![]() method and device to manage identity for mobile terminal
专利摘要:
METHOD AND APPARATUS TO MANAGE IDENTITY FOR MOBILE TERMINAL. The present invention relates to a method and apparatus for managing an identity for a mobile terminal. The method comprises identifying an application that sends an identity verification request when receiving the identity verification request from one of multiple applications, sending a request message obtained in accordance with the identity verification request to an identity verification server ; and notifying all applications in a relative application list that comprises the identified application of an identity verification result obtained according to a message returned when receiving the message returned from the identity verification server. Using the modalities of the technical solution of the present invention, centralized management is performed for user identity information and the verification of user identity, the cost of development and maintenance is reduced, the security of the user account is increased, and the User operations are facilitated. 公开号:BR112013018940B1 申请号:R112013018940-1 申请日:2012-01-11 公开日:2021-03-09 发明作者:Tao Zhu;Jungui CHEN;Feng Wang 申请人:Tencent Technology (Shenzhen) Company Limited; IPC主号:
专利说明:
[001] This application claims the priority of International Application Number PCT / CN2012 / 070228, filed on January 11, 2012, which claims priority of Chinese Patent Application Number 201110032478.9, filed on January 27, 2011, the entire contents of all of which are incorporated herein by reference in their entirety for all purposes. TECHNICAL FIELD [002] The present invention relates to mobile communication technologies, more specifically, to a method and apparatus for managing an identity for a mobile terminal. BACKGROUND [003] Along with the developments in mobile communication technologies and embedded technologies, the functions of mobile terminals have become increasingly powerful. Through applications on mobile terminals, users can browse news, receive and send emails, and chat with other network users, etc. Many applications, such as Instant Messenger (IM) software, online games, email clients, etc., will not function normally unless identity verification on the side of a server is verified. Thus, in addition to the main functional modules, the application that requires identity verification also includes an identity management module which is configured to manage account information and interact with the server side for identity verification, etc. [004] In existing technologies, each application that needs identity verification includes a similar identity verification module. Thus, similar software functions are developed repeatedly, and for the mobile terminal which has much less processing power and storage capacity when compared to a personal computer (PC), many processing capacities and much more storage space. are consumed. Furthermore, an Internet corporation usually develops a series of applications for users, and the user can log into the series of applications using the same identity (for example, the same account and the same password). In this case, the user prefers no more identity verification operations when logging into other relative applications after the previous identity verification has been performed once. For example, after logging into a QQ space application using a QQ account, the user wants to log in directly to a QQ microblog and a QQ mailbox using the same QQ account without any further identity verification. Unfortunately, in existing technical solutions, identity information is not shared between different applications. Each of the applications requires the user to perform an identity check when opening, so that the same identity is verified multiple times. Consequently, the user cannot enjoy homogeneous experiences, and a risk of leaking user identity is increased. Furthermore, as the same identity information is used by several applications and a centralized management cannot be performed, the security risk is increased. In addition, if a specific operation (for example, inserting a verification code) needs to be supplemented with the identity verification operation of all applications, each application needs to be configured respectively, which is extremely problematic and laborious. [005] In summary, existing identity management solutions at least have the following shortcomings: software functions are developed repeatedly, user identities are managed separately, the security risk is high and it is difficult to modify settings. SUMMARY [006] In view of the above, the modalities of the present invention provide a method and apparatus for managing an identity for a mobile terminal, in order to implement centralized management for user identity information and user identity verification. [007] The technical solutions are implemented below. [008] A method for managing an identity for a mobile terminal comprises: [009] on a mobile terminal that has one or more processors and one or more memories, identify an application that sends an identity verification bid when receiving the identity verification request from one of multiple applications, send a message of request obtained in accordance with the identity verification request to an identity verification server; and [0010] notify all applications in a relative application list comprising the identified application of an identity verification result obtained according to a message returned when receiving the message returned from the identity verification server. [0011] A device for managing an identity for a mobile terminal comprises: [0012] one or more processors; [0013] one or more memories that store the modules executed by one or more processors that comprise: [0014] an identification module, adapted to identify an application that sends an identity verification request when receiving the identity verification request from one of multiple applications; [0015] a sending and receiving module, adapted to send a request message obtained according to the identity