[go: up one dir, main page]

TWI355957B - - Google Patents

Download PDF

Info

Publication number
TWI355957B
TWI355957B TW97107613A TW97107613A TWI355957B TW I355957 B TWI355957 B TW I355957B TW 97107613 A TW97107613 A TW 97107613A TW 97107613 A TW97107613 A TW 97107613A TW I355957 B TWI355957 B TW I355957B
Authority
TW
Taiwan
Prior art keywords
password
telephone number
temporary
user
call
Prior art date
Application number
TW97107613A
Other languages
Chinese (zh)
Other versions
TW200938277A (en
Original Assignee
Digicheese Technology & Interactive Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digicheese Technology & Interactive Co Ltd filed Critical Digicheese Technology & Interactive Co Ltd
Priority to TW97107613A priority Critical patent/TW200938277A/en
Publication of TW200938277A publication Critical patent/TW200938277A/en
Application granted granted Critical
Publication of TWI355957B publication Critical patent/TWI355957B/zh

Links

Landscapes

  • Telephonic Communication Services (AREA)

Description

1355957 20110616 九、發明說明: 【發明所屬之技術領域】 本發明係關於一種密碼驗證系統與方法,尤指網路遊戲的密碼驗 證糸統與方法。 【先前技術】 線上遊戲吸引人之處’在於玩家只要持續「打怪、練功」就能提 升#級,甚至獲得寶物,甚至虛擬世界的寶物及貨幣還可以換成 實體貨幣,但因網路「練功」,需要相當長的時間才能見到成效, 不少玩家希望在短時間内提高等級,常常是幾個人一起使用帳號 及岔碼,多人輪流使用情況下,使得帳號密碼就容易外流,遭人 冒用。 然而’在虛擬世界所獲得的「財產」,往往只靠著簡單的帳號及密 碼來保護。這使得,只要掌握他人的帳號及密碼,就能順利入侵, 不勞而後,也因此駭客入侵時有所聞,成為玩家心中的最痛。1355957 20110616 IX. INSTRUCTIONS: [Technical Field] The present invention relates to a password verification system and method, and more particularly to a password verification system and method for online games. [Prior Art] The appeal of online games is that players can upgrade ##, even get treasures, even the treasures and currencies of the virtual world can be exchanged for physical currency, but because of the network. Practice, it takes a long time to see the results, many players hope to improve the level in a short period of time, often a few people use the account and weight together, the use of multiple people in turn, making the account password easy to flow out People use it. However, the “property” obtained in the virtual world is often protected by a simple account and password. This makes it possible to smoothly invade as long as you master the account and password of others, and then it will become a pain in the hearts of the players.

