Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for managing authentication data

A data management and authentication technology, applied in the computer field, can solve problems such as password leakage, poor security, password server being attacked by hackers, etc., and achieve the effect of improving security

Active Publication Date: 2018-09-04
SHENZHEN TENCENT COMP SYST CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] During the research and practice of the prior art, the inventor of the present invention found that although the password management software can realize the unified management of passwords, the security is not good. For example, if the local password file is leaked, or the password server is hacker attack, will lead to password disclosure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for managing authentication data
  • Method and device for managing authentication data
  • Method and device for managing authentication data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] In this embodiment, description will be made from the perspective of an authentication data management device. The authentication data management device may specifically be integrated into various devices that need to manage authentication data, such as terminals or servers, among which, Specifically, the terminal may be a mobile phone, a tablet computer, a notebook computer, or a personal computer (PC, Personal Computer).

[0028] A method for managing authentication data, comprising: monitoring user behavior to obtain monitoring information; determining the user's new account according to the monitoring information, and when setting the authentication data of the account, calling the authentication data management interface; receiving the user through The description information of the authentication data input by the authentication data management interface; establish the mapping relationship between the account and the description information, and save the mapping re...

Embodiment 2

[0056] According to the method described in Embodiment 1, an example will be given below for further detailed description.

[0057] In this embodiment, description will be made by taking the authentication data management device integrated in the terminal as an example.

[0058] A method for managing authentication data, such as figure 2 As shown, the specific process can be as follows:

[0059] 201. The terminal monitors user behavior to obtain monitoring information.

[0060] For example, the user's online behavior can be specifically monitored, such as registering an account on a certain website, or applying for a certain mailbox, and so on.

[0061] 202. When the terminal determines that the user creates an account according to the monitoring information, and sets the authentication data of the account, the terminal invokes an authentication data management interface.

[0062] For example, when the monitoring information indicates that the user registers a new account ...

Embodiment 3

[0083] In order to better implement the above method, the embodiment of the present invention also provides an authentication data management device, such as Figure 3a As shown, the authentication data management device includes a monitoring unit 301, a calling unit 302, a receiving unit 303, an establishing unit 304 and a reminder unit 305, as follows:

[0084] The monitoring unit 301 is configured to monitor user behavior and obtain monitoring information.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a management method and apparatus for authentication data. The embodiment of the present invention adopts the scheme of monitoring user behaviors, taking an authentication data management interface when determining that a user newly creates an account and sets the authentication data of the account according to monitoring information, receiving description information, which is input by the user through the authentication data management interface, of the authentication data, establishing a mapping relation between the account and the description information, storing the mapping relation into a database and carrying out content reminding of the authentication data on the user on the basis of the mapping relation when the user inquires the authentication data. According to the scheme, when uniform management on the authentication data is implemented, safety can be improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for managing authentication data. Background technique [0002] With the development of Internet technology, the Internet and people's lives are getting closer and closer. While enjoying the convenience brought by Internet technology, people are also facing issues such as personal information security. In order to ensure the security of personal information, when using the Internet For various services, it is necessary to register various accounts and set various passwords. Among them, different services have different requirements for password settings, such as passwords must be longer than 8 characters, or need to contain uppercase and lowercase English letters, etc.; some even require users to reset passwords regularly to ensure password security. For this reason, the user needs to remember various passwords, which brings certain troubles to the user. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/62
CPCG06F21/31G06F21/6245G06F2221/2141
Inventor 谢志聪
Owner SHENZHEN TENCENT COMP SYST CO LTD