CN103685311A - Log-in validation method and device - Google Patents

Log-in validation method and device Download PDF

Info

Publication number
CN103685311A
CN103685311A CN201310738898.8A CN201310738898A CN103685311A CN 103685311 A CN103685311 A CN 103685311A CN 201310738898 A CN201310738898 A CN 201310738898A CN 103685311 A CN103685311 A CN 103685311A
Authority
CN
China
Prior art keywords
terminal
identification code
information
login
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310738898.8A
Other languages
Chinese (zh)
Other versions
CN103685311B (en
Inventor
卓辉
周森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Netease Zhiqi Technology Co Ltd
Original Assignee
Netease Hangzhou Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netease Hangzhou Network Co Ltd filed Critical Netease Hangzhou Network Co Ltd
Priority to CN201310738898.8A priority Critical patent/CN103685311B/en
Publication of CN103685311A publication Critical patent/CN103685311A/en
Application granted granted Critical
Publication of CN103685311B publication Critical patent/CN103685311B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The execution mode of the invention provides a log-in validation method. For example, the method comprises: responding to received information that a user requests to log in, displaying an identification code for identifying a first terminal so as to facilitate a second terminal to collect the image of the identification code, and thus obtaining the pattern of the identification code, generating a login validation request according to the pattern of the identification code, sending the log-in validation request to a server so as to facilitate the server to obtain the user identity information of the second terminal and the content identified by the identification code according to the log-in validation request, performing log-in validation according to the user identity information of the second terminal, returning validation result to the first terminal identified by the identification code, receiving the validation result returned by the server, and thus achieving the purpose of ensuring the safety of user identity. Furthermore, the execution mode of the invention further provides a log-in validation device.