Ik著不法玩豕技術翻新,竊取玩家帳號密碼的方法越來越科技 化,甚至發展出針對特定線上遊戲設計的「木馬」程式,以便用 來侧錄玩家輸入的帳號及密碼。 這些程式平常隱藏在祕,只要啟動絲紅賴,程式就會自 動執行,並且將側錄得到的資料傳到指定信箱,由於不易察覺, 20110616 玩豕的帳號及密碼已經遭到側錄而不自知,_發現時,「練功」 多時的成果,往往已經不翼而飛。 為了解決這侧題’已魏商提出「手機鎖雙重防盜防護」來嘗 試解決帳號/密碼遭職取的問題。簡單來說,在「手機鎖雙重防 应防4」巾’平日在上班上科,玩家的纖帳號將會被系統上 鎖’只要沒有使用綁定的手機或是家用電話號碼進行開通的動 作’即使有遊戲帳號以及密碼也無法登人,以避免遊戲寳物遭到 竊取。 當玩家用手機或具有來電顯示功能的家用電話,撥打開通專線 後’在完成開通後魏會自動掛斷電話,並且解開鎖定巾的帳號, 但是玩家必須在三分鐘的時咖登人遊戲帳號,倾三分鐘之後 系統自動將帳號上鎖。 =而,在許錯況下,使財龍往购補完整,以至於系統 沒有預先儲存原始電話號碼,純法針對呼叫者電話號碼作驗 證。就算使用者已事鍵立電話號碼時,㈣也因為使歸錯誤 輪入或忘記輸入電話號碼中的區域碼或國碼,以至於從外地或國 外撥打電。辦,由於來電顯示的號碼額外包含了國碼和區碼,而 不符合於預鍵域電話麵,也無_利針料叫者電話號碼 乍驗a雖然,系統可以利用驗證機制或選單機制確保電話號碼 的正確性與完整性’但是這只會增加使用者的不便,也增加了系 統的複雜度與成本。 20110616 【發明内容】 本發明之主要目的在提供—健碼驗證系贿方法「主要利用在— 有效時間内具有唯—性與有效性的臨時密碼,判定是否變更使用 狀悲成解關定,而無触證電話號碼,同時對於國外玩家來說, 由於系統沒有驗證電話號碼的需求,玩家也無須考量_與區碼 等問題,大幅降低玩家在驗證上的困擾。 基於上述目的,在本發明密碼驗證系統與方法中,主要包含使用 者資料庫、臨時密碼提示模組和接聽模組。臨時密碼提示模組僅 在接收到的錢者名稱與登人密碼為合法時,才提示系統電話號 碼、相關於使用者名稱的臨時密碼、有效時間。當使用者利用電 話撥打系統電話號碼,並讓接賴組在有效時_接受到臨時密 碼時,而變更相關於臨時密碼的使用狀態成解除鎖定。如此,使 用者再次彻使用者额與登人純登人魏時,就可直接進入 系統,不再處於鎖定狀態。 關於本發明之優點與精神可以藉由以下的發明詳述及所附圖式得 到進一步的瞭解。 【實施方式】 請參閱第1Α〜1C圖,第1Α〜ic圖為本發明密媽驗證系統之示意圖。 如第ΙΑ ®所示,本發_碼驗證純主要包含制者資料庫12、 臨時密碼提示模組14、接聽.使用者資料庫12儲存有複 1355957 20110616 數筆使用者m ’而每-使用者資料包含使用者名稱、使用狀態、 且入也碼51日付碼。這其中,使用狀態為鎖定時,就算使用者 名稱與登人密碼為合法,仙者減法登人遊戲系統 。相反地, 右使用者制f顿20完成指定的解觸作時,使雜態才會成 為解除鎖& ’才允♦柳使用者名稱與登人密碼進人遊戲系統。 簡單來4 ’在本發㈣碼驗證祕與方法中,使用者若需要利用 電話機20完成解鎖動作時’ f先從臨時密碼提示模組14取得相 對的臨時密碼’再透過電話機2G提供給接聽模組16。由於臨時密 碼在有效時間内具有唯一性與有效性,因此使用者在取得臨時密 碼之後’必須在指定的有效時間内提供給接賴組16,否則仍然 無法順利完成解鎖動作。如此,由於在整個解鎖過程中系統無須 驗證電話號碼,使得無需要求使黯事鍵來驗證㈣電話 號碼’同時騎断玩家來說,由於紐沒有驗證電話號碼的需 求,玩家也無須考量國碼與區碼等問題,大幅降低玩家在驗證上 的困擾。 具體來況’當使財首次嘗試彻使用者名稱與登人密碼登入遊 戲系統時’祕先基於彳㈣者資料庫财複數筆仙者資料進行 驗證’並且由於其相對的使職態為鎖定,因此僅在接收到的使 用者名稱與登入密碼為合法時,再透過臨時密碼提示模組Μ提示 系統電話號碼、相關於使用者名稱的臨時密碼、有效時間。這其 中,系統電話號碼可以擁有複數個不同的號碼,而隨機地提供給 1355957 '號碼給全 不同的使用者撥打進入夺續,會 20110616 糸,4亦可提供固定的系統電話j 體使用者撥打進入系:统。 ' … 备使用者取得上述臨時密瑪時,其可利用電話機2〇撥打上述系統 電話號碼’雜接聽模組】6接受_ __的呼叫時,使 用者利用電話機20在上述有效時間内輪人臨時密碼。此時,只要 接聽模組16在上述有效時間内接受到相對的臨時密碼時,便會變 更_於臨時密碼的使用狀態成解除鎖定。如此,只要使用者再 次利用使用者名稱與登入密碼嘗試登入時就可順利地進入遊戲系 統中。須特觀意暇,對於純餘號碼时啊為語音簡 除了上述臨時密碼的驗證手段,傳統㈣話號碼驗證手段,在本 發明密碼驗_統與方法中仍可被顧。只是,相對於傳統手段, 在本發明糾驗證祕與方財,滅無需制者事先建立資 枓’而只需在上述流程中順便將電話㈣所使用的電話號碼紀錄 到使用者資料庫12中,以便作為日後驗證基準。換句話說,每一 使用者資料進-步包含電話號碼,同時當接聽對於系統電話號碼 的呼Μ時將呼叫者電活號碼紀錄至相關於臨時密碼之該電話號 碼中。 =第IB ®所*,只要使用者聽庫12儲存有電話號碼時,電話 =碼驗證触18可跡伽者㈣庫12巾她筆邮者資料的 電話號碼,驗證哞叫者電話號碼(電話機20)是否存在於使用者資 9 20110616 料庫12。右呼叫者電話號碼不存在於使用者資料庫ι2時中斷接受 呼叫。 ' ' —— 如第1C圖所示,只要使用者f料庫12儲存有電話號碼時,電話 號碼驗證模組18可在接聽模組16在有效時間内接受到臨時密碼 時’基於制者資解12巾複姆使財:雜㈣域碼,驗證 呼叫者電話號碼衫吻合於_於臨軸碼的電話號碼。若呼叫 者電話號碼不吻合於_減日输碼的電話朗時情接受呼 叫〇 藉由以上難频實關謂述,鱗雜更加清楚描述本發明 之特徵與精神,而麟以上酬揭露的較佳具體實施例來對本發 明之範4加以限制。相反地,其目的是希望能涵蓋各種改變及且 相等性的安排於本發明所欲申請之專利範圍的範脅内。 【圖式簡單說明】 第1A〜1C圖為本發明密碼驗證系統之示意圖。 【主要元件符號說明】 10密碼驗證系統 12使用者資料庫 14臨時密碼提示模組 1355957 20110616 16接聽模組 18電話號碼驗證模組 20電話機 11Ik is unable to play with technology refurbishment, and the method of stealing the player's account password is becoming more and more technological, and even develops a "trojan" program for specific online game design, so as to use the side to record the account and password entered by the player. These programs are usually hidden in the secret, as long as the start of the red, the program will be automatically executed, and the recorded data will be transmitted to the designated mailbox. Because it is not easy to detect, the account and password of the 20110616 game have been recorded. Knowing that when _ was discovered, the results of "practice" for a long time often disappeared. In order to solve this problem, Wei Wei has proposed "double lock protection for mobile phone locks" to try to solve the problem of account/password being taken. To put it simply, in the "mobile phone lock double defense 4" towel on weekdays, the player's fiber account will be locked by the system 'as long as there is no binding mobile phone or home phone number to open the action' Even if you have a game account and password, you can't log in to avoid theft of game treasures. When the player uses the mobile phone or the home phone with the caller ID function, dial the open line. After the completion of the opening, Wei