Method and device for managing authentication data
A data management and authentication technology, applied in the computer field, can solve problems such as password leakage, poor security, password server being attacked by hackers, etc., and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027] In this embodiment, description will be made from the perspective of an authentication data management device. The authentication data management device may specifically be integrated into various devices that need to manage authentication data, such as terminals or servers, among which, Specifically, the terminal may be a mobile phone, a tablet computer, a notebook computer, or a personal computer (PC, Personal Computer).
[0028] A method for managing authentication data, comprising: monitoring user behavior to obtain monitoring information; determining the user's new account according to the monitoring information, and when setting the authentication data of the account, calling the authentication data management interface; receiving the user through The description information of the authentication data input by the authentication data management interface; establish the mapping relationship between the account and the description information, and save the mapping re...
Embodiment 2
[0056] According to the method described in Embodiment 1, an example will be given below for further detailed description.
[0057] In this embodiment, description will be made by taking the authentication data management device integrated in the terminal as an example.
[0058] A method for managing authentication data, such as figure 2 As shown, the specific process can be as follows:
[0059] 201. The terminal monitors user behavior to obtain monitoring information.
[0060] For example, the user's online behavior can be specifically monitored, such as registering an account on a certain website, or applying for a certain mailbox, and so on.
[0061] 202. When the terminal determines that the user creates an account according to the monitoring information, and sets the authentication data of the account, the terminal invokes an authentication data management interface.
[0062] For example, when the monitoring information indicates that the user registers a new account ...
Embodiment 3
[0083] In order to better implement the above method, the embodiment of the present invention also provides an authentication data management device, such as Figure 3a As shown, the authentication data management device includes a monitoring unit 301, a calling unit 302, a receiving unit 303, an establishing unit 304 and a reminder unit 305, as follows:
[0084] The monitoring unit 301 is configured to monitor user behavior and obtain monitoring information.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


