system
CN101272237A (en) * 2008-04-22 2008-09-24 北京飞天诚信科技有限公司 A method and system for automatically generating and filling login information
CN101872365A (en) * 2010-07-02 2010-10-27 苏州阔地网络科技有限公司 Method for realizing one-key login to other website on webpage
WO2011116555A1 (en) * 2010-03-22 2011-09-29 中兴通讯股份有限公司 Method and system for automatically logging in client
CN102281539A (en) * 2011-08-29 2011-12-14 惠州Tcl移动通信有限公司 Mobile terminal and application program login method thereof
CN102591889A (en) * 2011-01-17 2012-07-18 腾讯科技(深圳)有限公司 Method and device for assisting user input based on browser of mobile terminal
CN102646077A (en) * 2012-03-28 2012-08-22 山东超越数控电子有限公司 Method for full-disk encryption based on trusted cryptography module
WO2013075612A1 (en) * 2011-11-21 2013-05-30 北京奇虎科技有限公司 Auto login method and device
CN103218555A (en) * 2013-03-04 2013-07-24 北京百纳威尔科技有限公司 Logging-in method and device for application program
CN103227786A (en) * 2013-04-08 2013-07-31 优视科技有限公司 Method and device for filling in website login information
CN103425914A (en) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 Login method of application program and communication terminal
US20140033281A1 (en) * 2012-07-27 2014-01-30 Hitachi, Ltd. User authentication system, user authentication method and network apparatus
CN103795716A (en) * 2014-01-21 2014-05-14 宇龙计算机通信科技(深圳)有限公司 Network account login method and device, and terminal
US20140140508A1 (en) * 2012-11-16 2014-05-22 Deepak Kamath Method, System and Program Product for Secure Storage of Content
CN104219228A (en) * 2014-08-18 2014-12-17 四川长虹电器股份有限公司 User registration and user identification method and user registration and user identification system
CN104331650A (en) * 2013-07-22 2015-02-04 联想(北京)有限公司 Information processing method and electronic equipment
KR101494854B1 (en) * 2014-12-10 2015-02-23 주식회사 인포바인 Method of convenient signing in using automatically detecting and filling login field in web or applicaion and apparatus for the same
US20150089239A1 (en) * 2012-04-25 2015-03-26 Rowen Inc. Passcode Operating System, Passcode Apparatus, and Super-Passcode Generating Method
CN104598793A (en) * 2015-01-08 2015-05-06 百度在线网络技术(北京)有限公司 Fingerprint authentication method and fingerprint authentication device
CN104660688A (en) * 2015-02-03 2015-05-27 百度在线网络技术(北京)有限公司 Method and device for acquiring login information
CN104780167A (en) * 2015-03-27 2015-07-15 深圳创维数字技术有限公司 Account login method and terminal
EP2905717A1 (en) * 2014-02-05 2015-08-12 Thomson Licensing Device and method for device and user authentication

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040073794A1 (en) * 2002-10-15 2004-04-15 Kevin Nip Method and system for the dynamic and automated storage and retrieval of authentication information via a communications network
CN101588348A (en) * 2008-05-22 2009-11-25 中国电信股份有限公司 System logging method and system logging device based on Web
CN101635629B (en) * 2008-07-21 2013-02-20 李晓东 Secure password authentication method
CN101888395A (en) * 2009-05-13 2010-11-17 华为技术有限公司 A data synchronization method, widget terminal and server
CN102222200B (en) * 2011-06-24 2015-07-22 宇龙计算机通信科技(深圳)有限公司 Application program logging method and logging management system
CN102594817A (en) * 2012-02-15 2012-07-18 李晶 Password agent method, user terminal equipment and password agent server
CN102637194B (en) * 2012-02-27 2013-10-02 长春吉大正元信息技术股份有限公司 Trigger method for late binding event of Web page element in BHO (browser helper object)
CN102868732A (en) * 2012-08-27 2013-01-09 北京小米科技有限责任公司 Account password-based login implementation method, system and device
CN103024005B (en) * 2012-11-30 2015-11-25 北京奇虎科技有限公司 Website login information store method and device
US9807085B2 (en) * 2013-03-15 2017-10-31 Veracode, Inc. Systems and methods for automated detection of login sequence for web form-based authentication
CN113676443A (en) * 2015-09-21 2021-11-19 华为终端有限公司 Login information input method, login information storage method and related device