will automatically hang up the phone and unlock the account of the locking towel, but the player must log in to the game account in three minutes. After three minutes, the system automatically locks the account. = However, under the circumstance, the company has completed the purchase, so that the system does not pre-store the original telephone number, and the pure law verifies the caller's telephone number. Even if the user has already dialed the telephone number, (4), because the error is entered or forgotten to enter the area code or country code in the telephone number, so that the call is made from outside or abroad. Because the caller ID number additionally includes the country code and the area code, it does not meet the pre-key field phone surface, and there is no _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ The correctness and integrity of the phone number 'but this only increases the inconvenience of the user and increases the complexity and cost of the system. 20110616 [Summary of the Invention] The main object of the present invention is to provide a method for bridging the bribe method of "health code verification" mainly by using a temporary password having a uniqueness and validity in a valid time period, and determining whether to change the usage sorrow and deciding. There is no dialect phone number, and for foreign players, because the system does not have the need to verify the phone number, the player does not need to consider the _ and the area code and other issues, greatly reducing the player's troubles in verification. Based on the above purpose, in the present invention The password verification system and method mainly includes a user database, a temporary password prompting module and an answering module. The temporary password prompting module prompts the system telephone number only when the received money name and the attending password are legal. Temporary password and valid time related to the user name. When the user dials the system telephone number by using the telephone and allows the access group to be valid when the temporary password is accepted, the usage status related to the temporary password is changed to unlock. In this way, the user can enter the system directly when the user completes the user's amount and boarding the person. The advantages and spirit of the present invention can be further understood from the following detailed description of the invention and the accompanying drawings. [Embodiment] Please refer to FIG. 1 to FIG. 1C. The schematic diagram of the mother verification system. As shown in the third page, the _ code verification is mainly composed of the manufacturer database 12, the temporary password prompt module 14, and the answer. The user database 12 stores the duplicate 1355957 20110616 number of users. m 'and each user data contains the user name, usage status, and the code is also 51 days. In this case, when the usage status is locked, even if the user name and the login password are legal, the fairy subtracts the boarding game. Conversely, when the right user system completes the specified decoupling, the miscellaneous state will become unlocked & 'allowing the user name and the password to enter the game system. Simple to 4 In the (4) code verification secret and method, if the user needs to use the telephone 20 to complete the unlocking operation, 'f first obtains the relative temporary password from the temporary password prompting module 14' and then provides it through the telephone 2G. The answering module 16. Since the temporary password has uniqueness and validity within the effective time, the user must provide the accessing group 16 within the specified effective time after obtaining the temporary password, otherwise the unlocking operation cannot be successfully completed. In this way, since the system does not need to verify the phone number during the entire unlocking process, there is no need to ask the button to verify (4) the