Description

A kind of login validation method and equipment
Technical field
Embodiments of the present invention relate to security fields, and more specifically, embodiments of the present invention relate to a kind of login validation method and equipment.
Background technology
The embodiments of the present invention that be intended to for stating in claims this part provide background or context.Description is not herein because be included in just admit it is prior art in this part.
For the needs of safety or operation, much runing commercial city needs user to input identity information in terminal, signs in to associated server and could use related application.But, under some scene, for example, it is very unsafe in the public terminals such as Internet bar, in other people private terminal, inputting identity information, probably in input identity information, by wooden horse recording and sending, to the server of appointment, is caused identity stolen.
Summary of the invention
Therefore, in the prior art, how login authentication can guarantee that user identity is safely very bothersome problem.
For this reason, be starved of a kind of login validation method, to realize the object that guarantees user identity safety.
In the present context, embodiments of the present invention expectation provides a kind of login validation method and equipment.
In the first aspect of embodiment of the present invention, the login validation method that is applied to first terminal is provided, for example, can comprise: in response to receiving user, ask the message of logining, show for identifying the identification code of described first terminal, so that the second terminal carries out to described identification code the figure that IMAQ obtains described identification code, according to the figure of described identification code, generate login authentication request, to server, send login authentication request, so that described server obtains the subscriber identity information of described the second terminal and the content that described identification code identifies according to described login authentication request, according to the subscriber identity information of described the second terminal, carry out login authentication, first terminal to described identification code sign returns to the result, the result that reception server returns.
In the second aspect of embodiment of the present invention, the login authentication equipment that is disposed at first terminal is provided, for example, can comprise: login receiving element, be configured in response to receiving user and ask the message of logining, show for identifying the identification code of described first terminal, so that the second terminal carries out to described identification code the figure that IMAQ obtains described identification code, according to the figure of described identification code, generate login authentication request, to server, send login authentication request, so that described server obtains the subscriber identity information of described the second terminal and the content that described identification code identifies according to described login authentication request, according to the subscriber identity information of described the second terminal, carry out login authentication, first terminal to described identification code sign returns to the result, checking receiving element, is configured for the result that reception server returns.
In the third aspect of embodiment of the present invention, the login validation method that is applied to the second terminal is provided, for example, can comprise: in response to user, identification code is carried out the operation of IMAQ, the identification code that first terminal is shown is carried out to the figure that IMAQ obtains identification code, wherein, described identification code is used for identifying described first terminal; According to the figure of described identification code, generate login authentication request; To server, send login authentication request, so that described server obtains the subscriber identity information of described the second terminal and the content that described identification code identifies according to described login authentication request, according to the subscriber identity information of described the second terminal, carry out login authentication, the first terminal identifying to described identification code returns to the result.
In the fourth aspect of embodiment of the present invention, the login authentication equipment that is disposed at the second terminal is provided, for example, can comprise: collecting unit, be configured for and in response to user, identification code carried out the operation of IMAQ, the identification code that first terminal is shown is carried out to the figure that IMAQ obtains identification code, and wherein, described identification code is used for identifying described first terminal; Request generation unit, is configured for according to the figure of described identification code and generates login authentication request; Send request unit, be configured for to server and send login authentication request, so that described server obtains the subscriber identity information of described the second terminal and the content that described identification code identifies according to described login authentication request, according to the subscriber identity information of described the second terminal, carry out login authentication, the first terminal identifying to described identification code returns to the result.
Embodiment of the present invention the 5th aspect in, the login validation method that is applied to server is provided, for example, can comprise: in response to the login authentication request that receives the second terminal transmission, wherein, described login authentication request is generated according to the figure of identification code by described the second terminal, wherein, the figure of described identification code specifically by the second terminal response in receiving the message of identification code being carried out to IMAQ, the shown identification code of first terminal is carried out to IMAQ to be obtained, wherein, described identification code is used for identifying described first terminal; According to described login authentication request, obtain the subscriber identity information of described the second terminal and the content that described identification code identifies; According to the subscriber identity information of described the second terminal, carry out login authentication; First terminal to described identification code sign returns to the result.
Embodiment of the present invention the 6th aspect in, the login authentication equipment that is disposed at server is provided, for example, can comprise: checking request reception unit, be configured for the login authentication request sending in response to receiving the second terminal, wherein, described login authentication request is generated according to the figure of identification code by described the second terminal, wherein, the figure of described identification code specifically by the second terminal response in receiving the message of identification code being carried out to IMAQ, the shown identification code of first terminal is carried out to IMAQ to be obtained, wherein, described identification code is used for identifying described first terminal, extraction unit, is configured for the subscriber identity information and the described identification code institute sign content that according to described login authentication request, obtain described the second terminal, authentication unit, is configured for according to the subscriber identity information of described the second terminal and carries out login authentication, return to unit, be configured for to the first terminal of described identification code sign and return to the result.
According to the login validation method of embodiment of the present invention and equipment, because user is when first terminal request is logined, do not need to input subscriber identity information, but shown for identifying the identification code of first terminal by first terminal, the identification code of using the second terminal to show first terminal by user is carried out IMAQ and is generated login authentication request according to the figure of identification code, thereby the login authentication request that server sends according to the second terminal obtains the subscriber identity information of the second terminal and the content that identification code identifies, therefore, server can carry out login authentication according to the subscriber identity information of the second terminal, first terminal to identification code sign returns to the result, therefore, user is without inputting identity information at first terminal, just can there is not subscriber identity information in the stolen safety problem of first terminal yet, realized the object that guarantees user identity safety.
In some possible implementations, the identifying code of having encrypted and other Information generations that identification code can be fed back for logging request according to server by first terminal, because identifying code is encrypted state in terminal and in transmitting procedure, can prevent that identifying code is maliciously tampered, therefore, server is after obtaining the identifying code that identification code identifies, whether before can be after decryption verification code to first terminal being, the terminal of request login be verified, the result is fed back in correct terminal, further guaranteed user identity safety.
In other possible implementations, identification code can be by first terminal according to the hardware information of self and other Information generations, thereby server or the second terminal are after obtaining the hardware information of the first terminal that identification code identifies, the hardware information that can identify identification code and common equipment hardware information compare and obtain common equipment the result, thereby in conjunction with this common equipment the result, carry out login authentication, further guaranteed user identity safety.
In other possible implementation, server is after receiving login authentication request, can also obtain geographical location information that the IP of first terminal is corresponding and the geographical location information corresponding to IP of the second terminal, by server or the second terminal, the two is compared and obtains different-place login the result, thereby in conjunction with this different-place login the result, carry out login authentication, further guaranteed user identity safety.
summary of the invention
The inventor finds to show that by a terminal identification code for identifying this terminal (for example, Quick Response Code), by user, use another terminal to carry out IMAQ and according to the figure of identification code, generate the login authentication request of carrying subscriber identity information identification code, thereby the login authentication request that server can send according to another terminal obtains the content that subscriber identity information and identification code identify, according to subscriber identity information, carry out login authentication, this terminal to identification code sign is returned to the result, therefore, user is without the terminal input identity information in identification code sign, just can there is not subscriber identity information in the stolen safety problem of terminal of identification code sign yet.
After having introduced basic principle of the present invention, lower mask body is introduced various non-limiting execution mode of the present invention.
application scenarios overview
First with reference to figure 1, first terminal 101 can be desktop computer, panel computer, Intelligent sliding moved end etc., and the second terminal 102 can be Intelligent sliding moved end.The login validation method that the application embodiment of the present invention provides, user is without input subscriber identity information on first terminal 101, the identification code of using 102 pairs of first terminals of the second terminal 101 to show is carried out IMAQ and is sent the login authentication request of carrying subscriber identity information, just can make server 103 carry out the login authentication of user identity, and by the result feedback of login authentication to first terminal 101, can effectively guarantee the safety of user identity.
one of illustrative methods
Below in conjunction with the application scenarios of Fig. 1, be described with reference to Figure 2 the login validation method that is applied to first terminal according to exemplary embodiment of the invention.It should be noted that above-mentioned application scenarios is only to illustrate for the ease of understanding spirit of the present invention and principle, embodiments of the present invention are unrestricted in this regard.On the contrary, any scene that embodiments of the present invention can be applied to be suitable for.
For example, referring to Fig. 2, one of login validation method schematic flow sheet that is applied to first terminal (for example, the first terminal 101 of Fig. 1) providing for the embodiment of the present invention.As shown in the figure, a kind of possible execution mode of the present invention can comprise:
S210, in response to receiving user, ask the message of logining, show for identifying the identification code of described first terminal, for example, so that the second terminal (, the second terminal 102 of Fig. 1) described identification code is carried out to the figure that IMAQ obtains described identification code, according to the figure of described identification code, generate login authentication request, to server (for example, the server 103 of Fig. 1) send login authentication request, so that described server obtains the subscriber identity information of described the second terminal and the content that described identification code identifies according to described login authentication request, according to the subscriber identity information of described the second terminal, carry out login authentication, first terminal to described identification code sign returns to the result,
The result that S220, reception server return.
Visible, according to the login validation method of embodiment of the present invention, because user is when first terminal request is logined, do not need to input subscriber identity information, but shown for identifying the identification code of first terminal by first terminal, the identification code of using the second terminal to show first terminal by user is carried out IMAQ and is generated login authentication request according to the figure of identification code, thereby the login authentication request that server can send according to the second terminal obtains the subscriber identity information of the second terminal and the content that identification code identifies, according to the subscriber identity information of the second terminal, carry out login authentication, first terminal to identification code sign returns to the result, therefore, user is without inputting identity information at first terminal, just can there is not subscriber identity information in the stolen safety problem of first terminal yet, realized the object that guarantees user identity safety.
Be understandable that, the identification code described in the embodiment of the present invention can be one dimension code, Quick Response Code, three-dimensional code or other forms of identification code etc.Wherein, the generating mode of described identification code is not limit.
For example, a kind of possible implementation can be, before showing described identification code, at first terminal 101 places of for example Fig. 1, to generate the identification code for the hardware information of identification service information, identifying code and/or first terminal.Below, in conjunction with a kind of possible signalling diagram of login validation method as shown in Figure 3, this implementation is described in detail.As shown in Figure 3, described method can comprise:
S310, first terminal receive the message that user asks login;
For example, first terminal can present webpage or the application program for logining, and user sends the message of request login by webpage or application program.
S320, first terminal send request the message of login to server;
S330, server for example generate, for identifying the identifying code (, Quick Response Code) of first terminal and encrypting;
S340, server return to the identifying code of having encrypted to first terminal;
S350, first terminal are according to business information (for example, instant messaging service, game service etc.), the hardware information of identifying code and/or first terminal (for example, the information such as board chip set model, CPU model, video card model, hard disk model, memory size, display and panel model) generate the identification code for the hardware information of identification service information, identifying code and/or first terminal, wherein, described business information can ask registering service to be determined according to user by first terminal, and first terminal shows described identification code;
For example, can generate the two-dimension code image for the hardware information of identification service information, identifying code and first terminal according to the hardware information of business information, identifying code and first terminal, two-dimension code image is shown at first terminal.
S360, the second terminal carry out to described identification code the figure that IMAQ obtains described identification code, generate the login authentication request of carrying subscriber identity information according to the figure of described identification code;
It should be noted that, the second terminal obtains the mode of subscriber identity information and does not limit.For example, the second terminal, when user carries out the operation of IMAQ to identification code, can be the second terminal that has completed user's login, or, can be also second terminal of not carrying out user's login.If completed the second terminal of user's login, second terminal can extract subscriber identity information (as, user account) from the information of user's login; If do not carry out the second terminal of user's login, the second terminal can require user to input subscriber identity information, according to user's input obtain subscriber identity information (as, account and password).Certainly, also can there be other implementations, do not limit in the present invention.
S370, the second terminal to server send described login authentication request;
The subscriber identity information of one or more and the second terminal in the hardware information of the business information that S380, server identify according to identification code, identifying code, first terminal carries out login authentication;
The first terminal that S390, server identify to described identifying code returns to the result.