verification request to an identity verification server, and to receive a message returned from the identity verification server; and [0016] a notification module, adapted to notify all applications in a relative application list that comprises the identified application of an identity verification result obtained according to the returned message. [0017] A machine-readable storage medium that stores instructions to make a mobile terminal execute a method comprises: [0018] identify an application that sends the identity verification request when receiving the identity verification request from one of multiple applications, send a request message obtained according to the identity verification request to an identity verification server identity; and [0019] notify all applications in a relative application list that comprises the identified application of an identity verification result obtained according to a message returned when receiving the message returned from the identity verification server. [0020] It can be seen from the solutions above, the modalities of this invention provide an identity management solution to implement centralized management for identity information and identity verification. In solutions, identity verification requests from multiple applications are received and sent to the identity verification servers that correspond to the applications, so that repeated development of software functions is avoided, centralized management is performed for the applications. user information, security risk is reduced, and it is convenient to update the identity management solution. In addition, the list of relative applications is established in the identity management solution provided by the modalities of the present invention, so that when the verification result of an application in the list is received, all applications in the list are notified of the verification result. . Therefore, applications in the list can directly implement traffic logic without requiring identity verification, user time is saved and the risk of identity leakage caused by repeated verification is reduced. BRIEF DESCRIPTION OF THE DRAWINGS [0021] Specific examples of the present invention will hereinafter be illustrated in detail with reference to the accompanying drawings, so that the above and other characteristics and merits of the present invention will become clearer to those skilled in the art. [0022] Figure 1 is a flow chart illustrating the identity verification for an application on a mobile terminal according to some modalities of the present invention; [0023] Figure 2 is a schematic diagram illustrating a structure of an apparatus for managing an identity for a mobile terminal in accordance with some embodiments of the present invention. DETAILED DESCRIPTION [0024] The modalities of the present invention provide a method and apparatus for managing an identity for a mobile terminal, in order to implement centralized identity information management and centralized identity verification for multiple applications on the mobile terminal. [0025] The following description is purely illustrative in nature and is in no way intended to limit the description, its application or uses. The extensive teachings of the description can be implemented in a variety of ways. Therefore, although this description includes specific examples, the true scope of the description should not be so limited as other changes will be apparent from a study of the drawings, the specification and the following claims. For the sake of clarity, the same reference numbers will be used in the drawings to identify similar elements. [0026] The terms used in this specification generally have their common meanings in the technique, within the context of the presentation, and in the specific context where each term is used. Certain terms that are used to describe the description are discussed below, or elsewhere in the specification, to provide additional guidance for a professional regarding the description of the presentation. The use of examples anywhere in this specification, including examples of any terms discussed herein, is illustrative only and in no way limits the scope and meaning of the description or any exemplified term. Likewise, the description is not limited to the various modalities given in this specification. [0027] As used in the description here and throughout all the following vindications, the meaning of "one", "one", and "o" includes the plural reference unless the context clearly dictates otherwise. Also, as used herein in the description and throughout all the claims that follow, the meaning of "inside" includes "inside" and "about" unless the context clearly dictates otherwise. [0028] As used herein, the terms "comprising", "including", "having", "containing", "involving", and the like should be understood to be open, that is, to mean including but not limited to . [0029] As used herein, the phrase "at least one of A, B, and C" must be considered to mean a logical (A or B or C), using a non-exclusive OR logic. It should be understood that one or more steps within a method can be performed in a different order (or concurrently) without changing the principles of this description. [0030] As used herein, the term "module" can refer to, be part of, or include an Application Specific Integrated Circuit (ASIC); an electronic circuit; a combinational logic circuit; a network of programmable ports in the field (FPGA); a processor (shared, dedicated, or group) that executes code; other suitable hardware components that provide the described functionality; or a combination of some or all of the above, such as on a chip system. The term module can include a memory (shared, dedicated, or group) that stores code executed by the processor. [0031] The term "code", as used herein, can include software, firmware, and / or microcode, and can refer to programs, routines, functions, classes, and / or objects. The term "shared", as used herein, means that some or all codes from multiple modules can be executed using a single (shared) processor. In addition, some or all codes from multiple modules can be stored by a single (shared) memory. The term "group" as used herein means that some or all of the codes of a single module can be executed using a group of processors. In addition, some or all of the codes for a single module can be stored using a memory group. [0032] The systems and methods described herein can be implemented by one or more computer programs executed by one or more processors. Computer programs include executable instructions per processor that are stored in a non-transitory, tangible computer-readable medium. Computer programs can also include stored data. Non-limiting examples of the non-transient, tangible computer-readable medium are non-volatile memory, magnetic storage and optical storage. [0033] The description will be made as to the modalities of the present invention together with the accompanying drawings in figures 12. It should be understood that the specific modalities described herein are merely intended to explain the present invention, but are not intended to limit the present invention. In accordance with the purposes of this invention, as incorporated and widely described herein, this invention, in one aspect, relates to a method and apparatus for managing an identity for a mobile end. [0034] Examples of mobile terminals that can be used according to various modalities include, but are not limited to, a tablet PC (including, but not limited to Apple iPad and other touch screen devices running Apple iOS, Microsoft Surface and other touch screen devices that run on the Windows operating system, and devices that run on the Android operating system), a mobile phone, a smartphone (including, but not limited to, an Apple iPhone, a Windows Phone, and other smartphones that run the Windows Mobile or Pocket PC operating system, and smartphones running the Android operating system, the Blackberry operating system, or Symbian operating system), a voter (including, but not limited to, Amazon Kindle and Barnes & Noble Nook), a laptop computer (including, but not limited to, computers running the Apple Mac operating system, the Windows operating system, the Android operating system and / or the operating system Google Chrome), or a vehicle device that executes any of the aforementioned operating systems or any other operating system, all of which are well known to those skilled in the art. [0035] In the modalities of the present invention, in order to provide an identity verification service for multiple applications on the mobile terminal and to avoid repeatedly verifying an identity which has been verified, when an identity verification request from one of multiple applications is received, an application that sends the identity verification request is identified, a request message obtained in accordance with the identity verification request is sent to an identity verification server, and when a message returned from the identity verification server is received, all applications in a relative application list including the identified application are notified of an identity verification result obtained according to the returned message. [0036] Figure 1 is a flow chart illustrating the identity verification for an application on a mobile terminal according to an example of the present invention. As shown in figure 1, the method includes the following steps. [0037] In step 101 in response to starting an event from one of multiple applications, connect an identity management device. [0038] When the identity management device is turned on, a storage module in the identity management device is initialized. The data stored in the storage module includes: user information, a list of application information and more than a list of relative applications. User information includes simple information relating to a user (that is, public information not related to the user's privacy) and identity information (that is, binary information that uniquely identifies a user's identity), etc. The list of application information includes the application identifier information and a server address that corresponds to each application, etc. Each relative application list includes the identifier information for multiple applications which are published by an incorporation, and the multiple applications share an account for logging on to a server. The identity management device can automatically add a set of applications to the relative application list by identifying some fields in the application identifier information. In addition, the application can add itself to more than one list of relative applications by registering a receiver used to receive information such as the result of identity verification, so that when the identity management device notifies another application that asks for identity verification of the identity verification result, the application can also receive the identity verification result. The information is stored in the storage module using a ciphertext mode. After the initialization is completed, the stored information is decrypted to be read, and is stored in an internal memory using a hash list. [0039] In step 102, at least one of the multiple applications sends an identity verification request to the identity management device. [0040] Before sending the identity verification request, the application can read the user information in the hash list to select the appropriate identity information (for example, an account); or the application can write or modify the identity information directly, and the identity management device needs to store the written or modified identity information in the hash list and in the storage module. As multiple applications on the mobile terminal share the identity management device, it is possible for several chains or applications to access the data stored in the identity management device and modify the data simultaneously, the security of competing accesses needs to be guaranteed. In the embodiments of the present invention, the hash list is guaranteed to be accessed in series, which is implemented by different operating systems in different modes. For example, under the Android operating system, a hash structure of the type ConcurrentHashMap is implemented, and, under the operation of Windows Mobile, an object, for example, a critical region is used to guarantee serial access to the codes of the hash list. [0041] In step 103, when receiving the identity verification request, the identity management device identifies the application by sending the identity verification request. [0042] For the purpose of submitting the identity verification request and notifying an identity verification result later, the identity management device uses the application identifier information extracted from the identity verification request, searches the list from application information to application-related information, for example, an address of an identity verification server that corresponds to the application and a list of relative applications that includes the application. If the application's identifier information is not included in the application information list, the application is requested to send the relative information, and the relative information obtained is stored in the application information list. [0043] In step 104, the identity verification request is encrypted. [0044] The identity information (for example, an account and a password) in the identity verification request is encrypted. Different encryption algorithms can be used to request identity verification for different applications. The encryption algorithm can be loaded onto the identity management device in advance by the application or by the identity verification server that corresponds to the application. [0045] In step 105, the identity management device sends the encrypted identity verification request to the identity verification server as a request message. [0046] In step 106, when receiving the request message, the identity verification server decrypts the request message performs relative identity verification and generates a returned message, encrypts the identity information in the returned message and then performs a secondary encryption for the entire message returned. [0047] In step 107, the identity verification server sends the returned message to the identity management device. [0048] In step 108, after receiving the returned message, the identity management device decrypts the returned message to determine if the identity verification request was successful. [0049] If the identity verification has failed, the stored user identity information is removed. [0050] If the identity verification was successful, the identity information in the returned message is decrypted to obtain and store the identity information. The identity information returned by the identity verification server includes two discrete fields, the identity management appliance needs to decipher the two discrete fields to obtain the identity information that can be used. For example, the identity information fields in the return information are s1 and s3, after deciphering the two fields, the identity management device obtains s2 as the final identity information. The identity management device updates and stores the identity information obtained locally, so that the identity information will be used when the application requires the relative user identity information. [0051] In step 109, the identity management device notifies all applications in the relative application list of the verification result, the relative application list includes the application identified in step 103. [0052] If the identity verification has failed, the identity management device notifies all applications in the relative application list of a failure reason. [0053] Thus, the identity verification process ends. [0054] The above identity verification process can be used for not only verification of user identity login, but also verification of identity logout, verification of identity change. When such an event, for example, a login success, a login failure, an identity logout check, and an identity change occurs for each application, the relative applications receive a transmission notification from the identity management appliance in time , so that the user only needs to be verified once, and then can use the relative software services. [0055] In another mode, in the steps above, the encryption and decryption operations (steps 104 and 108) performed by the identity management device can be performed by the application itself. In this case, the identity management appliance is only responsible for identifying the application that sends the identity verification request, sending the identity verification request as the request message to the identity verification server, receiving the message returned from the server identity verification, and notify all applications in the relative application list including the identified application of the identity verification result. [0056] Figure 2 is a schematic diagram illustrating a structure of an apparatus for managing an identity for a mobile terminal according to an example of the present invention. [0057] As shown in figure 2, the device for managing the identity for the mobile terminal is an identity management device which includes: a storage module 201, an identification module 202, a sending and receiving module 203 and a notification module 204. [0058] The storage module 201 stores the list of application information that corresponds to the multiple applications in a mobile terminal, the user information, more than a list of relative applications. When identity verification has failed, storage module 201 erases identity information related to an identity verification request, when identity verification has been successful, storage module 201 stores identity information which is related to an identity verification request. identity verification request and are returned by an identity verification server. [0059] When receiving the identity verification request from one of the multiple applications, an identification module 202 identifies an application that sends an identity verification request. Specifically, the identification module 202 uses the identifier information extracted from the identity verification request, searches the list of application information stored in the storage module 201 for the information relating to the application. Information related to the application includes: an address of the identity verification server that corresponds to the application and a list of relative applications that includes the application. If the application-related information is not searched, the identification module 202 asks the application to send the related information, and stores the relative information obtained from the application information list in the storage module 201. [0060] The sending and receiving module 203 sends a request message obtained according to the identity verification request to the identity verification server, and receives a message returned from the identity verification server. [0061] Notification module 204 notifies all applications in the relative application list that includes the identified application of an identity verification result obtained according to the returned message. When identity verification has failed, notification module 204 also notifies all applications in the relative application list that includes the identified application for a failure reason. [0062] The identity management device may alternatively include an encryption and decryption module 205. The encryption and decryption module 205 can select an encryption and decryption algorithm to encrypt the identity verification request or encrypt only the information identity in the identity verification request, and then provide the encrypted identity verification request as the request message for the sending and receiving module 203. The encryption and decryption module 205 can also select an encryption and decryption algorithm suitable for decipher the returned message received by the sending and receiving module 203 to obtain the identity verification result and provide the identity verification result obtained for the notification module 204. If the identity verification is successful, the encryption module decides -fraction 205 still decrypts the identity information in the hand returned message and provides the decrypted identity information for the storage module 201. [0063] The modalities of the present invention are not limited to the examples above. For example, the identity management device may not include the encryption and decryption module 205, encryption and decryption operations can be performed by the application itself. In this case, after the identification module 202 identifies the application that sends the identity verification request, the sending and receiving module 203 directly sends the identity verification request as the request message to the identity verification server, and after receiving the message returned from the identity verification server, the returned message is provided directly to notification module 204, the returned message is considered to be the result of identity verification and all applications in the relative application list that includes the application identified are notified of the identity verification result. [0064] The methods and modules described here can be implemented by hardware, machine-readable instructions or a combination of hardware and machine-readable instructions. The machine-readable instructions used in the examples described here can be stored on a multi-processor readable storage medium, such as a hard disk, CD-ROM, DVD, compact disk, floppy disk, magnetic tape drive, RAM, ROM or another appropriate storage device. Or, at least part of the machine-readable instructions can be replaced with specific-use hardware, such as custom integrated circuits, port networks, FPGA, PLD and specific-use computers, and so on. [0065] A machine-readable storage medium is also provided, which is for storing instructions for making a machine perform a method as described herein. Specifically, a system or device that has a storage medium that stores machine-readable program codes to implement the functions of any of the examples above and that can cause the system or device (or CPU or MPU) to read and execute the program codes stored on the storage medium. [0066] In this situation, the program codes read from the storage medium can implement any of the above examples, so the program codes and the storage medium that stores the program codes are part of the technical schema. [0067] The storage medium for providing the program codes may include a floppy disk, a hard disk, a magneto-optical disk, a compact disk (such as CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD + RW), magnetic tape drive, flash card, ROM, and so on. Optionally, the program code can be downloaded from a server computer via a communication network. [0068] It should be noted that, as an alternative to the program codes being executed by a computer, at least part of the operations performed by the program codes can be implemented by an operating system that executes on a computer following instructions based on the codes of program to carry out a technical outline of any of the examples above. [0069] In addition, the program codes implemented from a storage medium are written on a storage on an extension card inserted in the computer or on a storage in an extension unit connected to the computer. In this example, a CPU on the extension card or on the extension unit performs at least part of the operations according to the instructions based on the program codes to carry out a technical scheme of any of the examples above. [0070] The above are only preferred examples of the present invention and should not be used to limit the scope of protection of the present invention. Any modification, and equivalent replacement and improvement without departing from the spirit and principle of the present invention are within the scope of protection of the present invention.
权利要求:
Claims (12) [0001] 1. Method for managing an identity for a mobile terminal, which comprises: on a mobile terminal that has one or more processors and one or more memories, identify (103) an application that sends an identity verification request when receiving the request for identity verification of one of multiple applications, send a request message obtained according to the identity verification request to an identity verification server; and notifying all applications in a relative application list that comprises the identified application of an identity verification result obtained in accordance with a message returned when receiving the message returned from the identity verification server; characterized by the fact that identifying an application that submits an identity verification request comprises: using the application identifier information extracted from the identity verification request, searching a list of stored application information for the application's relative information, the information relative comprising: an address of the identity verification server that corresponds to the application and the list of relative applications comprising the application; if the application's relative information is not searched, request the application to send the relative information, storing the relative information obtained in the application information list. [0002] 2. Method according to claim 1, wherein sending a request message obtained according to the identity verification request to an identity verification server comprises: encrypting (104) the identity information in the identity verification request , send (105) the identity verification request with the encrypted identity information to the identity verification server as the request message. [0003] 3. Method according to claim 1, in which when the identity verification server encrypts the identity information in the returned message and performs secondary encryption for the returned message, notify all applications in a relative application list comprising the identified application of an identity verification result obtained according to a returned message comprises: deciphering (108) the returned message to obtain the identity verification result indicating whether the identity verification was successful; notify (109) all applications in a relative application list comprising the identified application of the obtained identity verification result. [0004] A method according to claim 3, further comprising: deleting the stored identity information relating to the identity verification request and notifying all applications in the relative application list comprising the identified application of a failure reason, when the message returned to indicate an identity verification failure. [0005] 5. Method according to claim 3, further comprising: deciphering (108) the identity information in the returned message to obtain and store the identity information when the returned message indicates a successful identity verification. [0006] A method according to any one of claims 1 to 5, wherein the identity verification comprises an identity login verification, an identity logout verification or an identity change verification. [0007] 7. Device to manage an identity for a mobile terminal, which comprises: one or more processors; one or more memories that store modules executed by one or more processors, comprising: an identification module (202), adapted to identify an application that sends an identity verification request when receiving the identity verification request from one of multiple applications ; a sending and receiving module (203), adapted to send a request message obtained according to the identity verification request to an identity verification server, and to receive a message returned from the identity verification server; and a notification module (204), adapted to notify all applications in a relative application list comprising the identified application of an identity verification result obtained according to the returned message; characterized by the fact that it also comprises a storage module (201), adapted to store a list of application information that corresponds to multiple applications, user information and more than a list of relative applications; where the identification module (202) is adapted to use the application identifier information extracted from the identity verification request, search the list of application information stored in the storage module for the relative information of the application, the relative information of the application application comprising: an address of the identity verification server that corresponds to the application and the list of relative applications comprising the application, and if the application's relative information is not searched, request the application to send the related information, store the information relative information obtained from the application information list on the storage module. [0008] 8. Apparatus according to claim 7, further comprising: an encryption and decryption module (205), adapted to encrypt the identity information in the identity verification request, send the identity verification request with the information from encrypted identities for the sending and receiving module as the request message; decipher the returned message received by the sending and receiving module to obtain the identity verification result, providing the identity verification result for the notification module; if identity verification is successful, decrypt the identity information in the returned message, and provide the decrypted identity information to the storage module. [0009] An apparatus according to claim 8, wherein the storage module (201) is further adapted to erase the identity information relating to the identity verification request when the identity verification has failed; and store the identity information provided by the encryption and decryption module when the identity verification was successful. [0010] An apparatus according to claim 7, wherein the notification module (204) is further adapted to notify all applications in the relative application list comprising the identified application of a failure reason, when the identity verification has failed [0011] An apparatus according to any one of claims 7 to 10, wherein the identity verification comprises an identity login verification, an identity logout verification or an identity change verification. [0012] 12. Machine-readable non-transient storage medium characterized by the fact that it stores a method defined in any one of claims 1 to 6.
类似技术:
公开号 | 公开日 | 专利标题 BR112013018940B1|2021-03-09|method and device to manage identity for mobile terminal US9660985B2|2017-05-23|Service authorization using auxiliary device US9621549B2|2017-04-11|Integrated circuit for determining whether data stored in external nonvolative memory is valid CN106797317A|2017-05-31|Secure shared key shared system and method US9843446B2|2017-12-12|System and method for rotating client security keys US20150244522A1|2015-08-27|Method and system for providing data security CA3068090A1|2019-02-28|Identity authentication US20150089632A1|2015-03-26|Application authentication checking system US20180183777A1|2018-06-28|Methods and systems for user authentication US8739259B1|2014-05-27|Multilayer wireless mobile communication device authentication CN105204962A|2015-12-30|Data backup method and device and server US20150121491A1|2015-04-30|System and method of authenticating user account login request messages US20190260587A1|2019-08-22|Security authentication method and system, and integrated circuit JP2019506660A|2019-03-07|Data leak detection system CN103888430A|2014-06-25|Single-point registration system and method WO2017101704A1|2017-06-22|Verification method and device US20160308845A1|2016-10-20|Method of operating a computing device, computing device and computer program US9754118B2|2017-09-05|Performing an operation on a data storage CN108886519B|2021-09-14|Cloud storage of data WO2020000789A1|2020-01-02|Method and device for implementing access authentication US11281773B2|2022-03-22|Access card penetration testing Angelogianni et al.2021|How many FIDO protocols are needed? Surveying the design, security and market perspectives US11032708B2|2021-06-08|Securing public WLAN hotspot network access US10382430B2|2019-08-13|User information management system; user information management method; program, and recording medium on which it is recorded, for management server; program, and recording medium on which it is recorded, for user terminal; and program, and recording medium on which it is recorded, for service server US20210157910A1|2021-05-27|Access card penetration testing
同族专利:
公开号 | 公开日 KR20130129429A|2013-11-28| KR101528212B1|2015-06-11| US20130318591A1|2013-11-28| WO2012100677A1|2012-08-02| US9112852B2|2015-08-18| BR112013018940A2|2020-08-04| CN102625297B|2016-01-13| CN102625297A|2012-08-01|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US20020188736A1|2001-06-11|2002-12-12|Nokia Corporation|System and method for controlling terminal application usage through subscriber-application association| KR100782982B1|2001-07-11|2007-12-07|삼성전자주식회사|Microwave oven and method thereof| US7174383B1|2001-08-31|2007-02-06|Oracle International Corp.|Method and apparatus to facilitate single sign-on services in a hosting environment| KR100434721B1|2001-12-18|2004-06-07|이임영|A method of management for the wire and wireless integrated multicast key| AU2002342779A1|2002-09-30|2004-05-04|Siemens Aktiengesellschaft|Verifying check-in authentication by using an access authentication token| US7421732B2|2003-05-05|2008-09-02|Nokia Corporation|System, apparatus, and method for providing generic internet protocol authentication| US20060129935A1|2004-12-15|2006-06-15|Honeywell International, Inc.|Integrated information management system and method| WO2006130616A2|2005-05-31|2006-12-07|Tricipher, Inc.|Augmented single factor split key asymmetric cryptography-key generation and distributor| JP2009517723A|2005-11-24|2009-04-30|インターナショナル・ビジネス・マシーンズ・コーポレーション|Method for reliably accessing multiple systems of a distributed computer system by entering a password, distributed computer system and computer program for performing the method| US8458775B2|2006-08-11|2013-06-04|Microsoft Corporation|Multiuser web service sign-in client side components| KR101366328B1|2007-02-06|2014-02-21|엘지전자 주식회사|a receiver and a processing method for data broadcasting signal| CN101207485B|2007-08-15|2010-12-01|深圳市同洲电子股份有限公司|System and method of unification identification safety authentication for users| US20090094372A1|2007-10-05|2009-04-09|Nyang Daehun|Secret user session managing method and system under web environment, recording medium recorded program executing it| CN101441734A|2007-11-19|2009-05-27|上海久隆电力科技有限公司|Unite identification authentication system| CN101453328A|2007-12-06|2009-06-10|中国移动通信集团公司|Identity management system and identity authentication system| US20090172784A1|2007-12-28|2009-07-02|Lg. Electronics, Inc.|Apparatus and method for processing data broadcast signal| US11159909B2|2008-02-05|2021-10-26|Victor Thomas Anderson|Wireless location establishing device| CN101521676B|2008-02-27|2012-07-18|华为技术有限公司|Method for calling USI interface and equipment thereof| JP4729651B2|2008-02-28|2011-07-20|日本電信電話株式会社|Authentication apparatus, authentication method, and authentication program implementing the method| JP4518190B2|2008-05-30|2010-08-04|富士ゼロックス株式会社|Information processing apparatus, authentication system, and program| US8504001B2|2008-08-12|2013-08-06|Apple Inc.|Unified settings for multiple account types| GB0904559D0|2009-03-17|2009-04-29|British Telecomm|Web application access| US8645511B2|2009-10-13|2014-02-04|Google Inc.|Pre-configuration of a cloud-based computer| US20110202989A1|2010-02-18|2011-08-18|Nokia Corporation|Method and apparatus for providing authentication session sharing| US8474017B2|2010-07-23|2013-06-25|Verizon Patent And Licensing Inc.|Identity management and single sign-on in a heterogeneous composite service scenario| JP5671288B2|2010-09-24|2015-02-18|任天堂株式会社|Information processing apparatus, information processing program, information processing method, and information processing system|CN103595697B|2012-08-16|2017-05-24|上海凌攀信息科技有限公司|Single sign-on method on mobile equipment| CN102780707A|2012-08-17|2012-11-14|广东利为网络科技有限公司|Identity authentication method and system based on unit mailbox| WO2014201636A1|2013-06-19|2014-12-24|华为技术有限公司|Identity login method and device| CN104579668B|2013-10-28|2018-12-11|深圳市腾讯计算机系统有限公司|The verification method and cipher protection apparatus and verifying system of a kind of user identity| CN104378342B|2014-01-10|2016-04-13|腾讯科技(深圳)有限公司|Many accounts verification method, Apparatus and system| CN103841197B|2014-03-07|2017-02-08|中国移动通信集团湖北有限公司|Video cloud service system for constructing video seat supporting far-end service through cloud video| EP3123689A1|2014-03-26|2017-02-01|Continental Teves AG&Co. Ohg|Method and system for improving the data security during a communication process| US9825934B1|2014-09-26|2017-11-21|Google Inc.|Operating system interface for credential management| CN105991590B|2015-02-15|2019-10-18|阿里巴巴集团控股有限公司|A kind of method, system, client and server for verifying user identity| CN105227294B|2015-09-29|2018-08-03|北京江南天安科技有限公司|Cipher machine and its implementation and encrypting and deciphering system and its method| WO2017140200A1|2016-02-18|2017-08-24|任少华|Authentication center system and method| CN106559412B|2016-10-11|2020-06-09|北京元心科技有限公司|Method and system for enhancing identity authentication security| CN106778206A|2016-11-22|2017-05-31|泰康保险集团股份有限公司|Method, system and mobile terminal for being managed collectively multiple applications| CN111683103A|2016-12-21|2020-09-18|阿里巴巴集团控股有限公司|Information interaction method and device| CN108200058B|2018-01-02|2020-08-04|武汉斗鱼网络科技有限公司|Chat encryption method and device, electronic terminal and readable storage medium| CN109345663A|2018-08-23|2019-02-15|广东汇泰龙科技有限公司|A kind of method and system that the differentiation identity based on cloud lock is left a message| US11048549B2|2019-04-04|2021-06-29|Google Llc|Transferral of process state and/or components in computing environments| CN110008935A|2019-04-19|2019-07-12|厦门路桥信息股份有限公司|Method, medium and the system of authentication are carried out based on biological information| CN110311786A|2019-06-19|2019-10-08|努比亚技术有限公司|A kind of data transmission method, terminal, server and computer storage medium|
法律状态:
2020-08-11| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]| 2021-01-26| B09A| Decision: intention to grant [chapter 9.1 patent gazette]| 2021-03-09| B16A| Patent or certificate of addition of invention granted|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 11/01/2012, OBSERVADAS AS CONDICOES LEGAIS. |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 CN201110032478.9A|CN102625297B|2011-01-27|2011-01-27|For identity management method and the device of mobile terminal| CN201110032478.9|2011-01-27| CN201110032478|2011-01-27| PCT/CN2012/070228|WO2012100677A1|2011-01-27|2012-01-11|Identity management method and device for mobile terminal| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|