phone number. At the same time, if the player does not have the need to verify the phone number, the player does not need to consider the country code and The problem of area code and other issues greatly reduces the player's troubles in verification. The specific situation 'When the first attempt to enter the user name and the password to log in to the game system, the first secret is based on the 彳(4) database. Verifying 'and because its relative status is locked, so only when the received user name and login password are legal, then through the temporary password prompt module Μ prompt system phone number, related to the user name temporary Password, valid time. Among them, the system phone number can have a plurality of different numbers, and is randomly provided to the 1355957 'number to dial the different users to enter the succession, will be 20110616 糸, 4 can also provide a fixed system phone j body users dial enter the system. When the user obtains the temporary mumma, the user can use the telephone 2 to dial the system telephone number 'missing module' 6 to accept the call of ___, the user uses the telephone 20 to temporarily take turns during the above-mentioned effective time. password. At this time, as long as the answering module 16 receives the relative temporary password within the above-mentioned effective time, it will change _ the use state of the temporary password is unlocked. In this way, the user can smoothly enter the game system as soon as the user attempts to log in again by using the user name and the login password. In particular, for the pure residual number, the voice is simple. In addition to the above-mentioned temporary password verification means, the traditional (four) voice number verification means can still be taken care of in the password verification method and method of the present invention. However, in contrast to the conventional means, in the present invention, the verification of the secret and the financial, the non-requirer establishes the asset in advance, and only needs to record the telephone number used by the telephone (4) in the user database 12 in the above process. In order to serve as a benchmark for future verification. In other words, each user profile further includes a phone number and, when answering a call to the system phone number, records the caller's live number into the phone number associated with the temporary password. = IB ® *, as long as the user listens to the library 12 to store the phone number, the phone = code verification touches the 18 singer (4) library 12 towel her mailer's data number, verifies the caller's phone number (telephone 20) Whether it exists in User Resource 9 20110616 Library 12. The right caller's phone number is interrupted to accept the call when it does not exist in the user database ι2. As shown in FIG. 1C, as long as the user f library 12 stores a phone number, the phone number verification module 18 can be based on the system when the answering module 16 receives the temporary password within the effective time. Solve 12 towel to make money: miscellaneous (four) domain code, verify that the caller's phone number shirt matches the phone number of the _axis code. If the caller's telephone number does not match the telephone number of the _day-receiving code, the call is accepted, and the above description is more difficult to describe the characteristics and spirit of the present invention. The preferred embodiment is intended to limit the scope of the invention. On the contrary, the intention is to cover the various modifications and equivalents of the scope of the invention as claimed. BRIEF DESCRIPTION OF THE DRAWINGS FIGS. 1A to 1C are diagrams showing a password verification system of the present invention. [Main component symbol description] 10 password verification system 12 user database 14 temporary password prompt module 1355957 20110616 16 answering module 18 telephone number verification module 20 telephone 11