Visible, in this embodiment, identification code can in the hardware information three of identification service information, identifying code, first terminal any or a plurality of, or can also be for identifying other information, wherein:
When for identification service information, whether server can to allowing user to should business login verifying;
When identifying the identifying code of having encrypted, because identifying code itself is through server for encrypting, the inside can comprise timestamp, the information such as general unique identifier, any other terminal cannot be deciphered and cannot be distorted, therefore, server is after obtaining the identifying code that identification code identifies, can after decryption verification code, to identifying code, verify, be equivalent to login authentication request for terminal be whether before the terminal of request login verify, thereby can guarantee the result to feed back in correct terminal, further guarantee user identity safety;
When identifying the hardware information of first terminal, the hardware information that server or the second terminal can identify identification code compares and obtains common equipment the result with the common equipment hardware information prestoring, thereby server can carry out login authentication in conjunction with this common equipment the result, thereby when other people usurp identity login by other equipment, can be verified out according to hardware information difference, further guarantee user identity safety.
In addition, in the possible implementation of another kind, server asks, after the message of login, can also comprise receiving the user that first terminal sends: the IP(Internet protocol of obtaining first terminal) address, inquires the geographical location information corresponding to IP address of first terminal; Server, after receiving the login authentication request of the second terminal transmission, can also comprise: obtain the IP address of the second terminal, inquire the geographical location information corresponding to IP address of the second terminal; The geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal compared and obtain different-place login the result, so that server carries out login authentication according to described different-place login the result; Or, to the second terminal, return to geographical location information that the IP of first terminal is corresponding and the geographical location information corresponding to IP of the second terminal, by the second terminal, the geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal compared and obtain different-place login the result, so that server carries out login authentication according to described different-place login the result.
In this embodiment, geographical location information corresponding to IP is such as being the information such as city, province, because server or the second terminal compare and obtain different-place login the result the geographical location information corresponding to IP of geographical location information corresponding to the IP of first terminal and described the second terminal, thereby server can carry out login authentication in conjunction with this different-place login the result, has further guaranteed user identity safety.
In the implementation in conjunction with above-mentioned two kinds of embodiment, the second terminal can be that non-common equipment and/or described different-place login the result are while being different-place login at described common equipment the result, present the information of whether authorizing non-common equipment and/or different-place login, if the second terminal receives the authorization message of user's input, to described server, send described authorization message, so that server carries out login authentication according to the subscriber identity information of authorization message and described the second terminal.
one of example devices
After having introduced one of the method for exemplary embodiment of the invention, next, with reference to one of login authentication equipment that is disposed at first terminal of 4 pairs of exemplary embodiment of the invention of figure, be introduced.
For example, referring to Fig. 4, one of a kind of login authentication device structure schematic diagram providing for the embodiment of the present invention.As shown in the figure, this a kind of possible execution mode that is disposed at the equipment of first terminal can comprise: login receiving element 410, can be configured in response to receiving user and ask the message of logining, show for identifying the identification code of described first terminal, so that the second terminal carries out to described identification code the figure that IMAQ obtains described identification code, according to the figure of described identification code, generate login authentication request, to server, send login authentication request, so that described server obtains the subscriber identity information of described the second terminal and the content that described identification code identifies according to described login authentication request, according to the subscriber identity information of described the second terminal, carry out login authentication, first terminal to described identification code sign returns to the result, checking receiving element 420, can be configured for the result that reception server returns.
Visible, according to the login authentication equipment of embodiment of the present invention, because user is when first terminal request is logined, do not need to input subscriber identity information, but shown for identifying the identification code of first terminal at first terminal by login receiving element 410, the identification code of using the second terminal to show first terminal by user is carried out IMAQ and is generated login authentication request according to the figure of identification code, thereby the login authentication request that server can send according to the second terminal obtains the subscriber identity information of the second terminal and the content that identification code identifies, according to the subscriber identity information of the second terminal, carry out login authentication, the result that the first terminal being identified to identification code by checking receiving element 420 reception servers again returns, therefore, user is without inputting identity information at first terminal, just can there is not subscriber identity information in the stolen safety problem of first terminal yet, realized the object that guarantees user identity safety.
Be understandable that, the identification code described in the embodiment of the present invention can be one dimension code, Quick Response Code, three-dimensional code or other forms of identification code etc.Wherein, the generating mode of described identification code is not limit.For example, described login authentication equipment can also comprise: identification code generation unit 430, can be configured for and generate for identification service information, the described identification code of the hardware information of identifying code and/or first terminal, wherein, described identifying code is used for identifying described first terminal, specifically by server, after the message of request login that receives first terminal, generated, encrypt and turn back to first terminal, described business information asks the business of login to be determined according to user, so that the business information that server identifies according to identification code, identifying code, one or more in the hardware information of first terminal, and the subscriber identity information of the second terminal carries out login authentication.
Visible, in this implementation, identification code can in the hardware information three of identification service information, identifying code, first terminal any or a plurality of, or can also be for identifying other information, wherein, when for identification service information, whether server can to allowing user to should business login verifying; When identifying the identifying code of having encrypted, because the identifying code of having encrypted is encrypted state in terminal and in transmitting procedure, can prevent that identifying code is maliciously tampered, therefore, server is after obtaining the identifying code that identification code identifies, can after decryption verification code, to identifying code, verify, be equivalent to login authentication request for terminal be whether before the terminal of request login verify, thereby can guarantee the result to feed back in correct terminal, further guarantee user identity safety; When identifying the hardware information of first terminal, the hardware information that server or the second terminal can identify identification code compares and obtains common equipment the result with the common equipment hardware information prestoring, thereby server can carry out login authentication in conjunction with this common equipment the result, thereby when other people usurp identity login by other equipment, can be verified out, further guarantee user identity safety.
It should be noted that identification code generation unit 430 use dotted lines in Fig. 4, to represent that this unit is not the necessary unit of present device.
two of illustrative methods
After having introduced one of the login validation method that is applied to first terminal, below in conjunction with Fig. 5, two of the login validation method that is applied to the second terminal that the embodiment of the present invention is provided describes in detail.
For example, referring to Fig. 5, two of the login validation method schematic flow sheet that is applied to the second terminal (for example, the second terminal 102 shown in Fig. 1) providing for the embodiment of the present invention.As shown in the figure, a kind of possible execution mode of the present invention can comprise:
S510, in response to user, identification code is carried out the operation of IMAQ, the identification code that first terminal is shown is carried out to the figure that IMAQ obtains identification code, wherein, described identification code is used for identifying described first terminal.
Be understandable that, the identification code described in the embodiment of the present invention can be one dimension code, Quick Response Code, three-dimensional code or other forms of identification code etc.
It should be noted that, the second terminal, when user carries out the operation of IMAQ to identification code, can be the second terminal that has completed user's login, or, can be also second terminal of not carrying out user's login.Do not limit in the present invention.For example: can, after user logins by the second terminal, in response to user, to identification code, carry out the operation of IMAQ; Or, after identification code is carried out to IMAQ, automatically carry out user in the operation of first terminal login; Or, when step S520 generates login authentication request according to the figure of identification code below, be the request in first terminal login to user, be also the request in the second terminal login; Again or, also can have any other possible implementation combining with login, do not limit in the present invention.
S520, according to the figure of described identification code, generate login authentication request.
For example, in a kind of possible implementation, can identify the figure of described identification code, obtain the hardware information of business information, identifying code and/or first terminal that described identification code identifies; By the hardware information of business information, identifying code and/or first terminal, and the subscriber identity information of described the second terminal is carried in checking request, generates checking request; Or, in the possible implementation of another kind, the figure of the subscriber identity information of described the second terminal and described identification code can be carried in checking request, generate checking request;
Wherein, described identification code can be generated by first terminal, and for the hardware information of identification service information, identifying code and/or described first terminal, wherein, described identifying code is used for identifying described first terminal.Particularly, signalling diagram as shown in Figure 3, described identifying code specifically can be generated described identifying code and encrypt by server after the message of request login that receives first terminal, again identifying code is turned back to first terminal, wherein, described business information can ask the business of login to be determined according to user by first terminal.
Because identification code can be for the hardware information of identification service information, identifying code and/or first terminal, the subscriber identity information of one or more and the second terminal in the hardware information of the business information that therefore, server can identify according to identification code, identifying code, first terminal carries out login authentication.When for identification service information, whether server can to allowing user to should business login verifying; When identifying the identifying code of having encrypted, can prevent that identifying code is maliciously tampered, thereby can guarantee the result to feed back in correct terminal, further guaranteed user identity safety; When identifying the hardware information of first terminal, the hardware information that server or the second terminal can identify identification code compares and obtains common equipment the result with the common equipment hardware information prestoring, thereby server can carry out login authentication in conjunction with this common equipment the result, thereby when other people usurp identity login by other equipment, can be verified out, further guarantee user identity safety.
S530, to server, send login authentication request, so that described server obtains the subscriber identity information of described the second terminal and the content that described identification code identifies according to described login authentication request, according to the subscriber identity information of described the second terminal, carry out login authentication, the first terminal identifying to described identification code returns to the result.
Visible, according to the login validation method of embodiment of the present invention, because user is when first terminal request is logined, do not need to input subscriber identity information, but shown for identifying the identification code of first terminal by first terminal, the identification code of using the second terminal to show first terminal by user is carried out IMAQ and is generated login authentication request according to the figure of identification code, thereby the login authentication request that server can send according to the second terminal obtains the subscriber identity information of the second terminal and the content that identification code identifies, according to the subscriber identity information of the second terminal, carry out login authentication, first terminal to identification code sign returns to the result, therefore, user is without inputting identity information at first terminal, just can there is not subscriber identity information in the stolen safety problem of first terminal yet, realized the object that guarantees user identity safety.
In a kind of possible implementation of the embodiment of the present invention, can also obtain one or more in rightness of business the result, identifying code legitimate verification result, common equipment the result by following steps, and then server can be according to the one or more login authentication of carrying out in rightness of business the result, identifying code legitimate verification result, common equipment the result, particularly, for example, the embodiment of the present invention can also comprise following arbitrary step or combination:
When described identification code is used for identification service information, can receive the rightness of business the result that described server returns for described checking request, wherein, described rightness of business the result specifically can obtain described subscriber identity information and described business information according to described checking request by server, and the described business information legitimate traffic corresponding with described subscriber identity information compared and obtained; When described identification code is used for identifying identifying code, can receive the identifying code legitimate verification result that described server returns for described checking request, wherein, described identifying code legitimate verification result specifically can obtain described identifying code according to described checking request by server, to the deciphering of described identifying code, to the terminal of the identifying code sign after deciphering, be whether that terminal that described identifying code identifies when generating judges and obtains; When described identification code is used for identifying the hardware information of first terminal, can receive the common equipment the result that described server returns for described checking request, wherein, whether described common equipment the result specifically can be obtained by server the hardware information of described subscriber identity information and described first terminal according to described checking request, to the hardware information of described first terminal, be that usual hardware information that described subscriber identity information is corresponding judges and obtains; When described identification code is used for identifying the hardware information of first terminal, can receive the usual hardware information corresponding with described subscriber identity information that described server returns for described checking request, the hardware information of the first terminal that described identification code is identified and described usual hardware information compare, and obtain common equipment the result.
In the another kind of possible implementation of the embodiment of the present invention, can also obtain different-place login the result by following steps, and then server can also carry out login authentication in conjunction with different-place login the result.Particularly, the embodiment of the present invention can also comprise the following steps:
Receive geographical location information that the IP of the described first terminal that described server returns for described checking request is corresponding and the geographical location information corresponding to IP of described the second terminal, the geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal compared and obtain different-place login the result; Or, receive the different-place login the result that described server returns for described checking request, wherein, after described different-place login the result specifically receives described checking request by described server, inquire about geographical location information that the IP of described first terminal is corresponding and the geographical location information corresponding to IP of described the second terminal, the geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal compared and obtained.