Patent Citations (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9625925D0 (en) * 1995-12-15 1997-01-29 Lotus Dev Corp Differential work factor cryptography method and system
US5787169A (en) * 1995-12-28 1998-07-28 International Business Machines Corp. Method and apparatus for controlling access to encrypted data files in a computer system
US6064736A (en) * 1997-09-15 2000-05-16 International Business Machines Corporation Systems, methods and computer program products that use an encrypted session for additional password verification
JP2000221881A (en) * 1999-02-01 2000-08-11 Nec Corp Electronic signature terminal device, electronic signature management device and electronic signature system
JP2001265735A (en) * 2000-03-22 2001-09-28 Ntt Communications Kk Authentication method, signature method, and communication method and system using ID / password
US20030163737A1 (en) * 2002-02-26 2003-08-28 James Roskind Simple secure login with multiple-authentication providers
JP2007142504A (en) * 2005-11-14 2007-06-07 Kotohaco:Kk Information processing system
CN101272237A (en) * 2008-04-22 2008-09-24 北京飞天诚信科技有限公司 A method and system for automatically generating and filling login information
WO2011116555A1 (en) * 2010-03-22 2011-09-29 中兴通讯股份有限公司 Method and system for automatically logging in client
CN101872365A (en) * 2010-07-02 2010-10-27 苏州阔地网络科技有限公司 Method for realizing one-key login to other website on webpage
CN102591889A (en) * 2011-01-17 2012-07-18 腾讯科技(深圳)有限公司 Method and device for assisting user input based on browser of mobile terminal
CN102281539A (en) * 2011-08-29 2011-12-14 惠州Tcl移动通信有限公司 Mobile terminal and application program login method thereof
WO2013075612A1 (en) * 2011-11-21 2013-05-30 北京奇虎科技有限公司 Auto login method and device
CN102646077A (en) * 2012-03-28 2012-08-22 山东超越数控电子有限公司 Method for full-disk encryption based on trusted cryptography module
US20150089239A1 (en) * 2012-04-25 2015-03-26 Rowen Inc. Passcode Operating System, Passcode Apparatus, and Super-Passcode Generating Method
CN103425914A (en) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 Login method of application program and communication terminal
US20140033281A1 (en) * 2012-07-27 2014-01-30 Hitachi, Ltd. User authentication system, user authentication method and network apparatus
US20140140508A1 (en) * 2012-11-16 2014-05-22 Deepak Kamath Method, System and Program Product for Secure Storage of Content
CN103218555A (en) * 2013-03-04 2013-07-24 北京百纳威尔科技有限公司 Logging-in method and device for application program
CN103227786A (en) * 2013-04-08 2013-07-31 优视科技有限公司 Method and device for filling in website login information
CN104331650A (en) * 2013-07-22 2015-02-04 联想(北京)有限公司 Information processing method and electronic equipment
CN103795716A (en) * 2014-01-21 2014-05-14 宇龙计算机通信科技(深圳)有限公司 Network account login method and device, and terminal
EP2905717A1 (en) * 2014-02-05 2015-08-12 Thomson Licensing Device and method for device and user authentication
CN104219228A (en) * 2014-08-18 2014-12-17 四川长虹电器股份有限公司 User registration and user identification method and user registration and user identification system
KR101494854B1 (en) * 2014-12-10 2015-02-23 주식회사 인포바인 Method of convenient signing in using automatically detecting and filling login field in web or applicaion and apparatus for the same
CN104598793A (en) * 2015-01-08 2015-05-06 百度在线网络技术(北京)有限公司 Fingerprint authentication method and fingerprint authentication device
CN104660688A (en) * 2015-02-03 2015-05-27 百度在线网络技术(北京)有限公司 Method and device for acquiring login information
CN104780167A (en) * 2015-03-27 2015-07-15 深圳创维数字技术有限公司 Account login method and terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈鹏;刁红军;朱斐;: "一种基于Web单点登录系统实现", 计算机应用与软件 *

Also Published As

Publication number Publication date
CN113452678A (en) 2021-09-28
CN106549920B (en) 2021-06-01
CN111585964B (en) 2023-03-24
CN106549920A (en) 2017-03-29
CN111585964A (en) 2020-08-25
WO2017050093A1 (en) 2017-03-30

Similar Documents

Publication Publication Date Title
CN106549920B (en) Login information input method, login information storage method and related device
US11764966B2 (en) Systems and methods for single-step out-of-band authentication
US9183365B2 (en) Methods and systems for fingerprint template enrollment and distribution process
EP3824592B1 (en) Public-private key pair protected password manager
US9286466B2 (en) Registration and authentication of computing devices using a digital skeleton key
US20160105285A1 (en) Deriving cryptographic keys from biometric parameters
US20150244695A1 (en) Network authentication method for secure user identity verification
KR101897085B1 (en) Apparatus and method for generating a realtime password and storage medium
JP2019086937A (en) Image processing device, image processing device control method, program, system and system control method
EP4329241A1 (en) Data management system, data management method, and non-transitory recording medium
US20190108328A1 (en) Method and system for secure password storage
CN105260632B (en) A kind of method for authenticating and terminal
CN112784237A (en) Authentication processing method, authentication authorization method and related equipment of electronic document
JP6037460B2 (en) Service providing apparatus, program, and method
US9594968B1 (en) Biometric profile creation
KR101679183B1 (en) Server and method for electronic signature
CN113672886A (en) Prompt method and device
CN114448722A (en) Cross-browser login method and device, computer equipment and storage medium
KR102029309B1 (en) Information input apparatus having authentication request and method using the same
US20250240290A1 (en) Authentication using sequence of facial images
CN118916866A (en) Password setting method and device, password retrieving method and device and electronic equipment
CN114629656A (en) Distributed biometric security recognition system, face recognition method, medium and equipment
JP2010055456A (en) User authentication device
KR20110133105A (en) OTP authentication method that can be limitedly used when OTP generator breaks down

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination