Method and device for logging using password key, storage medium and processor

A technology of cipher key and storage medium, applied in electrical digital data processing, instruments, digital data authentication, etc., can solve the problems of low information security, limited use range of cipher keys, etc., and achieve the effect of improving information security

Active Publication Date: 2018-12-11
BEIJING HAITAI FANGYUAN HIGH TECH
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a method and device for logging in using a password key, a storage medium, and a processor to at least solve the technical problem that related technologies do not limit the scope of use of the password key, resulting in low information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for logging using password key, storage medium and processor
  • Method and device for logging using password key, storage medium and processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make those skilled in the art better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only Embodiments are part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0020] It should be noted that the terms "first", "second" and the like in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used may be interchanged under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for logging using a password key, a storage medium and a processor. The method comprises the following steps: obtaining identification information and current position information of a current terminal when logging in with a password key, wherein the current terminal is a terminal using the password key, and the current position information is positioninformation of the current terminal; , and allowing the login operation to be performed using the password key when the identification information of the current terminal coincides with the identification information of the authorized terminal recorded in the password key and the current position information coincides with the initial position information at the time of first login using the password key, wherein the authorized terminal is a terminal permitting the use of the password key. The invention solves the technical problem that the use range of the password key is not limited by therelated technology, and the information security is low.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and device for logging in using a password key, a storage medium and a processor. Background technique [0002] At present, among enterprise customers, customers need a password key to support multiple people. For example, a fingerprint password key can be set to enter the fingerprints of 10 people for business authorization. Since the relevant technology does not limit the scope of use of the encryption key, this greatly increases the probability of business information leakage, and even endangers the leakage of personal property information or state secret information, resulting in low information security. For another example, some units use password keys as identity authentication tools for website background system login. Since the scope of use of password keys is not restricted, it will cause system background operators to cause damage to the system with...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/34G06F21/32
CPCG06F21/32G06F21/34G06F2221/2111
Inventor 张娟温作奖安晓江
Owner BEIJING HAITAI FANGYUAN HIGH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products