CN103810431A - Password protection system and method - Google Patents

Password protection system and method Download PDF

Info

Publication number
CN103810431A
CN103810431A CN201210459993.XA CN201210459993A CN103810431A CN 103810431 A CN103810431 A CN 103810431A CN 201210459993 A CN201210459993 A CN 201210459993A CN 103810431 A CN103810431 A CN 103810431A
Authority
CN
China
Prior art keywords
password
electronic installation
user
electronic device
working cell
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210459993.XA
Other languages
Chinese (zh)
Inventor
彭爽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Original Assignee
Hongfujin Precision Industry Shenzhen Co Ltd
Hon Hai Precision Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hongfujin Precision Industry Shenzhen Co Ltd, Hon Hai Precision Industry Co Ltd filed Critical Hongfujin Precision Industry Shenzhen Co Ltd
Priority to CN201210459993.XA priority Critical patent/CN103810431A/en
Priority to TW101144073A priority patent/TW201419025A/en
Publication of CN103810431A publication Critical patent/CN103810431A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

A password protection system and method are applied to a first electronic device; the first electronic device also comprises at least one work unit; the method comprises the steps of setting a first password and a second password in the initialization configuration process of the work unit and encrypting and storing the first password and the second password; when the first electronic device starts the work unit, receiving the password input by a user from the first electronic device; when the received password input by the user from the first electronic device is not same as the first password and exceeds the time limitation, locking the work unit; acquiring the password input by the user from a second electronic device; when the acquired password input by the user from the second electronic device is same as the second password, initializing the first password; logging in the user interface of the work unit after the first password is initialized. According to the password protection system and method, the work unit is prevented from being illegally used by the user.

Description

Cipher protection system and method
Technical field
The present invention relates to a kind of electronic installation cipher protection system and method.
Background technology
At present, for preventing that disabled user from logining operating system or application software, general all can operating system or application software initiated after a password is set while being about to login with interface and prevents that disabled user from using our operating system or application software, but, once password forgets, need reset system or recover former factory and arrange of user.So, forget Password and bring inconvenience to user.
Summary of the invention
In view of above content, be necessary to provide a kind of cipher protection system, it can be used for preventing that disabled user from using working cell.
In view of above content, be also necessary to provide a kind of cipher code protection method, it can be used for preventing that disabled user from using working cell.
A kind of cipher protection system, be applied to the first electronic installation, this first electronic installation also comprises at least one working cell, this system comprises: module is set, for carry out initial configuration process in working cell, first password and the second password are set, and encrypt described first and second password of storage, and described first password is for logining the use interface of described working cell, and described the second password is used for described first password initialization; Receiver module for after completing password and arranging, receives the password of user from described the first electronic installation input in the time that described the first electronic installation starts described working cell; Locking module, not identical with first password and when exceeding number of times and limiting from the password of described the first electronic installation input for working as received user, lock described working cell; Acquisition module, for obtaining the password of user from second electronic device input, described second electronic device communication is connected in described the first electronic installation, and user is from described second electronic device input password and send to described the first electronic installation; The described module that arranges, also for working as obtained user from the password of described second electronic device input with the second password when identical, by first password initialization; And login module, for logining the use interface of described working cell after being initialised at first password.
A kind of cipher code protection method, be applied to the first electronic installation, this first electronic installation also comprises at least one working cell, the method comprises: the first setting steps, carry out arranging in initial configuration process first password and the second password in working cell, and encrypt described first and second password of storage, and described first password is for logining the use interface of described working cell, and described the second password is used for described first password initialization; Receiving step after completing password and arranging, receives the password of user from described the first electronic installation input in the time that described the first electronic installation starts described working cell; Lock step, when received user is not identical with first password and when exceeding number of times and limiting from the password of described the first electronic installation input, locks described working cell; Obtaining step, obtains the password of user from second electronic device input, and described second electronic device communication is connected in described the first electronic installation, and user is from described second electronic device input password and send to described the first electronic installation; The second setting steps, when obtained user is from the password of described second electronic device input with the second password when identical, by first password initialization; And login step, after being initialised, logins first password the use interface of described working cell.
Compared to prior art; described cipher protection system and method; it can utilize first password to prevent that disabled user from using described working cell, and can be carried out first password described in initialization and be logined the use interface of described working cell by the second password in the time that user forgets described first password.
Accompanying drawing explanation
Fig. 1 is the running environment figure of cipher protection system of the present invention.
Fig. 2 is the functional block diagram of cipher protection system of the present invention.
Fig. 3 is the process flow diagram of the preferred embodiment of cipher code protection method of the present invention.
Main element symbol description
The first electronic installation 100
Second electronic device 200
Cipher protection system 10
Working cell 20
Storer 30
Processor 40
Module is set 11
Receiver module 12
Judge module 13
Login module 14
Locking module 15
Acquisition module 16
Following embodiment further illustrates the present invention in connection with above-mentioned accompanying drawing.
Embodiment
As shown in Figure 1, be the running environment figure of cipher protection system of the present invention.In the present embodiment, cipher protection system 10 runs in the first electronic installation 100, and this first electronic installation 100 comprises at least one working cell 20, and described working cell 20 can be operating system or application software.
In the present embodiment; described cipher protection system 10 is for arranging first password and prevent that disabled user from logining the use interface of described working cell 20 and in the time that user forgetting described first password; user can be connected to second electronic device 200 communications described the first electronic installation 100; input the second set password and send to described the first electronic installation 100 from described second electronic device 200; described cipher protection system 10 gets after the second password, by described first password initialization and login the use interface of described working cell 20.
Described first and second electronic installation 100,200 can be the electronic equipments such as computing machine, mobile phone, and can pass through for example NFC(Near FieldCommunication of cable network, wireless network, near-field communication), bluetooth, the mode such as infrared set up communication and connect.For example; described second electronic device 200 can send to described the first electronic installation 100 by the second password with short message mode, reads out after the second sent password described first password initialization and login the use interface of described working cell 20 note that described cipher protection system 10 can receive from described the first electronic installation 100.
Described second electronic device 200 also can send to described the first electronic installation 100 by described the second password to send a for example text form of file that stores the second password, and described cipher protection system 10 can read out after described the second password described first password initialization and login the use interface of described working cell 20 from received file.
Described storer 30 for storing various data, for example, is stored the sequencing code of described cipher protection system 10.In the present embodiment, described cipher protection system 10 can be divided into one or more modules, and described one or more modules are stored in described storer 30 and by processor 40 and carry out, to complete function provided by the invention.For example, consult shown in Fig. 2, described cipher protection system 10 is divided into and module 11, receiver module 12, judge module 13 are set, login module 14, locking module 15 and acquisition module 16.Function about each module will specifically describe in the process flow diagram of Fig. 3.
As shown in Figure 3, be the process flow diagram of the preferred embodiment of cipher code protection method of the present invention.
Step S1, module 11 is set first password and the second password are set in initial configuration process is carried out in working cell 20, and encrypt and store described first and second password, described first password is for logining the use interface of described working cell 20, and described the second password is used for described first password initialization.
The present embodiment illustrates take described working cell 20 as Windows operating systems, particularly, after having installed Windows operating system, described the first electronic installation 100 can restart, in restarting process, Windows operating system need be carried out initial configuration, now can first and second password be set by the described module 11 that arranges, for example, first password be set for " password.123 ", the second password is also encrypted and is stored in described storer 30 for " password.321 ".
Step S2, when described the first electronic installation 100 is during in the described working cell 20 of follow-up startup, user need input password and can login the use interface of described working cell 20.Receiver module 12 receives the password that user inputs from the first electronic installation 100.
Particularly, can start completely in described working cell 20 and while entering with interface, show that a window inputs password and login the use interface of described working cell 20 from described the first electronic installation 100 for user, for example user inputs password for " password ", and described receiver module 12 receives this user and inputs password " password ".
Step S3, whether judge module 13 is deciphered the password that stored first password the user that receives of judgement input from the first electronic installation 100 identical with first password, if execution step S4, if the password that user inputs from the first electronic installation 100 be user not identical with first password inputs password mistake, now perform step S5.
Step S4, logins module 14 and logins the use interface of working cell 20.
Step S5, judge module 13 judges whether the number of times that user inputs password mistake continuously from the first electronic installation 100 reaches number of times restriction, if perform step S6, otherwise gets back to step S2, continues to receive the password that user inputs from the first electronic installation 100.
For example, the continuous input error password of user number of times reaches number of times restriction (as 3 times), and flow performing is to step S6.
Step S6, locking module 15 locks described working cell 20.For example can no longer show for user and input the window of password and only show that a miscue information is as " input error password exceedes number of times restriction continuously " from described the first electronic installation 100.
Step S7, is connected to the first electronic installation 100 by second electronic device 200 communications, for example, make described second electronic device 200 set up communication with described the first electronic installation 100 by communication modes such as bluetooth, infrared, NFC and be connected.User inputs password by second electronic device 200 and sends to the first electronic installation 100, and acquisition module 16 obtains the password that this user inputs from second electronic device 200.
Particularly, user can set up a text at described second electronic device 200, in text file, input password and preserve, text file is sent to described the first electronic installation 100 by modes such as bluetooth, infrared, NFC by described text, the text file that described acquisition module 16 receives from described the first electronic installation 100, read out the password of described user from input described in second electronic device 200.For example getting the password that user inputs from described second electronic device 200 is " password.321 ".
User also can send to described the first electronic installation 100 with short message mode by described the second password from described second electronic device 200, and 16 of described acquisition modules read out the password that user inputs from described second electronic device 200 from received note.
Step S8, whether judge module 13 is deciphered the password that the second stored password the user that obtains of judgement input from second electronic device 200 identical with the second password, if perform step S9, otherwise, get back to step S7, continue to receive the password that user inputs from second electronic device 200.
Step S9, arranges module 11 by first password initialization.For example first password is initialized as " 1234 ", after initialization, gets back to process step S4, login module 14 and login the use interface of described working cell 20 after first password is initialised.Follow-up described the first electronic installation 100 is starting when described working cell 20, and user can the password from the first electronic installation 100 input initializations can login the use interface of described working cell 20.
Finally it should be noted that, above embodiment is only unrestricted in order to technical scheme of the present invention to be described, although the present invention is had been described in detail with reference to preferred embodiment, those of ordinary skill in the art is to be understood that, can modify or be equal to replacement technical scheme of the present invention, and not depart from the spirit and scope of technical solution of the present invention.

Claims (8)

1. a cipher protection system, is applied to the first electronic installation, and this first electronic installation comprises at least one working cell, it is characterized in that, this system comprises:
Module is set, for carry out initial configuration process in working cell, first password and the second password are set, and encrypt described first and second password of storage, and described first password is for logining the use interface of described working cell, and described the second password is used for described first password initialization;
Receiver module for after completing password and arranging, receives the password of user from described the first electronic installation input in the time that described the first electronic installation starts described working cell;
Locking module, while exceeding restriction, locks described working cell for working as received user from the password number of times not identical with first password and input password mistake of described the first electronic installation input;
Acquisition module, for obtaining the password of user from second electronic device input, described second electronic device communication is connected in described the first electronic installation, and user is from described second electronic device input password and send to described the first electronic installation;
The described module that arranges, also for working as obtained user from the password of described second electronic device input with the second password when identical, by first password initialization; And
Login module, for logining the use interface of described working cell after being initialised at first password.
2. cipher protection system as claimed in claim 1, is characterized in that, described working cell is operating system or application software.
3. cipher protection system as claimed in claim 1; it is characterized in that; in the time that user sends to described the first electronic installation with short message mode by the described password from second electronic device input, the note that described acquisition module receives from described the first electronic installation, read the password of user from described second electronic device input.
4. cipher protection system as claimed in claim 1; it is characterized in that; in the time that user sends to described the first electronic installation with text form by the described password from second electronic device input, described acquisition module reads the password of user from described second electronic device input from the received text of described the first electronic installation.
5. a cipher code protection method, is applied to the first electronic installation, and this first electronic installation comprises at least one working cell, it is characterized in that, the method comprises:
The first setting steps, carry out arranging in initial configuration process first password and the second password in working cell, and encrypt described first and second password of storage, and described first password is for logining the use interface of described working cell, and described the second password is used for described first password initialization;
Receiving step after completing password and arranging, receives the password of user from described the first electronic installation input in the time that described the first electronic installation starts described working cell;
Lock step, in the time that received user exceedes restriction from the password number of times not identical with first password and input password mistake of described the first electronic installation input, locks described working cell;
Obtaining step, obtains the password of user from second electronic device input, and described second electronic device communication is connected in described the first electronic installation, and user is from described second electronic device input password and send to described the first electronic installation;
The second setting steps, when obtained user is from the password of described second electronic device input with the second password when identical, by first password initialization; And
Login step, after first password is initialised, login the use interface of described working cell.
6. cipher code protection method as claimed in claim 5, is characterized in that, described working cell is operating system or application software.
7. cipher code protection method as claimed in claim 5; it is characterized in that; in the time that user sends to described the first electronic installation with short message mode by the described password from second electronic device input, the note that described obtaining step receives from described the first electronic installation, read the password of user from described second electronic device input.
8. cipher code protection method as claimed in claim 5; it is characterized in that; in the time that user sends to described the first electronic installation with text form by the described password from second electronic device input, described obtaining step reads the password of user from described second electronic device input from the received text of described the first electronic installation.
CN201210459993.XA 2012-11-15 2012-11-15 Password protection system and method Pending CN103810431A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201210459993.XA CN103810431A (en) 2012-11-15 2012-11-15 Password protection system and method
TW101144073A TW201419025A (en) 2012-11-15 2012-11-23 Password protecting system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210459993.XA CN103810431A (en) 2012-11-15 2012-11-15 Password protection system and method

Publications (1)

Publication Number Publication Date
CN103810431A true CN103810431A (en) 2014-05-21

Family

ID=50707184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210459993.XA Pending CN103810431A (en) 2012-11-15 2012-11-15 Password protection system and method

Country Status (2)

Country Link
CN (1) CN103810431A (en)
TW (1) TW201419025A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109032442A (en) * 2018-06-26 2018-12-18 Oppo(重庆)智能科技有限公司 Content display method, device, storage medium and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6067621A (en) * 1996-10-05 2000-05-23 Samsung Electronics Co., Ltd. User authentication system for authenticating an authorized user of an IC card
TW200811686A (en) * 2006-08-25 2008-03-01 Compal Electronics Inc Identification mathod
CN101742060A (en) * 2008-11-21 2010-06-16 康佳集团股份有限公司 Dynamic password control method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6067621A (en) * 1996-10-05 2000-05-23 Samsung Electronics Co., Ltd. User authentication system for authenticating an authorized user of an IC card
TW200811686A (en) * 2006-08-25 2008-03-01 Compal Electronics Inc Identification mathod
CN101742060A (en) * 2008-11-21 2010-06-16 康佳集团股份有限公司 Dynamic password control method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109032442A (en) * 2018-06-26 2018-12-18 Oppo(重庆)智能科技有限公司 Content display method, device, storage medium and electronic equipment

Also Published As

Publication number Publication date
TW201419025A (en) 2014-05-16

Similar Documents

Publication Publication Date Title
CA3121023C (en) Wireless access credential system
US11216549B2 (en) Security verification method and device
US9451454B2 (en) Mobile device identification for secure device access
EP3123660B1 (en) Method and apparatus for supporting login through user terminal
CN102708324B (en) A kind of screen unlocking system and method
WO2013182119A1 (en) Screen unlocking method, device and terminal
US10154026B2 (en) Secure remote modification of device credentials using device-generated credentials
US9078135B2 (en) Mobile device password reset
US9699656B2 (en) Systems and methods of authenticating and controlling access over customer data
CN104715178A (en) Electronic device unlocking system and method
CN104952128A (en) Intelligent handheld terminal based electronic unlocking system and unlocking method thereof
CN104966007A (en) Multi-user login method and apparatus
US20170084100A1 (en) Locking control device, locking control system, and locking control method
US9946859B2 (en) Systems and methods for enabling a lock screen of an electronic device
WO2013152136A1 (en) Authentication token
CN105518688A (en) Terminal device, terminal protecting method for same, and terminal managing server device
CN101268712B (en) Method and a device to suspend the access to a service
CA3006190A1 (en) Electric lock and control method thereof
CN112751803B (en) Method, apparatus, and computer-readable storage medium for managing objects
CN103810431A (en) Password protection system and method
CN104376251A (en) Computer, computer start-up control system and computer start-up control method
US20160050066A1 (en) Management of an encryption key for a secure data storage device on a trusted device paired to the secure device over a personal area network
CN107105082B (en) Method for unlocking network of terminal, method and device for starting terminal
US11812266B2 (en) Systems and methods for network-based authentication for connected vehicle access
CN103366131A (en) NFC mouse, data transmission method and login method of mouse

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140521

RJ01 Rejection of invention patent application after publication