Claims (1)

1355957 ,2〇u〇616 十、申請專利範圍: …- ------ 1、 一種密碼驗證系統,包含: 一使用者資料庫’用以儲存有複數筆使用者資 料,每一使用者資料包含一使用者名稱、一 使用狀態、一登入密碼、一臨時密碼,該臨 時密碼在一有效時間内具有唯—性,該使用 狀態為解除鎖定時才允許利用該使用者名稱 與該登入密碼進入系統; 一臨時密碼提示模組,用以基於該使用者資料庫 中複數筆使用者資料進行驗證,並僅在接收 到的使用者名稱與登入密碼為合法時,提示 一系統電話號碼、相關於該使用者名稱的該 臨時密碼、該有效時間;以及 一接聽模組,用以接受對於該系統電話號碼的呼 叫’並在該有效時間内接受到该臨時密碼 時,變更相關於該臨時密碼的該使用狀態成 解除鎖定。 2、 如申請專利範圍第1項所述之密碼驗證系統,其中 每一使用者資料進一步包含一電話號碼。 3、 如申請專利範圍第2項所述之密碼驗證系統,其中 12 1355957 20110616 當接聽對於該系統電話號碼的呼叫時,將呼叫者 電話號碼紀i表至相關於該臨時密碼之該電話號碼… 中〇 4、 如申請專利範圍第2項所述之密碼驗證系統,其中 該祖碼驗證系統進一步包含: 一電話號碼驗證模組,用以基於該使用者資料庫 φ 中複數筆使用者資料的該電話號碼,驗證呼 叫者電話號碼是否存在於該使用者資料庫; 其中,呼叫者電話號碼不存在於該使用者資料庫 時中斷接受呼叫。 5、 如申請專利範圍第2項所述之密碼驗證系統,其中 該在、碼驗證系統進一步包含: φ 一電話號碼驗證模組,用以在該接聽模組在該有 效時間内接受到該臨時密碼時,基於該使用 者資料庫中複數筆使用者資料的該電話號 碼’驗證呼叫者電話號碼是否吻合於相關於 該臨時密石馬的該電話號碼; 其中’呼叫者電話號碼不吻合於相關於該臨時密 碼的該電話號碼時中斷接受呼叫。 13 20110616 6、 如申請專利範圍第i項所述之密碼驗證系統,其中 對於該系統電話號碼的呼叫可為語音或簡訊。 7、 一種密碼驗證方法,包含: 僅在接收到的使用者名稱與登入密碼為合法 時,h示一系統電活遗碼、相關於該使用者 名稱的一臨時密媽、一有效時間;以及 接欠對於該系統電話號碼的呼叫,並在該有效時 間内接受到該臨時密碼時,變更相關於該臨 時密碼的該使用狀態成解除鎖定; 其中’每一使用者資料包含該使用者名稱、該使 用狀態、該登入密碼、該臨時密碼,該臨時 密碼在一有效時間内具有唯一性,該使用狀 態為解除鎖定時才允許利用該使用者名稱與 該登入密碼進入系統。 8如申明專利範圍第7項所述之密碼驗證方法,其中 母一使用者資料進一步包含一電話號碼。 9如申凊專利範圍第8項所述之密碼驗證方法,其中 當接聽對於該系統電話號碼的呼叫時,將呼叫者 電活號碼紀錄至相關於該臨時密碼之該電話號碼 中。 1355957 • 20110616 1 0、如申凊專利範圍第8項所述之密碼驗證方法,其 ’該密4驗證方法進一步包含: 八 當接党對於該系統電話號碼的呼叫時,驗證呼叫 者電話號碼是否存在;以及 若呼叫者電話號碼不存在時中斷接受呼叫。 11、如申請專利範圍第8項所述之密碼驗證方法,其 # 中該密碼驗證方法進一步包含: 在該有效時間内接受到該臨時密碼時,驗證 啤口 ” 者電話號碼是否吻合於相關於該臨時密碼的 該電話號碼; 若呼叫者電話號碼不吻合於相關於該臨時密碼 的該電話號碼時中斷接受呼叫。 12"* Λ 甲請專利範圍第7項所述之密碼驗證方法,其 對於该糸統電話號碼的呼叫可為語音或簡訊。 15 1355957 20110616 七、指定代表圖: (一) 本案指定代表圖為:第(1A )圖。 (二) 本代表圖之元件符號簡單說明: 10密碼驗證系統 12使用者資料庫 14臨時密碼提示模組 16接聽模組 20電話機 八、本案若有化學式時,請揭示最能顯示發明特徵的 化學式:1355957, 2〇u〇616 X. Patent application scope: ...- ------ 1. A password verification system, comprising: a user database for storing a plurality of user data, each user The data includes a user name, a usage status, a login password, and a temporary password. The temporary password has a uniqueness within a valid time, and the use status is the use of the user name and the login password when the lock is released. Entering the system; a temporary password prompting module for verifying based on the plurality of user data in the user database, and prompting a system phone number and related only when the received user name and login password are legal The temporary password of the user name, the valid time; and an answering module for accepting a call to the system phone number and changing the temporary password when the temporary password is accepted within the valid time This state of use is unlocked. 2. The password verification system of claim 1, wherein each user data further comprises a telephone number. 3. The password verification system described in claim 2, wherein 12 1355957 20110616, when answering a call to the telephone number of the system, dials the caller's telephone number to the telephone number associated with the temporary password... The cryptographic verification system of claim 2, wherein the ancestry verification system further comprises: a phone number verification module for determining a plurality of user data based on the user database φ The phone number verifies whether the caller's phone number exists in the user database; wherein the caller's phone number is interrupted to accept the call when it does not exist in the user database. 