It should be noted that, carrying out and relatively obtain in the implementation of different-place login the result by the second terminal, can also return to described different-place login the result so that server carries out login authentication in conjunction with login authentication result by the second terminal to server.
In the implementation in conjunction with above-mentioned two kinds of embodiment, the second terminal can be that non-common equipment and/or described different-place login the result are while being different-place login at described common equipment the result, present the information of whether authorizing non-common equipment and/or different-place login, if the second terminal receives the authorization message of user's input, to described server, send described authorization message, so that server carries out login authentication according to the subscriber identity information of authorization message and described the second terminal.
Or, in the implementation in conjunction with above-mentioned two kinds of embodiment, if server is determined subscriber identity information and is verified, and rightness of business the result is that legal, described common equipment the result is that common equipment and/or described different-place login the result are non-different-place login, can directly determine that the result of login is for logining successfully.
two of example devices
Introduced exemplary embodiment of the invention method two after, next, with reference to two of the login authentication equipment that is disposed at the second terminal of 6 pairs of exemplary embodiment of the invention of figure, be introduced.
For example, referring to Fig. 6, two of a kind of login authentication device structure schematic diagram providing for the embodiment of the present invention.As shown in the figure, this kind of possible execution mode that is disposed at the equipment of the second terminal can comprise:
Collecting unit 610, can be configured for and in response to user, identification code be carried out the operation of IMAQ, and the identification code that first terminal is shown is carried out to the figure that IMAQ obtains identification code, and wherein, described identification code is used for identifying described first terminal; Request generation unit 620, can be configured for according to the figure of described identification code and generate login authentication request; Send request unit 630, can be configured for to server and send login authentication request, so that described server obtains the subscriber identity information of described the second terminal and the content that described identification code identifies according to described login authentication request, according to the subscriber identity information of described the second terminal, carry out login authentication, the first terminal identifying to described identification code returns to the result.
Visible, according to the second terminal login authentication equipment that is disposed at of embodiment of the present invention, by collecting unit 610, gathered the figure of the identification code of first terminal demonstration, request generation unit 620 generates login authentication request according to the figure of identification code, send request unit 630 and send login authentication request to server, thereby server can carry out login authentication according to the subscriber identity information of the second terminal, first terminal to identification code sign returns to the result, therefore, user is without inputting identity information at first terminal, just can there is not subscriber identity information in the stolen safety problem of first terminal yet, realized the object that guarantees user identity safety.
In a kind of possible implementation of the embodiment of the present invention, as shown in Figure 6, described request generation unit 620 can comprise: the first recognin unit 621, can be configured for the figure of described identification code is identified, obtain the hardware information of business information, identifying code and/or first terminal that described identification code identifies; Generate subelement 622, can be configured for the hardware information of business information, identifying code and/or first terminal, and the subscriber identity information of described the second terminal is carried in checking request, generate checking request; Or described request generation unit 620, can be configured for the figure of the login account of described the second terminal and described identification code is carried in checking request, generates checking request.
It should be noted that, wherein said identification code specifically can be generated by first terminal, and for the hardware information of identification service information, identifying code and/or described first terminal, wherein, described identifying code can be for identifying described first terminal.Particularly, signalling diagram as shown in Figure 3, specifically by server, after the message of request login that receives first terminal, generate, encrypt and turn back to first terminal, wherein, described business information can ask the business of login to be determined according to user by first terminal.
In a kind of possible implementation of the embodiment of the present invention, can also be by obtain rightness of business the result with lower unit, identifying code legitimate verification result, one or more in common equipment the result, and then server can be according to rightness of business the result, identifying code legitimate verification result, one or more login authentication of carrying out in common equipment the result, particularly, for example, the embodiment of the present invention can also comprise following any unit or combination: business the result receiving element 640, can be configured for when described identification code is during for identification service information, receive the rightness of business the result that described server returns for described checking request, wherein, described rightness of business the result specifically obtains described subscriber identity information and described business information by server according to described checking request, the described business information legitimate traffic corresponding with described subscriber identity information compared and obtained, identifying code the result receiving element 650, can be configured for when described identification code is when identifying identifying code, receive the identifying code legitimate verification result that described server returns for described checking request, wherein, described identifying code legitimate verification result specifically obtains described identifying code by server according to described checking request, to the deciphering of described identifying code, to the terminal of the identifying code sign after deciphering, be whether that terminal that described identifying code identifies when generating judges and obtains, conventional the result receiving element 660, can be configured for when described identification code is when identifying the hardware information of first terminal, receive the common equipment the result that described server returns for described checking request, wherein, whether described common equipment the result is specifically obtained the hardware information of described subscriber identity information and described first terminal according to described checking request by server, to the hardware information of described first terminal, be that usual hardware information that described subscriber identity information is corresponding judges and obtains, general information receiving element 670, can be configured for when described identification code is when identifying the hardware information of first terminal, receives the usual hardware information corresponding with described subscriber identity information that described server returns for described checking request, the first conventional judging unit, the hardware information and the described usual hardware information that are configured for the first terminal that described identification code that general information receiving element is received identifies compare, and obtain common equipment the result.
In the another kind of possible implementation of the embodiment of the present invention, can also be by obtain different-place login the result with lower unit, and then server can also carry out login authentication in conjunction with different-place login the result.Particularly, the embodiment of the present invention can also comprise: geography information receiving element 680, can be configured for and receive geographical location information that the IP of the described first terminal that described server returns for described checking request is corresponding and the geographical location information corresponding to IP of described the second terminal; The first geography information comparing unit 681, the geographical location information corresponding to IP that can be configured for geographical location information that the IP of the first terminal that geography information receiving element is received is corresponding and the second terminal compares and obtains different-place login the result; Or, geographical the result receiving element 682, can be configured for and receive the different-place login the result that described server returns for described checking request, wherein, after described different-place login the result specifically receives described checking request by described server, inquire about geographical location information that the IP of described first terminal is corresponding and the geographical location information corresponding to IP of described the second terminal, the geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal compared and obtained.
In the implementation in conjunction with above-mentioned two kinds of embodiment, the login authentication equipment that is disposed at the second terminal can also comprise: Tip element 690, can be configured for when described common equipment the result be non-common equipment and/or described different-place login the result while being different-place login, present the information of whether authorizing non-common equipment and/or different-place login; Authorize transmitting element 691, if can be configured for the authorization message that receives user's input, to described server, send described authorization message, so that server carries out login authentication according to the subscriber identity information of authorization message and described the second terminal.
It should be noted that, in the present embodiment, the first recognin unit 621, generation subelement 622, business the result receiving element 640, identifying code the result receiving element 650, conventional the result receiving element 660, general information receiving element 670, geography information receiving element 680, the first geography information comparing unit 681, geographical the result receiving element 682, Tip element 690, mandate transmitting element 691 are used dotted lines in Fig. 6, to represent that this unit is not the necessary unit of present device.
three of illustrative methods
Introduced exemplary embodiment of the invention method two after, next, with reference to three of the login validation method that is applied to server of 7 pairs of exemplary embodiment of the invention of figure, be introduced.
For example, referring to Fig. 7, three of the login validation method schematic flow sheet that is applied to server (for example, the server shown in Fig. 1 103) providing for the embodiment of the present invention.As shown in the figure, this a kind of possible execution mode that is applied to the login validation method of server can comprise: S710, in response to the login authentication request that receives the second terminal and send, wherein, described login authentication request is generated according to the figure of identification code by described the second terminal, wherein, the figure of described identification code specifically by the second terminal response in receiving the message of identification code being carried out to IMAQ, the shown identification code of first terminal is carried out to IMAQ to be obtained, wherein, described identification code is used for identifying described first terminal; It should be noted that, wherein, described the second terminal can be the second terminal that has completed user's login, or, can be also second terminal of not carrying out user's login.Do not limit in the present invention.
S720, according to described login authentication request, obtain the subscriber identity information of described the second terminal and the content that described identification code identifies.
For example, in a kind of possible implementation, can work as described login authentication request while carrying the content of identification code sign and the subscriber identity information of the second terminal, resolve described login authentication request and obtain the content of described identification code sign and the subscriber identity information of the second terminal; Or, in the possible implementation of another kind, can work as described login authentication request while carrying the figure of identification code and the subscriber identity information of the second terminal, resolve described login authentication request and obtain the figure of described identification code and the subscriber identity information of the second terminal, the figure of described identification code is identified to the content that obtains described identification code sign.
It should be noted that, wherein, described identification code specifically can be generated by first terminal, hardware information for identification service information, identifying code and/or described first terminal, wherein, described identifying code can be for identifying described first terminal, signalling diagram as shown in Figure 3, described identifying code specifically can generate, encrypt and turn back to first terminal by server after the message of request login that receives first terminal, wherein, described business information can ask the business of login to be determined according to user by first terminal.
When for identification service information, whether server can to allowing user to should business login verifying; When identifying the identifying code of having encrypted, can prevent that identifying code is maliciously tampered, thereby can guarantee the result to feed back in correct terminal, further guaranteed user identity safety; When identifying the hardware information of first terminal, the hardware information that server or the second terminal can identify identification code compares and obtains common equipment the result with the common equipment hardware information prestoring, thereby server can carry out login authentication in conjunction with this common equipment the result, thereby when other people usurp identity login by other equipment, can be verified out, further guarantee user identity safety.
S730, according to the subscriber identity information of described the second terminal, carry out login authentication.It should be noted that, the subscriber identity information that obtains described the second terminal according to described login authentication request can be the subscriber identity information that user has logined in the second terminal, according to this subscriber identity information, carry out login authentication, can be specifically to determine that according to this subscriber identity information user, in the second terminal login, determines one's identity and is verified etc.Or, can to be user preserve but the subscriber identity information of login not in the second terminal the subscriber identity information that obtains described the second terminal according to described login authentication request, whether according to this subscriber identity information, carry out login authentication, can be specifically according to this subscriber identity information, in legal identity information database, to mate the checking that determines one's identity to pass through etc.Again or, also can have other possible implementations, do not limit in the present invention.
For example, in a kind of possible implementation, the subscriber identity information of one or more and the second terminal in the hardware information of the business information that can identify according to identification code, identifying code, first terminal carries out login authentication.
S740, the first terminal identifying to described identification code return to the result.
Visible, according to the login validation method of embodiment of the present invention, because user is without at first terminal input identity information, just can there is not subscriber identity information in the stolen safety problem of first terminal yet, realized the object that guarantees user identity safety.
In a kind of possible implementation of the embodiment of the present invention, can also obtain one or more in rightness of business the result, identifying code legitimate verification result, common equipment the result by following steps, and then server can be according to the one or more login authentication of carrying out in rightness of business the result, identifying code legitimate verification result, common equipment the result, particularly, for example, the embodiment of the present invention can also comprise following arbitrary step or combination:
When described identification code is used for identification service information, can obtain described subscriber identity information and described business information according to described checking request, the described business information legitimate traffic corresponding with described subscriber identity information compared and obtain rightness of business the result;
When described identification code is used for identifying identifying code, can obtain described identifying code according to described checking request, to the deciphering of described identifying code, to the terminal of the identifying code sign after deciphering, be whether that terminal that described identifying code identifies when generating judges and is verified a yard legitimate verification result;
When described identification code is used for identifying the hardware information of first terminal, whether can obtain according to described checking request the hardware information of described subscriber identity information and described first terminal, be that usual hardware information that described subscriber identity information is corresponding judges and obtains common equipment the result to the hardware information of described first terminal;
When described identification code is used for identifying the hardware information of first terminal, can inquire about the usual hardware information that described subscriber identity information is corresponding, to described the second terminal, return to described usual hardware information, so that the hardware information of the first terminal that the second terminal identifies described identification code and described usual hardware information compare, obtain common equipment the result.
In the another kind of possible implementation of the embodiment of the present invention, can also obtain different-place login the result by following steps, and then server can also carry out login authentication in conjunction with different-place login the result.Particularly, the embodiment of the present invention can also comprise the following steps:
Inquire about geographical location information that the IP of described first terminal is corresponding and the geographical location information corresponding to IP of described the second terminal, to the second terminal, return to geographical location information that the IP of described first terminal is corresponding and the geographical location information corresponding to IP of described the second terminal, so that the second terminal compares the geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal to obtain different-place login the result;
Or,
Inquire about geographical location information that the IP of described first terminal is corresponding and the geographical location information corresponding to IP of described the second terminal, the geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal compared and obtain different-place login the result.
It should be noted that, carrying out and relatively obtain in the implementation of different-place login the result by the second terminal, can also return to described different-place login the result so that server carries out login authentication in conjunction with login authentication result by the second terminal to server.
In a kind of implementation in conjunction with above-mentioned two kinds of embodiment, described in step S730, according to the subscriber identity information of the second terminal, carrying out login authentication is specifically as follows, any one or more according in described rightness of business the result, identifying code legitimate verification result, common equipment the result, different-place login the result, and the subscriber identity information of described the second terminal carries out login authentication.
In the another kind of implementation in conjunction with above-mentioned two kinds of embodiment, described in step S730, according to the subscriber identity information of the second terminal, carry out login authentication and be specifically as follows, according to the subscriber identity informations one or more and described the second terminal in described rightness of business the result, identifying code legitimate verification result, authorization message, carry out login authentication;
Wherein, described authorization message specifically can receive from the second terminal, by the second terminal when described common equipment the result be that non-common equipment and/or described different-place login the result are while being different-place login, present after the information of whether authorizing non-common equipment and/or different-place login, according to the authorization message of user's input, obtain.
Again or, in the implementation in conjunction with above-mentioned two kinds of embodiment, if server is determined subscriber identity information and is verified, and rightness of business the result is that legal, described common equipment the result is that common equipment and/or described different-place login the result are non-different-place login, can directly determine that the result of login is for logining successfully.
In addition, also it should be noted that, the server described in the embodiment of the present invention can be divided according to function, by a plurality of servers, formed, such as: described server can comprise service server, account authentication server, IP server etc.Wherein, service server can be logined the relevant data such as business information to user for preserving; Account authentication server can be for identifying user identity, generation identifying code, admin-authentication code, identification identifying code etc.; IP server can be for inquiring about geographical location information corresponding to IP address etc.Be understandable that, the server described in the embodiment of the present invention is not limited in this kind of framework, can be any three the server that can apply login validation method that the embodiment of the present invention provides.
three of example devices
Introduced exemplary embodiment of the invention method three after, next, with reference to three of the login authentication equipment that is disposed at server of 8 pairs of exemplary embodiment of the invention of figure, be introduced.
For example, referring to Fig. 8, three of a kind of login authentication device structure schematic diagram providing for the embodiment of the present invention.As shown in the figure, this kind of possible execution mode that is disposed at the login authentication equipment of server can comprise:
Checking request reception unit 810, can be configured for the login authentication request sending in response to receiving the second terminal, wherein, described login authentication request is generated according to the figure of identification code by described the second terminal, wherein, the figure of described identification code specifically by the second terminal response in receiving the message of identification code being carried out to IMAQ, the shown identification code of first terminal is carried out to IMAQ and obtains, wherein, described identification code is used for identifying described first terminal; Extraction unit 820, can be configured for the subscriber identity information and the described identification code institute sign content that according to described login authentication request, obtain described the second terminal; Authentication unit 830, can be configured for according to the subscriber identity information of described the second terminal and carry out login authentication; Return to unit 840, can be configured for to the first terminal of described identification code sign and return to the result.
Visible, according to the login authentication equipment that is disposed at server of embodiment of the present invention, the login authentication request that extraction unit 820 can receive according to checking request reception unit 810, obtain subscriber identity information and the described identification code institute sign content of described the second terminal, authentication unit 830 can carry out login authentication according to the subscriber identity information of described the second terminal, return to unit 840 and can return to the result to the first terminal of described identification code sign, therefore, user is without inputting identity information at first terminal, just can there is not subscriber identity information in the stolen safety problem of first terminal yet, realized the object that guarantees user identity safety.
In a kind of possible implementation of the embodiment of the present invention, as shown in Figure 8, described extraction unit 820, can be configured for when the subscriber identity information of identification code and the second terminal is carried in described login authentication request, resolve described login authentication request and obtain the content of described identification code sign and the subscriber identity information of the second terminal; Or, described extraction unit 820, can be configured for when the figure of identification code and the subscriber identity information of the second terminal are carried in described login authentication request, resolve described login authentication request and obtain the figure of described identification code and the subscriber identity information of the second terminal, the figure of described identification code is identified to the content that obtains described identification code sign;
Wherein, described identification code specifically can be generated by first terminal, hardware information for identification service information, identifying code and/or described first terminal, wherein, described identifying code specifically can generate, encrypt and turn back to first terminal by server after the message of request login that receives first terminal, be used for identifying described first terminal, wherein, described business information can ask the business of login to be determined according to user by first terminal;
In this implementation, described authentication unit 830, the subscriber identity informations one or more and the second terminal that can be configured in the hardware information of the business information that identifies according to identification code, identifying code, first terminal carry out login authentication.
In a kind of possible implementation of the embodiment of the present invention, can also be by obtain one or more in rightness of business the result, identifying code legitimate verification result, common equipment the result with lower unit, and then can be according to the one or more login authentication of carrying out in rightness of business the result, identifying code legitimate verification result, common equipment the result, particularly, for example, the embodiment of the present invention can also comprise following any unit or combination:
The legal judging unit 850 of business, in the time of can being configured for described identification code for identification service information, according to described checking request, obtain described subscriber identity information and described business information, the described business information legitimate traffic corresponding with described subscriber identity information compared and obtain rightness of business the result;
Identifying code judging unit 860, can be configured for when described identification code is when identifying identifying code, according to described checking request, obtain described identifying code, to the deciphering of described identifying code, to the terminal of the identifying code sign after deciphering, be whether that terminal that described identifying code identifies when generating judges and is verified a yard legitimate verification result;
The second conventional judging unit 870, can be configured for when described identification code is when identifying the hardware information of first terminal, whether according to described checking request, obtain the hardware information of described subscriber identity information and described first terminal, be that usual hardware information that described subscriber identity information is corresponding judges and obtains common equipment the result to the hardware information of described first terminal;
General information transmitting element 880, can be configured for when described identification code is when identifying the hardware information of first terminal, inquire about the usual hardware information that described subscriber identity information is corresponding, to described the second terminal, return to described usual hardware information, so that the hardware information of the first terminal that the second terminal identifies described identification code and described usual hardware information compare, obtain common equipment the result.
In the another kind of possible implementation of the embodiment of the present invention, can also be by obtain different-place login the result with lower unit, and then can also carry out login authentication in conjunction with different-place login the result.Particularly, the embodiment of the present invention can also comprise:
Geography information transmitting element 890, can be configured for the geographical location information corresponding to IP of the described first terminal of inquiry and the geographical location information corresponding to IP of described the second terminal, to the second terminal, return to geographical location information that the IP of described first terminal is corresponding and the geographical location information corresponding to IP of described the second terminal, so that the second terminal compares the geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal to obtain different-place login the result; Or, the second geography information comparing unit 891, can be configured for the geographical location information corresponding to IP of the described first terminal of inquiry and the geographical location information corresponding to IP of described the second terminal, the geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal compared and obtain different-place login the result.
In a kind of implementation in conjunction with above-mentioned two kinds of embodiment, described authentication unit 830, can be configured for any one or more according in described rightness of business the result, identifying code legitimate verification result, common equipment the result, different-place login the result, and the subscriber identity information of described the second terminal carries out login authentication.
In the another kind of implementation in conjunction with above-mentioned two kinds of embodiment, described authentication unit 830, can be configured for according to the login accounts one or more and described the second terminal in described rightness of business the result, identifying code legitimate verification result, authorization message and carry out login authentication;
Wherein, described authorization message specifically can receive from the second terminal, by the second terminal when described common equipment the result be that non-common equipment and/or described different-place login the result are while being different-place login, present after the information of whether authorizing non-common equipment and/or different-place login, according to the authorization message of user's input, obtain.
Again or, in the implementation in conjunction with above-mentioned two kinds of embodiment, if server is determined subscriber identity information and is verified, and rightness of business the result is that legal, described common equipment the result is that common equipment and/or described different-place login the result are non-different-place login, can directly determine that the result of login is for logining successfully.
It should be noted that, in the present embodiment, the legal judging unit 850 of business, identifying code judging unit the 860, second conventional judging unit 870, general information transmitting element 880, geography information transmitting element 890, the second geography information comparing unit 891 are used dotted lines in Fig. 8, to represent that this unit is not the necessary unit of present device.
Although it should be noted that some unit or the subelement of having mentioned login authentication equipment in above-detailed, this division is only not enforceable.In fact, according to the embodiment of the present invention, the feature of above-described two or more devices and function can be specialized in a device.Otherwise, the feature of an above-described device and function can Further Division for to be specialized by a plurality of devices.
In addition, although described in the accompanying drawings the operation of the inventive method with particular order,, this not requires or hint must be carried out these operations according to this particular order, or the operation shown in must carrying out all could realize the result of expectation.Additionally or alternatively, can omit some step, a plurality of steps be merged into a step and carry out, and/or a step is decomposed into a plurality of steps carries out.
Although described spirit of the present invention and principle with reference to some embodiments, but should be appreciated that, the present invention is not limited to disclosed embodiment, the division of each side is not meant that to the feature in these aspects can not combine to be benefited yet, and this division is only the convenience in order to explain.The present invention is intended to contain interior included various modifications and the equivalent arrangements of spirit and scope of claims.
Accompanying drawing explanation
By reference to accompanying drawing, read detailed description below, above-mentioned and other objects of exemplary embodiment of the invention, the feature and advantage easy to understand that will become.In the accompanying drawings, in exemplary and nonrestrictive mode, show some execution modes of the present invention, wherein:
Fig. 1 schematically shows the application scenarios according to embodiment of the present invention;
Fig. 2 schematically shows according to one of schematic flow sheet of the login validation method of embodiment of the present invention;
Fig. 3 schematically shows the Signalling exchange schematic diagram according to the login validation method of embodiment of the present invention;
Fig. 4 schematically shows according to one of structural representation of the login authentication equipment of embodiment of the present invention;
Fig. 5 schematically shows according to two of the schematic flow sheet of the login validation method of embodiment of the present invention;
Fig. 6 schematically shows according to two of the structural representation of the login authentication equipment of embodiment of the present invention;
Fig. 7 schematically shows according to three of the schematic flow sheet of the login validation method of embodiment of the present invention;
Fig. 8 schematically shows according to three of the structural representation of the login authentication equipment of embodiment of the present invention;
In the accompanying drawings, identical or corresponding label represents identical or corresponding part.
Embodiment
Below with reference to some illustrative embodiments, principle of the present invention and spirit are described.Should be appreciated that providing these execution modes is only used to make those skilled in the art can understand better and then realize the present invention, and not limit the scope of the invention by any way.On the contrary, it is in order to make the disclosure more thorough and complete that these execution modes are provided, and the scope of the present disclosure intactly can be conveyed to those skilled in the art.
Art technology technical staff knows, embodiments of the present invention can be implemented as a kind of system, device, equipment, method or computer program.Therefore, the disclosure can specific implementation be following form, that is: hardware, software (comprising firmware, resident software, microcode etc.), or the form of hardware and software combination completely completely.
According to the embodiment of the present invention, a kind of login validation method and equipment have been proposed.
In this article, it will be appreciated that, any number of elements in accompanying drawing is all unrestricted for example, and any name is all only for distinguishing, and does not have any limitation.
Below with reference to some representative embodiments of the present invention, explain in detail principle of the present invention and spirit.

Claims (26)

1. a login validation method, is applied to first terminal, comprising:
In response to receiving user, ask the message of logining, show for identifying the identification code of described first terminal, so that the second terminal carries out to described identification code the figure that IMAQ obtains described identification code, according to the figure of described identification code, generate login authentication request, to server, send login authentication request, so that described server obtains the subscriber identity information of described the second terminal and the content that described identification code identifies according to described login authentication request, according to the subscriber identity information of described the second terminal, carry out login authentication, first terminal to described identification code sign returns to the result,
The result that reception server returns.
2. method according to claim 1, wherein, before showing described identification code, also comprises:
Generate the described identification code for the hardware information of identification service information, identifying code and/or first terminal, wherein, described identifying code is used for identifying described first terminal, specifically by server, after the message of request login that receives first terminal, generate, encrypt and turn back to first terminal, described business information asks the business of login to be determined according to user, so that the subscriber identity information of one or more and the second terminal in the hardware information of the business information that server identifies according to identification code, identifying code, first terminal carries out login authentication.
3. a login authentication equipment, is disposed at first terminal, comprising:
Login receiving element, be configured in response to receiving user and ask the message of logining, show for identifying the identification code of described first terminal, so that the second terminal carries out to described identification code the figure that IMAQ obtains described identification code, according to the figure of described identification code, generate login authentication request, to server, send login authentication request, so that described server obtains the subscriber identity information of described the second terminal and the content that described identification code identifies according to described login authentication request, according to the subscriber identity information of described the second terminal, carry out login authentication, first terminal to described identification code sign returns to the result,
Checking receiving element, is configured for the result that reception server returns.
4. equipment according to claim 3, wherein, also comprises:
Identification code generation unit, be configured for and generate for identification service information, the described identification code of the hardware information of identifying code and/or first terminal, wherein, described identifying code is used for identifying described first terminal, specifically by server, after the message of request login that receives first terminal, generated, encrypt and turn back to first terminal, described business information asks the business of login to be determined according to user, so that the business information that server identifies according to identification code, identifying code, one or more in the hardware information of first terminal, and the subscriber identity information of the second terminal carries out login authentication.
5. a login validation method, is applied to the second terminal, comprising:
In response to user, identification code is carried out the operation of IMAQ, the identification code that first terminal is shown is carried out to the figure that IMAQ obtains identification code, wherein, described identification code is used for identifying described first terminal;
According to the figure of described identification code, generate login authentication request;
To server, send login authentication request, so that described server obtains the subscriber identity information of described the second terminal and the content that described identification code identifies according to described login authentication request, according to the subscriber identity information of described the second terminal, carry out login authentication, the first terminal identifying to described identification code returns to the result.
6. method according to claim 5, wherein, the described figure according to identification code generates login authentication request and comprises:
Figure to described identification code is identified, and obtains the hardware information of business information, identifying code and/or first terminal that described identification code identifies; By the hardware information of business information, identifying code and/or first terminal, and the subscriber identity information of described the second terminal is carried in checking request, generate checking request, or, the figure of the subscriber identity information of described the second terminal and described identification code is carried in checking request, generate checking request, so that the subscriber identity information of one or more and the second terminal in the hardware information of the business information that server identifies according to identification code, identifying code, first terminal carries out login authentication;
Wherein, described identification code is specifically generated by first terminal, hardware information for identification service information, identifying code and/or described first terminal, wherein, described identifying code is used for identifying described first terminal, specifically by server, after the message of request login that receives first terminal, generate, encrypt and turn back to first terminal, wherein, described business information asks the business of login to be determined by first terminal according to user.
7. method according to claim 6, also comprises following arbitrary steps or combination:
When described identification code is used for identification service information, receive the rightness of business the result that described server returns for described checking request, wherein, described rightness of business the result specifically obtains described subscriber identity information and described business information by server according to described checking request, and the described business information legitimate traffic corresponding with described subscriber identity information compared and obtained;
When described identification code is used for identifying identifying code, receive the identifying code legitimate verification result that described server returns for described checking request, wherein, described identifying code legitimate verification result specifically obtains described identifying code by server according to described checking request, to the deciphering of described identifying code, to the terminal of the identifying code sign after deciphering, be whether that terminal that described identifying code identifies when generating judges and obtains;
When described identification code is used for identifying the hardware information of first terminal, receive the common equipment the result that described server returns for described checking request, wherein, whether described common equipment the result is specifically obtained the hardware information of described subscriber identity information and described first terminal according to described checking request by server, to the hardware information of described first terminal, be that usual hardware information that described subscriber identity information is corresponding judges and obtains;
When described identification code is used for identifying the hardware information of first terminal, receive the usual hardware information corresponding with described subscriber identity information that described server returns for described checking request, the hardware information of the first terminal that described identification code is identified and described usual hardware information compare, and obtain common equipment the result.
8. according to the method described in claim 5-7 any one, also comprise:
Receive geographical location information that the IP of the described first terminal that described server returns for described checking request is corresponding and the geographical location information corresponding to IP of described the second terminal, the geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal compared and obtain different-place login the result;
Or,
Receive the different-place login the result that described server returns for described checking request, wherein, after described different-place login the result specifically receives described checking request by described server, inquire about geographical location information that the IP of described first terminal is corresponding and the geographical location information corresponding to IP of described the second terminal, the geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal compared and obtained.
9. method according to claim 8, also comprises:
When described common equipment the result is non-common equipment and/or described different-place login the result while being different-place login, present the information of whether authorizing non-common equipment and/or different-place login;
If receive the authorization message of user's input, send described authorization message to described server, so that server carries out login authentication according to the subscriber identity information of authorization message and described the second terminal.
10. a login authentication equipment, is disposed at the second terminal, comprising:
Collecting unit, is configured for and in response to user, identification code is carried out the operation of IMAQ, and the identification code that first terminal is shown is carried out to the figure that IMAQ obtains identification code, and wherein, described identification code is used for identifying described first terminal;
Request generation unit, is configured for according to the figure of described identification code and generates login authentication request;
Send request unit, be configured for to server and send login authentication request, so that described server obtains the subscriber identity information of described the second terminal and the content that described identification code identifies according to described login authentication request, according to the subscriber identity information of described the second terminal, carry out login authentication, the first terminal identifying to described identification code returns to the result.
11. equipment according to claim 10, wherein,
Described request generation unit comprises: the first recognin unit, and be configured for the figure of described identification code is identified, obtain the hardware information of business information, identifying code and/or first terminal that described identification code identifies; Generate subelement, be configured for the hardware information of business information, identifying code and/or first terminal, and the subscriber identity information of described the second terminal is carried in checking request, generate checking request;
Or,
Described request generation unit, is configured for the figure of the login account of described the second terminal and described identification code is carried in checking request, generates checking request;
Wherein, described identification code is specifically generated by first terminal, hardware information for identification service information, identifying code and/or described first terminal, wherein, described identifying code specifically generates, encrypts and turn back to first terminal by server after the message of request login that receives first terminal, be used for identifying described first terminal, wherein, described business information asks the business of login to be determined by first terminal according to user.
12. equipment according to claim 11, also comprise following any unit or combination:
Business the result receiving element, be configured for when described identification code is during for identification service information, receive the rightness of business the result that described server returns for described checking request, wherein, described rightness of business the result specifically obtains described subscriber identity information and described business information by server according to described checking request, and the described business information legitimate traffic corresponding with described subscriber identity information compared and obtained;
Identifying code the result receiving element, be configured for when described identification code is when identifying identifying code, receive the identifying code legitimate verification result that described server returns for described checking request, wherein, described identifying code legitimate verification result specifically obtains described identifying code by server according to described checking request, to the deciphering of described identifying code, to the terminal of the identifying code sign after deciphering, be whether that terminal that described identifying code identifies when generating judges and obtains;
Conventional the result receiving element, be configured for when described identification code is when identifying the hardware information of first terminal, receive the common equipment the result that described server returns for described checking request, wherein, whether described common equipment the result is specifically obtained the hardware information of described subscriber identity information and described first terminal according to described checking request by server, to the hardware information of described first terminal, be that usual hardware information that described subscriber identity information is corresponding judges and obtains;
General information receiving element, is configured for when described identification code is when identifying the hardware information of first terminal, receives the usual hardware information corresponding with described subscriber identity information that described server returns for described checking request; The first conventional judging unit, the hardware information and the described usual hardware information that are configured for the first terminal that described identification code that general information receiving element is received identifies compare, and obtain common equipment the result.
13. according to the equipment described in claim 10-12 any one, also comprises:
Geography information receiving element, is configured for and receives geographical location information that the IP of the described first terminal that described server returns for described checking request is corresponding and the geographical location information corresponding to IP of described the second terminal; The first geography information comparing unit, geographical location information corresponding to IP that is configured for geographical location information that the IP of the first terminal that geography information receiving element is received is corresponding and the second terminal compares and obtains different-place login the result;
Geographical the result receiving element, be configured for and receive the different-place login the result that described server returns for described checking request, wherein, after described different-place login the result specifically receives described checking request by described server, inquire about geographical location information that the IP of described first terminal is corresponding and the geographical location information corresponding to IP of described the second terminal, the geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal compared and obtained.
14. equipment according to claim 13, also comprise:
Tip element, be configured for when described common equipment the result be non-common equipment and/or described different-place login the result while being different-place login, present the information of whether authorizing non-common equipment and/or different-place login;
Authorize transmitting element, if be configured for the authorization message that receives user's input, to described server, send described authorization message, so that server carries out login authentication according to the subscriber identity information of authorization message and described the second terminal.
15. 1 kinds of login validation methods, are applied to server end, comprising:
In response to the login authentication request that receives the second terminal transmission, wherein, described login authentication request is generated according to the figure of identification code by described the second terminal, wherein, the figure of described identification code specifically by the second terminal response in receiving the message of identification code being carried out to IMAQ, the shown identification code of first terminal is carried out to IMAQ and obtain, wherein, described identification code is used for identifying described first terminal;
According to described login authentication request, obtain the subscriber identity information of described the second terminal and the content that described identification code identifies;
According to the subscriber identity information of described the second terminal, carry out login authentication;
First terminal to described identification code sign returns to the result.
16. methods according to claim 15, wherein, the described content that request obtains the subscriber identity information of described the second terminal and described identification code sign according to login authentication comprises:
When the content of identification code sign and the subscriber identity information of the second terminal are carried in described login authentication request, resolve described login authentication request and obtain the content of described identification code sign and the subscriber identity information of the second terminal; Or, when the figure of identification code and the subscriber identity information of the second terminal are carried in described login authentication request, resolve described login authentication request and obtain the figure of described identification code and the subscriber identity information of the second terminal, the figure of described identification code is identified to the content that obtains described identification code sign;
Wherein, described identification code is specifically generated by first terminal, hardware information for identification service information, identifying code and/or described first terminal, wherein, described identifying code specifically generates, encrypts and turn back to first terminal by server after the message of request login that receives first terminal, be used for identifying described first terminal, wherein, described business information asks the business of login to be determined by first terminal according to user;
Wherein, describedly according to the subscriber identity information of the second terminal, carry out login authentication and be specially, the subscriber identity information of one or more and the second terminal in the hardware information of the business information identifying according to identification code, identifying code, first terminal carries out login authentication.
17. methods according to claim 16, also comprise following arbitrary steps or combination:
When described identification code is used for identification service information, according to described checking request, obtain described subscriber identity information and described business information, the described business information legitimate traffic corresponding with described subscriber identity information compared and obtain rightness of business the result;
When described identification code is used for identifying identifying code, according to described checking request, obtain described identifying code, to the deciphering of described identifying code, to the terminal of the identifying code sign after deciphering, be whether that terminal that described identifying code identifies when generating judges and is verified a yard legitimate verification result;
When described identification code is used for identifying the hardware information of first terminal, whether according to described checking request, obtain the hardware information of described subscriber identity information and described first terminal, be that usual hardware information that described subscriber identity information is corresponding judges and obtains common equipment the result to the hardware information of described first terminal;
When described identification code is used for identifying the hardware information of first terminal, inquire about the usual hardware information that described subscriber identity information is corresponding, to described the second terminal, return to described usual hardware information, so that the hardware information of the first terminal that the second terminal identifies described identification code and described usual hardware information compare, obtain common equipment the result.
18. according to the method described in claim 15-17 any one, also comprises:
Inquire about geographical location information that the IP of described first terminal is corresponding and the geographical location information corresponding to IP of described the second terminal, to the second terminal, return to geographical location information that the IP of described first terminal is corresponding and the geographical location information corresponding to IP of described the second terminal, so that the second terminal compares the geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal to obtain different-place login the result;
Inquire about geographical location information that the IP of described first terminal is corresponding and the geographical location information corresponding to IP of described the second terminal, the geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal compared and obtain different-place login the result.
19. methods according to claim 18, wherein, describedly according to the subscriber identity information of the second terminal, carry out login authentication and be specially, any one or more according in described rightness of business the result, identifying code legitimate verification result, common equipment the result, different-place login the result, and the subscriber identity information of described the second terminal carries out login authentication.
20. methods according to claim 18, wherein, describedly according to the subscriber identity information of the second terminal, carry out login authentication and be specially, according to the subscriber identity informations one or more and described the second terminal in described rightness of business the result, identifying code legitimate verification result, authorization message, carry out login authentication;
Wherein, described authorization message specifically receives from the second terminal, by the second terminal when described common equipment the result be that non-common equipment and/or described different-place login the result are while being different-place login, present after the information of whether authorizing non-common equipment and/or different-place login, according to the authorization message of user's input, obtain.
21. 1 kinds of login authentication equipment, are disposed at server, comprising:
Checking request reception unit, be configured for the login authentication request sending in response to receiving the second terminal, wherein, described login authentication request is generated according to the figure of identification code by described the second terminal, wherein, the figure of described identification code specifically by the second terminal response in receiving the message of identification code being carried out to IMAQ, the shown identification code of first terminal is carried out to IMAQ and obtains, wherein, described identification code is used for identifying described first terminal;
Extraction unit, is configured for the subscriber identity information and the described identification code institute sign content that according to described login authentication request, obtain described the second terminal;
Authentication unit, is configured for according to the subscriber identity information of described the second terminal and carries out login authentication;
Return to unit, be configured for to the first terminal of described identification code sign and return to the result.
22. equipment according to claim 21, wherein, described extraction unit, be configured for when the subscriber identity information of identification code and the second terminal is carried in described login authentication request, resolve described login authentication request and obtain the content of described identification code sign and the subscriber identity information of the second terminal; Or, when the figure of identification code and the subscriber identity information of the second terminal are carried in described login authentication request, resolve described login authentication request and obtain the figure of described identification code and the subscriber identity information of the second terminal, the figure of described identification code is identified to the content that obtains described identification code sign;
Wherein, described identification code is specifically generated by first terminal, hardware information for identification service information, identifying code and/or described first terminal, wherein, described identifying code specifically generates, encrypts and turn back to first terminal by server after the message of request login that receives first terminal, be used for identifying described first terminal, wherein, described business information asks the business of login to be determined by first terminal according to user;
Wherein, described authentication unit, is configured for according to the subscriber identity information of one or more and the second terminal in the hardware information of identification code business information, identifying code, first terminal and carries out login authentication.
23. equipment according to claim 22, also comprise following any unit or combination:
The legal judging unit of business, while being configured for described identification code for identification service information, according to described checking request, obtain described subscriber identity information and described business information, the described business information legitimate traffic corresponding with described subscriber identity information compared and obtain rightness of business the result;
Identifying code judging unit, be configured for when described identification code is when identifying identifying code, according to described checking request, obtain described identifying code, to the deciphering of described identifying code, to the terminal of the identifying code sign after deciphering, be whether that terminal that described identifying code identifies when generating judges and is verified a yard legitimate verification result;
The second conventional judging unit, be configured for when described identification code is when identifying the hardware information of first terminal, whether according to described checking request, obtain the hardware information of described subscriber identity information and described first terminal, be that usual hardware information that described subscriber identity information is corresponding judges and obtains common equipment the result to the hardware information of described first terminal;
General information transmitting element, be configured for when described identification code is when identifying the hardware information of first terminal, inquire about the usual hardware information that described subscriber identity information is corresponding, to described the second terminal, return to described usual hardware information, so that the hardware information of the first terminal that the second terminal identifies described identification code and described usual hardware information compare, obtain common equipment the result.
24. according to the equipment described in claim 21-23 any one, also comprises:
Geography information transmitting element, be configured for the geographical location information corresponding to IP of the described first terminal of inquiry and the geographical location information corresponding to IP of described the second terminal, to the second terminal, return to geographical location information that the IP of described first terminal is corresponding and the geographical location information corresponding to IP of described the second terminal, so that the second terminal compares the geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal to obtain different-place login the result;
Or,
The second geography information comparing unit, be configured for the geographical location information corresponding to IP of the described first terminal of inquiry and the geographical location information corresponding to IP of described the second terminal, the geographical location information corresponding to IP of geographical location information corresponding to the IP of described first terminal and described the second terminal compared and obtain different-place login the result.
25. equipment according to claim 24, wherein, described authentication unit, be configured for any one or more according in described rightness of business the result, identifying code legitimate verification result, common equipment the result, different-place login the result, and the subscriber identity information of described the second terminal carries out login authentication.
26. equipment according to claim 24, wherein, described authentication unit, is configured for according to the login accounts one or more and described the second terminal in described rightness of business the result, identifying code legitimate verification result, authorization message and carries out login authentication;
Wherein, described authorization message specifically receives from the second terminal, by the second terminal when described common equipment the result be that non-common equipment and/or described different-place login the result are while being different-place login, present after the information of whether authorizing non-common equipment and/or different-place login, according to the authorization message of user's input, obtain.
CN201310738898.8A 2013-12-27 2013-12-27 A kind of login validation method and equipment Active CN103685311B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310738898.8A CN103685311B (en) 2013-12-27 2013-12-27 A kind of login validation method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310738898.8A CN103685311B (en) 2013-12-27 2013-12-27 A kind of login validation method and equipment

Publications (2)

Publication Number Publication Date
CN103685311A true CN103685311A (en) 2014-03-26
CN103685311B CN103685311B (en) 2017-06-13

Family

ID=50321625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310738898.8A Active CN103685311B (en) 2013-12-27 2013-12-27 A kind of login validation method and equipment

Country Status (1)

Country Link
CN (1) CN103685311B (en)

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905206A (en) * 2014-04-03 2014-07-02 江苏先安科技有限公司 Cross-equipment and cross-application identity authentication method based on data image coding
CN103945380A (en) * 2014-04-10 2014-07-23 深圳市信锐网科技术有限公司 Method and system for network login authentication based on graphic code
CN103971239A (en) * 2014-05-28 2014-08-06 中国农业银行股份有限公司 Verification method and device
CN104066203A (en) * 2014-06-20 2014-09-24 可牛网络技术(北京)有限公司 Method and system for generating identifier of mobile device, method for remotely controlling mobile device, and communication terminal
CN104618356A (en) * 2015-01-20 2015-05-13 广东欧珀移动通信有限公司 Identity verification method and device
CN104917766A (en) * 2015-06-10 2015-09-16 飞天诚信科技股份有限公司 Security authentication method for two-dimension code
CN104980400A (en) * 2014-04-08 2015-10-14 深圳市腾讯计算机系统有限公司 Login access control method and login access control server
WO2015165423A1 (en) * 2014-04-30 2015-11-05 Tencent Technology (Shenzhen) Company Limited Account login method, apparatus, and system
CN105095729A (en) * 2015-06-19 2015-11-25 赛肯(北京)科技有限公司 Two-dimensional code login method, server and system
WO2015180611A1 (en) * 2014-05-26 2015-12-03 Tencent Technology (Shenzhen) Company Limited Login information transmission method, code scanning method and apparatus, and server
CN105162785A (en) * 2015-09-07 2015-12-16 飞天诚信科技股份有限公司 Method and equipment for performing registration based on authentication equipment
CN105162775A (en) * 2015-08-05 2015-12-16 深圳市方迪科技股份有限公司 Logging method and device of virtual machine
CN105162774A (en) * 2015-08-05 2015-12-16 深圳市方迪科技股份有限公司 Virtual machine login method and device used for terminal
CN105187450A (en) * 2015-10-08 2015-12-23 飞天诚信科技股份有限公司 Authentication method and device based on authentication equipment
CN105227307A (en) * 2014-06-03 2016-01-06 阿里巴巴集团控股有限公司 Auth method and system and server data processing method and server
CN105490809A (en) * 2014-09-17 2016-04-13 腾讯科技(深圳)有限公司 Information acquisition method, device, terminal and server
CN105516135A (en) * 2015-12-08 2016-04-20 腾讯科技(深圳)有限公司 Method and device used for account login
CN105763520A (en) * 2014-12-18 2016-07-13 阿里巴巴集团控股有限公司 Network account password recovery method and device, client terminal device and server
CN105991619A (en) * 2015-03-05 2016-10-05 中兴通讯股份有限公司 Safety authentication method and device
CN106060098A (en) * 2016-08-09 2016-10-26 北京小米移动软件有限公司 Processing method, processing device and processing system for verification codes
CN106507158A (en) * 2015-09-06 2017-03-15 腾讯科技(北京)有限公司 A kind of information processing method, first terminal and second terminal
CN106651407A (en) * 2015-07-17 2017-05-10 阿里巴巴集团控股有限公司 Data acquisition method and apparatus
CN106936761A (en) * 2015-12-29 2017-07-07 株式会社日立制作所 A kind of secure log authentication method and system based on Quick Response Code and hardware information
CN107172025A (en) * 2017-04-28 2017-09-15 武汉矽感科技有限公司 Method for authenticating user identity and device based on multiframe identification code
CN107204959A (en) * 2016-03-16 2017-09-26 阿里巴巴集团控股有限公司 Verification method, the apparatus and system of identifying code
CN108985040A (en) * 2018-06-29 2018-12-11 北京海泰方圆科技股份有限公司 Method and apparatus, storage medium and the processor logged in using cipher key
CN109150852A (en) * 2018-07-31 2019-01-04 海南新软软件有限公司 A kind of account number safe login method, apparatus and system
CN109600340A (en) * 2017-09-30 2019-04-09 腾讯科技(深圳)有限公司 Authorization method, apparatus, terminal and server
CN109711133A (en) * 2018-12-26 2019-05-03 广州市巽腾信息科技有限公司 Authentication method, device and the server of identity information
CN109741067A (en) * 2018-12-19 2019-05-10 广州羊城通有限公司 A kind of data processing method and device based on IC card unlocking
CN109753773A (en) * 2019-01-08 2019-05-14 浙江汉默生链商科技有限公司 A kind of quick auth method and device based on terminal
CN110427747A (en) * 2019-06-20 2019-11-08 中国科学院信息工程研究所 A kind of authentication identifying method and device for supporting service security to mark
CN110830930A (en) * 2019-11-19 2020-02-21 东北石油大学 Verification code anti-sniffing processing method and device
CN110995682A (en) * 2019-11-26 2020-04-10 深圳市思迪信息技术股份有限公司 Method and device for preventing multiple terminals from logging in at different places
CN111245841A (en) * 2020-01-14 2020-06-05 杭州涂鸦信息技术有限公司 Account authorization method and system
CN111726331A (en) * 2019-06-28 2020-09-29 上海妃鱼网络科技有限公司 Code scanning login information processing method
CN113746801A (en) * 2021-07-30 2021-12-03 佛山市青松科技股份有限公司 Communication method, sending terminal, receiving terminal and system based on temporary secret key
CN115834077A (en) * 2022-11-11 2023-03-21 北京深盾科技股份有限公司 Control method, control system, electronic device, and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102111271A (en) * 2009-12-25 2011-06-29 林茂聪 Network security authentication method and device as well as authentication method of hand-held electronic device
CN102130909A (en) * 2011-02-22 2011-07-20 中兴通讯股份有限公司 Authentication method and system
CN102724667A (en) * 2012-05-29 2012-10-10 中国联合网络通信集团有限公司 Authentication method, device and system
CN103001973A (en) * 2012-12-26 2013-03-27 百度在线网络技术(北京)有限公司 Method, system and device used for controlling login and based on two-dimensional code
CN103023917A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for authorization aiming at intelligent household electrical appliance
CN103152401A (en) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 Mobile terminal, login method and system through mobile terminal, and cloud server
CN103152330A (en) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 Login method, login system and cloud server
CN103237034A (en) * 2013-04-28 2013-08-07 北京小米科技有限责任公司 Login method and device
CN103457951A (en) * 2013-09-02 2013-12-18 小米科技有限责任公司 Method and device for allowing multiple terminals to login to server

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102111271A (en) * 2009-12-25 2011-06-29 林茂聪 Network security authentication method and device as well as authentication method of hand-held electronic device
CN102130909A (en) * 2011-02-22 2011-07-20 中兴通讯股份有限公司 Authentication method and system
CN102724667A (en) * 2012-05-29 2012-10-10 中国联合网络通信集团有限公司 Authentication method, device and system
CN103001973A (en) * 2012-12-26 2013-03-27 百度在线网络技术(北京)有限公司 Method, system and device used for controlling login and based on two-dimensional code
CN103023917A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for authorization aiming at intelligent household electrical appliance
CN103152401A (en) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 Mobile terminal, login method and system through mobile terminal, and cloud server
CN103152330A (en) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 Login method, login system and cloud server
CN103237034A (en) * 2013-04-28 2013-08-07 北京小米科技有限责任公司 Login method and device
CN103457951A (en) * 2013-09-02 2013-12-18 小米科技有限责任公司 Method and device for allowing multiple terminals to login to server

Cited By (62)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905206A (en) * 2014-04-03 2014-07-02 江苏先安科技有限公司 Cross-equipment and cross-application identity authentication method based on data image coding
CN104980400A (en) * 2014-04-08 2015-10-14 深圳市腾讯计算机系统有限公司 Login access control method and login access control server
CN103945380A (en) * 2014-04-10 2014-07-23 深圳市信锐网科技术有限公司 Method and system for network login authentication based on graphic code
US10009767B2 (en) 2014-04-30 2018-06-26 Tencent Technology (Shenzhen) Company Limited Account login method, apparatus, and system
WO2015165423A1 (en) * 2014-04-30 2015-11-05 Tencent Technology (Shenzhen) Company Limited Account login method, apparatus, and system
US10645579B2 (en) 2014-04-30 2020-05-05 Tencent Technology (Shenzhen) Company Limited Account login method, apparatus, and system
US9887988B2 (en) 2014-05-26 2018-02-06 Tencent Technology (Shenzhen) Company Limited Login information transmission method, code scanning method and apparatus, and server
WO2015180611A1 (en) * 2014-05-26 2015-12-03 Tencent Technology (Shenzhen) Company Limited Login information transmission method, code scanning method and apparatus, and server
CN103971239A (en) * 2014-05-28 2014-08-06 中国农业银行股份有限公司 Verification method and device
CN105227307A (en) * 2014-06-03 2016-01-06 阿里巴巴集团控股有限公司 Auth method and system and server data processing method and server
TWI650666B (en) * 2014-06-03 2019-02-11 香港商阿里巴巴集團服務有限公司 Authentication method and system, and server data processing method and server
CN104066203A (en) * 2014-06-20 2014-09-24 可牛网络技术(北京)有限公司 Method and system for generating identifier of mobile device, method for remotely controlling mobile device, and communication terminal
CN105490809A (en) * 2014-09-17 2016-04-13 腾讯科技(深圳)有限公司 Information acquisition method, device, terminal and server
CN105490809B (en) * 2014-09-17 2020-11-06 腾讯科技(深圳)有限公司 Information acquisition method and device, terminal and server
CN105763520A (en) * 2014-12-18 2016-07-13 阿里巴巴集团控股有限公司 Network account password recovery method and device, client terminal device and server
CN104618356B (en) * 2015-01-20 2018-02-16 广东欧珀移动通信有限公司 Auth method and device
CN104618356A (en) * 2015-01-20 2015-05-13 广东欧珀移动通信有限公司 Identity verification method and device
CN105991619A (en) * 2015-03-05 2016-10-05 中兴通讯股份有限公司 Safety authentication method and device
CN104917766A (en) * 2015-06-10 2015-09-16 飞天诚信科技股份有限公司 Security authentication method for two-dimension code
CN104917766B (en) * 2015-06-10 2018-01-05 飞天诚信科技股份有限公司 A kind of two-dimension code safe authentication method
WO2016197934A1 (en) * 2015-06-10 2016-12-15 飞天诚信科技股份有限公司 Barcode security authentication method
CN105095729B (en) * 2015-06-19 2018-05-25 广州密码科技有限公司 A kind of Quick Response Code login method, server and system
CN105095729A (en) * 2015-06-19 2015-11-25 赛肯(北京)科技有限公司 Two-dimensional code login method, server and system
CN106651407B (en) * 2015-07-17 2020-12-25 阿里巴巴集团控股有限公司 Data acquisition method and device
CN106651407A (en) * 2015-07-17 2017-05-10 阿里巴巴集团控股有限公司 Data acquisition method and apparatus
CN105162774B (en) * 2015-08-05 2018-08-24 深圳市方迪融信科技有限公司 Virtual machine entry method, the virtual machine entry method and device for terminal
CN105162774A (en) * 2015-08-05 2015-12-16 深圳市方迪科技股份有限公司 Virtual machine login method and device used for terminal
CN105162775A (en) * 2015-08-05 2015-12-16 深圳市方迪科技股份有限公司 Logging method and device of virtual machine
CN106507158A (en) * 2015-09-06 2017-03-15 腾讯科技(北京)有限公司 A kind of information processing method, first terminal and second terminal
CN106507158B (en) * 2015-09-06 2020-07-14 腾讯科技(北京)有限公司 Information processing method, first terminal and second terminal
CN105162785A (en) * 2015-09-07 2015-12-16 飞天诚信科技股份有限公司 Method and equipment for performing registration based on authentication equipment
US10637857B2 (en) 2015-09-07 2020-04-28 Feitian Technologies Co., Ltd. Method and device for registering based on authenticating device
CN105162785B (en) * 2015-09-07 2019-01-04 飞天诚信科技股份有限公司 A kind of method and apparatus registered based on authenticating device
CN105187450A (en) * 2015-10-08 2015-12-23 飞天诚信科技股份有限公司 Authentication method and device based on authentication equipment
CN105187450B (en) * 2015-10-08 2019-05-10 飞天诚信科技股份有限公司 A kind of method and apparatus authenticated based on authenticating device
US10979427B2 (en) 2015-10-08 2021-04-13 Fie Han Technologies Co., Ltd. Method and device for authenticating based on authenticating device
CN105516135B (en) * 2015-12-08 2020-02-21 腾讯科技(深圳)有限公司 Method and device for account login
US10812483B2 (en) 2015-12-08 2020-10-20 Tencent Technology (Shenzhen) Company Limited Account login method and apparatus
CN105516135A (en) * 2015-12-08 2016-04-20 腾讯科技(深圳)有限公司 Method and device used for account login
CN106936761A (en) * 2015-12-29 2017-07-07 株式会社日立制作所 A kind of secure log authentication method and system based on Quick Response Code and hardware information
CN107204959B (en) * 2016-03-16 2020-07-24 阿里巴巴集团控股有限公司 Verification method, device and system of verification code
CN107204959A (en) * 2016-03-16 2017-09-26 阿里巴巴集团控股有限公司 Verification method, the apparatus and system of identifying code
CN106060098B (en) * 2016-08-09 2019-07-09 北京小米支付技术有限公司 Processing method, processing unit and the processing system of identifying code
CN106060098A (en) * 2016-08-09 2016-10-26 北京小米移动软件有限公司 Processing method, processing device and processing system for verification codes
CN107172025A (en) * 2017-04-28 2017-09-15 武汉矽感科技有限公司 Method for authenticating user identity and device based on multiframe identification code
CN109600340B (en) * 2017-09-30 2021-04-16 腾讯科技(深圳)有限公司 Operation authorization method, device, terminal and server
CN109600340A (en) * 2017-09-30 2019-04-09 腾讯科技(深圳)有限公司 Authorization method, apparatus, terminal and server
CN108985040A (en) * 2018-06-29 2018-12-11 北京海泰方圆科技股份有限公司 Method and apparatus, storage medium and the processor logged in using cipher key
CN109150852A (en) * 2018-07-31 2019-01-04 海南新软软件有限公司 A kind of account number safe login method, apparatus and system
CN109741067A (en) * 2018-12-19 2019-05-10 广州羊城通有限公司 A kind of data processing method and device based on IC card unlocking
CN109711133A (en) * 2018-12-26 2019-05-03 广州市巽腾信息科技有限公司 Authentication method, device and the server of identity information
CN109711133B (en) * 2018-12-26 2020-05-15 巽腾(广东)科技有限公司 Identity information authentication method and device and server
CN109753773A (en) * 2019-01-08 2019-05-14 浙江汉默生链商科技有限公司 A kind of quick auth method and device based on terminal
CN110427747A (en) * 2019-06-20 2019-11-08 中国科学院信息工程研究所 A kind of authentication identifying method and device for supporting service security to mark
CN110427747B (en) * 2019-06-20 2021-12-14 中国科学院信息工程研究所 Identity authentication method and device supporting service security mark
CN111726331A (en) * 2019-06-28 2020-09-29 上海妃鱼网络科技有限公司 Code scanning login information processing method
CN110830930A (en) * 2019-11-19 2020-02-21 东北石油大学 Verification code anti-sniffing processing method and device
CN110995682A (en) * 2019-11-26 2020-04-10 深圳市思迪信息技术股份有限公司 Method and device for preventing multiple terminals from logging in at different places
CN111245841A (en) * 2020-01-14 2020-06-05 杭州涂鸦信息技术有限公司 Account authorization method and system
CN113746801A (en) * 2021-07-30 2021-12-03 佛山市青松科技股份有限公司 Communication method, sending terminal, receiving terminal and system based on temporary secret key
CN115834077A (en) * 2022-11-11 2023-03-21 北京深盾科技股份有限公司 Control method, control system, electronic device, and storage medium
CN115834077B (en) * 2022-11-11 2023-08-01 北京深盾科技股份有限公司 Control method, control system, electronic device and storage medium

Also Published As

Publication number Publication date
CN103685311B (en) 2017-06-13

Similar Documents

Publication Publication Date Title
CN103685311A (en) Log-in validation method and device
CN110086608B (en) User authentication method, device, computer equipment and computer readable storage medium
EP3343831B1 (en) Identity authentication method and apparatus
CN111556006B (en) Third-party application system login method, device, terminal and SSO service platform
CN103107996B (en) Digital certificate download online method and system, digital certificate are provided platform
US20160080157A1 (en) Network authentication method for secure electronic transactions
WO2016197934A1 (en) Barcode security authentication method
US9124571B1 (en) Network authentication method for secure user identity verification
US20200196143A1 (en) Public key-based service authentication method and system
CN110930147B (en) Offline payment method and device, electronic equipment and computer-readable storage medium
CN104468531A (en) Authorization method, device and system for sensitive data
US10158493B2 (en) Solution for generating and issuing security codes with guaranteed issuer authenticity and origin
US11455621B2 (en) Device-associated token identity
US20210241270A1 (en) System and method of blockchain transaction verification
CN104717224A (en) Login method and device
CN103368918A (en) Method, device and system for dynamic password authentication
CN109495458A (en) A kind of method, system and the associated component of data transmission
CN113505353A (en) Authentication method, device, equipment and storage medium
US20150350170A1 (en) Secure authentication of mobile users with no connectivity between authentication service and requesting entity
CN105141624A (en) Login method, account management server and client system
TWI490799B (en) Mobile communication device and two - dimensional bar code for financial certificate trading system and method
CN104753940A (en) Invoicing method, plain invoice self-service terminal and server
KR102313868B1 (en) Cross authentication method and system using one time password
KR102016976B1 (en) Unified login method and system based on single sign on service
EP2916509B1 (en) Network authentication method for secure user identity verification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20211008

Address after: 310051 Room 408, building 3, No. 399, Wangshang Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Netease Zhiqi Technology Co.,Ltd.

Address before: 310052 Building No. 599, Changhe Street Network Business Road, Binjiang District, Hangzhou City, Zhejiang Province, 4, 7 stories

Patentee before: NETEASE (HANGZHOU) NETWORK Co.,Ltd.

TR01 Transfer of patent right