Method of pushing passwords, and pushing system
First Claim
1. A method of pushing passwords applicable to a first terminal device, comprising:
- establishing a sharing cryptographic library that stores a plurality of application program identification codes, wherein one account name and one password correspond to each application program identification code;
capturing, by the first terminal device, a first biological characteristic information of a user;
setting a time interval threshold upon capturing the first biological characteristic information;
determining whether a pull request is received from a second terminal device within the time interval threshold, wherein the pull request comprises a second biological characteristic information and a current application program identification code, wherein the second biological characteristic information is captured by the second terminal device;
determining whether the first biological characteristic information captured at the first terminal device matches with the second biological characteristic information from the second terminal device, when the pull request is received from the second terminal device within the time interval threshold; and
when the first biological characteristic information is matched with the second biological characteristic information, reading an account name and a password of the current application program identification code from the sharing cryptographic library, and pushing the account name and the password of the current application program identification code to the second terminal device, such that the account name and the password of the current application program identification code are shared between the first terminal device and the second terminal device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of pushing passwords, and a pushing system are provided. The method includes establishing a sharing cryptographic library which stores a plurality of application program identification codes, account names and passwords, receiving first biological characteristic information of a user, and simultaneously receiving a push request including second biological characteristic information and a current application program identification code. An account name and a password of the current application program identification code from the sharing cryptographic library is read, and the account name and the password is pushed to a second terminal device when the first biological characteristic information matches with the second biological characteristic information.
9 Citations
20 Claims
-
1. A method of pushing passwords applicable to a first terminal device, comprising:
-
establishing a sharing cryptographic library that stores a plurality of application program identification codes, wherein one account name and one password correspond to each application program identification code; capturing, by the first terminal device, a first biological characteristic information of a user; setting a time interval threshold upon capturing the first biological characteristic information; determining whether a pull request is received from a second terminal device within the time interval threshold, wherein the pull request comprises a second biological characteristic information and a current application program identification code, wherein the second biological characteristic information is captured by the second terminal device; determining whether the first biological characteristic information captured at the first terminal device matches with the second biological characteristic information from the second terminal device, when the pull request is received from the second terminal device within the time interval threshold; and when the first biological characteristic information is matched with the second biological characteristic information, reading an account name and a password of the current application program identification code from the sharing cryptographic library, and pushing the account name and the password of the current application program identification code to the second terminal device, such that the account name and the password of the current application program identification code are shared between the first terminal device and the second terminal device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system of pushing passwords applicable to a first terminal device, comprising:
-
a sharing cryptographic library configured to store a plurality of application program identification codes, wherein one account name and one password correspond to each application program identification code; a receiving unit configured to capture a first biological characteristic information of a user; a determination unit configured to determine that a pull request is received from a second terminal device, wherein the pull request comprises a second biological characteristic information and a current application program identification code, wherein the second biological characteristic information is captured by the second terminal device; a matching unit configured to determine whether the first biological characteristic information captured at the first terminal device matches with the second biological characteristic information from the second terminal device; and a pushing unit configured to read an account name and a password of the current application program identification code from the sharing cryptographic library, and to push the account name and the password of the current application program identification code to the second terminal device, when the first biological characteristic information matches with the second biological characteristic information, such that the account name and the password of the current application program identification code are shared between the first terminal device and the second terminal device; wherein the determination unit comprises; a timing sub-unit configured to set a time interval threshold upon capturing the first biological characteristic information by the receiving unit; and a receiving sub-unit configured to determine whether the pull request is received from the second terminal device within the time interval threshold. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method of pushing passwords performed in a second terminal device, the method comprising:
-
identifying an application program identification code for extracting the application program identification code when a login interface of an application program is enabled; capturing second biological characteristic information of a user; transmitting a pull request to a first terminal device, wherein the pull request comprises the second biological characteristic information of the user and a current application program identification code, such that the first terminal device determines whether the pull request is received within a preset time interval threshold upon capturing first biological characteristic information of the user by the first terminal device, wherein the first terminal device is configured to capture the first biological characteristic information of the user, determine whether the first biological characteristic information matches with the second biological characteristic information, and send a response to the pull request when determining that the first biological characteristic information matches with the second biological characteristic information; receiving the response to the pull request from the first terminal device, wherein the response to the pull request comprises an account name and a password corresponding to the current application program identification code; and inputting the account name and the password of the response to the pull request to the login interface of the application program. - View Dependent Claims (14, 15, 16)
-
-
17. A system of pushing passwords applicable to a second terminal device, the system comprising:
-
an identification unit configured to identify an application program identification code for extracting the application program identification code when a login interface of an application program is enabled; an acquisition unit configured to capture second biological characteristic information of a user; a request unit configured to transmit a pull request to a first terminal device, wherein the pull request comprises the second biological characteristic information of the user and a current application program identification code, such that the first terminal device determines whether the request to the pull request is received within a preset time interval threshold upon capturing first biological characteristic information of the user by the first terminal device, wherein the first terminal device is configured to capture the first biological characteristic information of the user, determine whether the first biological characteristic information matches with the second biological characteristic information, and send a response to the pull request when determining that the first biological characteristic information matches with the second biological characteristic information; a response unit configured to receive the response to the pull request from the first terminal device, wherein the response to the pull request comprises an account name and a password corresponding to the current application program identification code; and a login unit configured to input the account name and the password of the response to the pull request to the login interface of the application program. - View Dependent Claims (18, 19, 20)
-
Specification