5. The password verification system according to claim 2, wherein the code verification system further comprises: φ a telephone number verification module, configured to receive the temporary in the effective time of the answering module In the case of a password, the phone number based on the plurality of user profiles in the user database 'verifies whether the caller's phone number matches the phone number associated with the temporary rock horse; wherein 'the caller's phone number does not match the relevant The call is interrupted at the time of the temporary password. 13 20110616 6. The password verification system as claimed in claim i, wherein the call to the system telephone number can be voice or short message. 7. A password verification method, comprising: when a received user name and a login password are legal, h indicates a system electrical activity code, a temporary secret mother associated with the user name, and a valid time; Receiving a call to the telephone number of the system and receiving the temporary password within the valid time, changing the usage status related to the temporary password to unlock; wherein 'each user data includes the user name, The usage status, the login password, and the temporary password are unique within a valid time period, and the usage status is that the user name and the login password are allowed to enter the system when the lock is released. 8. The method of verifying a password as set forth in claim 7 wherein the parent-user data further comprises a telephone number. The password authentication method of claim 8, wherein when the call to the system telephone number is answered, the caller's live number is recorded in the telephone number associated with the temporary password. 1355957 • 20110616 1 0. The password verification method according to item 8 of the claim patent scope, wherein the method of verifying the secret 4 further comprises: when the party receives a call to the telephone number of the system, verifying whether the caller's telephone number is Exist; and interrupt the call if the caller's phone number does not exist. 11. The password verification method according to item 8 of the patent application scope, wherein the password verification method further comprises: when the temporary password is accepted within the valid time, verifying whether the phone number of the beer port is consistent with the relevant The telephone number of the temporary password; if the caller's telephone number does not match the telephone number associated with the temporary password, the call is interrupted. 12"* Λ A request for the password verification method described in claim 7 of the patent scope, The call of the telephone number of the system can be voice or newsletter. 15 1355957 20110616 VII. Designated representative map: (1) The representative representative of the case is: (1A). (2) The symbol of the representative figure is simple: 10 Password verification system 12 user database 14 temporary password prompt module 16 answering module 20 telephone eight. If there is a chemical formula in this case, please disclose the chemical formula that best shows the characteristics of the invention:
TW97107613A 2008-03-05 2008-03-05 Secret code proofing system and method TW200938277A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW97107613A TW200938277A (en) 2008-03-05 2008-03-05 Secret code proofing system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW97107613A TW200938277A (en) 2008-03-05 2008-03-05 Secret code proofing system and method

Publications (2)

Publication Number Publication Date
TW200938277A TW200938277A (en) 2009-09-16
TWI355957B true TWI355957B (en) 2012-01-11

Family

ID=44867258

Family Applications (1)

Application Number Title Priority Date Filing Date
TW97107613A TW200938277A (en) 2008-03-05 2008-03-05 Secret code proofing system and method

Country Status (1)

Country Link
TW (1) TW200938277A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9213822B2 (en) 2012-01-20 2015-12-15 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US11165963B2 (en) 2011-06-05 2021-11-02 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US11960615B2 (en) 2021-06-06 2024-04-16 Apple Inc. Methods and user interfaces for voice-based user profile management
US12517995B2 (en) 2023-05-05 2026-01-06 Apple Inc. Devices, methods, and graphical user interfaces for transitioning between multiple modes of operation

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113286293B (en) * 2021-06-18 2023-07-18 中易通科技股份有限公司 Safe call method, device and system based on safe password key
CN113783869B (en) * 2021-09-08 2023-07-21 上海达龙信息科技有限公司 Cloud application sharing method and device based on sharing link, storage medium and equipment

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11165963B2 (en) 2011-06-05 2021-11-02 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US12262111B2 (en) 2011-06-05 2025-03-25 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US9213822B2 (en) 2012-01-20 2015-12-15 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US9372978B2 (en) 2012-01-20 2016-06-21 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
TWI627552B (en) * 2012-01-20 2018-06-21 蘋果公司 Method for accessing applications, portable multifunction device, and computer readable storage medium
US10007802B2 (en) 2012-01-20 2018-06-26 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US10867059B2 (en) 2012-01-20 2020-12-15 Apple Inc. Device, method, and graphical user interface for accessing an application in a locked device
US11960615B2 (en) 2021-06-06 2024-04-16 Apple Inc. Methods and user interfaces for voice-based user profile management
US12517995B2 (en) 2023-05-05 2026-01-06 Apple Inc. Devices, methods, and graphical user interfaces for transitioning between multiple modes of operation

Also Published As

Publication number Publication date
TW200938277A (en) 2009-09-16

Similar Documents

Publication Publication Date Title
TWI355957B (en)
US8151344B1 (en) Method and apparatus to authenticate a user
CN105991659A (en) Systems and methods for caller identification customization and remote management of communication devices
CN101902328A (en) Method for verifying user identity by using dynamic passwords
KR20030036069A (en) Method and apparatus for certification and authentication of users and computers over networks
CN101335619A (en) Authorized using method of disposal dynamic cipher telephone or short message
TW201038038A (en) Bi-directional communication authentication mechanism
CN104574616B (en) Intelligent electronic door lock control method and control device
CN108055240B (en) A kind of user authentication method of shared automobile
KR20080085648A (en) Account theft prevention system with communication mechanism
CN101854357B (en) Method and system for monitoring network authentication
CN1996839A (en) A low-cost and easy-to-distribute identity verification method and device
CN1653757B (en) access service providing system and access service providing method
US7660770B2 (en) System and method for providing a secure contact management system
CN105072084B (en) Method for establishing data connection between mobile terminal and external device
Herrera Biometric passwords and the Fifth Amendment: How technology has outgrown the right to be free from self-incrimination
FR3101453A1 (en) A method of managing the rights and assets of a user on a blockchain
TWI411280B (en) Anti-spyware system for transmitting and authenticating a password
TWI364678B (en)
TWI468006B (en) No record of phone number verification system and method
TWI403147B (en) System and method for protecting a user data
JP2012108698A (en) Portable terminal, lock control system, and program
TWI380664B (en) Based on the caller id number verification system and method
CN112615890A (en) Safe payment system based on block chain
US20240154957A1 (en) Real-name information package and real-name information security protection method

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees