CN105825120B - The method and system of interactive authentication between a kind of computer and mobile terminal - Google Patents
The method and system of interactive authentication between a kind of computer and mobile terminal Download PDFInfo
- Publication number
- CN105825120B CN105825120B CN201610140690.XA CN201610140690A CN105825120B CN 105825120 B CN105825120 B CN 105825120B CN 201610140690 A CN201610140690 A CN 201610140690A CN 105825120 B CN105825120 B CN 105825120B
- Authority
- CN
- China
- Prior art keywords
- computer
- mobile terminal
- server
- task
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
Abstract
The invention discloses a kind of method and system of interactive authentication between computer and mobile terminal, the method comprise the steps that computer, which generates an identity code and one, allows the task of mobile terminal login, and identity code and task are sent to server;Mobile scanning terminal and after reading identity code, connection server gets task of mobile terminal being allowed to log in;The message that mobile terminal has got task is sent to computer by server;Computer sends the response for allowing mobile terminal to log in server;Server sends the message for allowing its log into thr computer to mobile terminal after receiving response;Mobile terminal receives log into thr computer after message.Using the above scheme, reduce the security risk for carrying out multi-screen interactive between individual mobile terminal and common equipment or transmitting vital document between devices, improve the safety and efficiency of more equipment interconnections, the user experience is improved.
Description
Technical field
The present invention relates to interactive authentication fields, and in particular to a kind of method of interactive authentication between computer and mobile terminal
And system.
Background technique
The mobile terminals such as smart phone, tablet computer, PDA have independent operating system as PC, independent
Running space, can voluntarily be installed by user the third party service provider offer program, and can by mobile communication network come
Realize wireless network access.In recent years, mobile terminal oneself penetrated into we live in, user can use mobile terminal and see
News speculates in the stock market, sees that weather, object for appreciation game, application program downloading, the downloading of music picture, authentication are even completed to prop up online
Pay etc., many businessmans such as shop 4S, market, amusement arcade, library, bookstore, recreation ground, cinema, coffee-house etc., they are in order to inhale
Draw client, display screen can be set in shop, user can be interacted by connecting the free WiFi of its offer with display screen.
Multi-screen interactive is that a kind of technology quietly risen at present is led to IGRS protocol, Miracast agreement etc.
WiFi network connection is crossed, it is (such as common to be based on iOS, Android, Symbian different operating system in different multimedia terminal
On different intelligent terminal device, such as between smart phone, PAD, computer, television set, display screen), multimedia can be carried out
The sequence of operations such as the transmission, parsing, displaying, control of (audio, picture, video) content, can be same in different platform equipment
When it is shared show content, enrich the multimedia life of user.Briefly, multi-screen interactive is exactly the screen of several equipment, is passed through
Special connection equipment can interconnect conversion, for example the film on mobile phone can play on computers, tablet computer
On picture can share on a television set, the content of computer can project on television set.
Roller blind function is one of the critical function in multi-screen interactive, existing roller blind technology include DLNA, AirPlay,
Miracast and some privately owned roller blind agreements, roller blind function have in fields such as home entertaining, business offices and its widely answer
Use prospect.DLNA full name Digital Living Network Alliance, Sony, Intel, Microsoft, Google etc. initiate at
It is vertical, it is intended to solve interconnecting for smart machine, Digital Media document is allow arbitrarily to transmit between distinct device, is shared.
AirPlay is the wireless sharing agreement for having Apple Inc. to develop, and is set by what AirPlay technology can be convenient in different iOS
Document is wirelessly transferred between standby.Miracast is the wireless transmission protocol initiated by Wi-Fi Alliance, and Miracast user can
The photo that takes of smart phone is browsed on large-size screen monitors TV heartily, by conference room projectors Real-Time Sharing notebook screens,
Or the programme televised live of family ShowKey J2S is watched on tablet computer.
In addition, also having been produced in the prior art through two-dimensional bar code/two dimensional code (2-dimensional bar
Code the mode of roller blind function) is realized.User installs two dimensional code client on mobile terminals, when needing to carry out roller blind,
The two-dimension code image generated on computer shoots using mobile terminal and identifies the two-dimension code image, obtains two dimensional code and is stored
Content simultaneously triggers mobile terminal and logs on to computer.
Problems of the prior art are: one) usually not purview certification between the equipment due to carrying out multi-screen interactive
Therefore function carries out multi-screen interactive, or transmit between devices important between individual mobile terminal and common equipment
When file, it is easy to bring security risk;Two) existing purview certification function between the equipment of multi-screen interactive is carried out, user is needed
The authentication informations such as user name, password are manually entered, and need to manually locate the needing to operate of the task, it is cumbersome.
The present inventor proposes a kind of new computer and movement on the basis of studying existing interactive authentication mode
The method and system of interactive authentication between terminal efficiently can easily overcome defect of the existing technology.
Summary of the invention
In order to solve the above problem mentioned by background technique, the present invention provides to be handed between a kind of computer and mobile terminal
The method mutually authenticated, which is characterized in that the described method includes:
The computer generate an identity code and one allow mobile terminal to log in task, and by the identification
Code and the task are sent to server;
One mobile scanning terminal and after reading the identity code that the computer generates, connects the server,
And the task that the permission mobile terminal logs in is got from the server;
The message that the mobile terminal has got the task is sent to the computer by the server, and waits institute
Computer is stated to be confirmed whether that the mobile terminal is allowed to log in the computer;
The computer sends the response for allowing the mobile terminal to log in the server;
After the server receives the response, Xiang Suoshu mobile terminal, which is sent, allows it to log in disappearing for the computer
Breath;And
After the mobile terminal receives its message for logging in the computer of the permission of the server transmission, log in
The computer.
According to the method for interactive authentication between the computer and mobile terminal, wherein the identity code is at least
Including one or more of type: two dimensional code (2-dimensional bar code), one-dimensional bar code, color bar code,
Visual character string;Also, all or part of information for generating the identity code is encrypted, and/or to described
Identity code is encrypted.
According to the method for interactive authentication between the computer and mobile terminal, wherein know for generating the identity
The information of other code includes at least any combination of one or more of information: the user name of the computer, the computer
MAC Address, the IP address of the computer, the task ID, the description information of the task, current time stamp, the clothes
The business user name of device, the MAC Address of the server, the domain name of the server, the IP address of the server.
According to the method for interactive authentication between the computer and mobile terminal, wherein the computer is by the body
After part identification code and the task are sent to the server, server described in poll or keep long always with the server and connect
It connects, gets the task with equal standby communication terminals.
According to the method for interactive authentication between the computer and mobile terminal, wherein the mobile terminal is from described
While server gets the task that the permission mobile terminal logs in, the relevant information of the mobile terminal is sent to described
Server, for carrying out purview certification to the mobile terminal;The relevant information is believed including at least one or more of
Any combination of breath: device type, device name, International Mobile Station Equipment Identification (International Mobile
Equipment Identity, IMEI), phone number, owner's ID card No., owner's name, owner's age, owner address,
Owner's head portrait, owner E-mail address.
According to the method for interactive authentication between the computer and mobile terminal, wherein the server is sent to institute
It states comprising link in its message for logging in the computer of the permission of mobile terminal, the mobile terminal can pass through the chain
It connects and directly logs in the computer.
According to the method for interactive authentication between the computer and mobile terminal, wherein the mobile terminal logs in institute
After stating computer, further comprise:
The mobile terminal acquires image, and the image of acquisition is uploaded to the computer;
The computer increases the image to the coherent video in image database or the update image database.
To achieve the goals above, the present invention also provides a kind of system of interactive authentication between computer and mobile terminal,
It is characterized in that, the system comprises a computer, a mobile terminal and a servers, in which:
The computer allows the task of mobile terminal login for generating an identity code and one, by the identity
Identification code and the task are sent to the server, and have got described appoint receiving the mobile terminal that the server is sent
After the message of business, Xiang Suoshu server sends the response for allowing the mobile terminal to log in;
The mobile terminal, after scanning and reading the identity code that the computer generates, described in connection
Server gets the task that the permission mobile terminal logs in from the server, and in the institute for receiving the server transmission
It states after allowing its message for logging in the computer, logs in the computer;And
The server, the message for the mobile terminal have been got the task are sent to the computer, etc.
It is confirmed whether that the mobile terminal is allowed to log in the computer to the computer, and is receiving permitting for the computer transmission
Perhaps after the response that the described mobile terminal logs in, Xiang Suoshu mobile terminal, which is sent, allows its message for logging in the computer.
According to the system of interactive authentication between the computer and mobile terminal, wherein the identity code is at least
Including one or more of type: two dimensional code (2-dimensional bar code), one-dimensional bar code, color bar code,
Visual character string;Also, all or part of information for generating the identity code is encrypted, and/or to described
Identity code is encrypted.
According to the system of interactive authentication between the computer and mobile terminal, wherein know for generating the identity
The information of other code includes at least any combination of one or more of information: the user name of the computer, the computer
MAC Address, the IP address of the computer, the task ID, the description information of the task, current time stamp, the clothes
The business user name of device, the MAC Address of the server, the domain name of the server, the IP address of the server.
According to the system of interactive authentication between the computer and mobile terminal, wherein the computer is further used
In after the identity code and the task are sent to the server, always server described in poll or with the clothes
Being engaged in, device holding is long to be connected, and gets the task with equal standby communication terminals.
According to the system of interactive authentication between the computer and mobile terminal, wherein the mobile terminal is further
For while getting the task that the permission mobile terminal logs in from the server, the correlation of the mobile terminal to be believed
Breath is sent to the server, for carrying out purview certification to the mobile terminal;The relevant information includes at least following
Any combination of one or more information: device type, device name, International Mobile Station Equipment Identification (International
Mobile Equipment Identity, IMEI), phone number, owner's ID card No., owner's name, owner's age, machine
Main address, owner's head portrait, owner E-mail address.
According to the system of interactive authentication between the computer and mobile terminal, wherein the server is further used
In including link in its message for logging in the computer of the permission for being sent to the mobile terminal, so that the movement
Terminal can directly log in the computer by the link.
According to the system of interactive authentication between the computer and mobile terminal, in which:
The mobile terminal is further used for acquiring image after logging in the computer, and will be on the image of acquisition
Pass to the computer;
The computer is further used for increasing the image to image database or update in the image database
Coherent video.
The method of interactive authentication and it is for above-mentioned defect, between computer and mobile terminal proposed by the invention
System based on mobile scanning terminal and reads the function of identity code, and by third-party server, to the computer of interconnection with
The permission of mobile terminal interacts certification, compared with the prior art scheme, the best advantage is that, it is possible to reduce
The safety for carrying out multi-screen interactive between individual mobile terminal and common equipment or transmitting vital document between devices is hidden
Suffer from, improves the safety and efficiency of more equipment interconnections, promote user experience.
Detailed description of the invention
Fig. 1 is the method flow of interactive authentication between the computer and mobile terminal provided according to the preferred embodiment of the present invention
Figure;
Fig. 2 is the system architecture of interactive authentication between the computer and mobile terminal provided according to the preferred embodiment of the present invention
Figure.
Specific embodiment
Technical solution of the present invention and preferred embodiment hereafter are described with detailed reference to attached drawing, whereby to the present invention how
Applied technology method solves technical problem, and the realization process for reaching technical effect can fully understand and implement.In order to
The comprehensive understanding present invention, refers to many details, it will be understood by those skilled in the art that of the invention in the following detailed description
It may not need these details and realize.In other embodiments, it is not described in detail well known method, process, in order to avoid need not
Strategic point keeps embodiment fuzzy.
Referring to Fig. 1, the side of interactive authentication between the computer and mobile terminal that preferred embodiment according to the present invention provides
In method, the method specifically includes the following steps:
S100, computer, which generate an identity code and one, allows the task of mobile terminal login, and the identity is known
Other code and the task are sent to server.
In the present invention, computer refer to PC, network computer, supercomputer, embedded computer etc. by
Various computing devices composed by hardware system and software systems, it might even be possible to cover the television set with computer function, show
Display screen etc.;Mobile terminal refers to the computer equipment that can be used on the move, and broad sense is said including smart phone, PDA, plate
Computer, notebook, POS machine include even vehicle-mounted computer.It is settable for accessing network in the computer and mobile terminal
The browser of information or other network information processing softwares.
Specifically, the information that the computer is used to generate the identity code is believed including at least one or more of
Any combination of breath: the user name of the computer, the MAC Address of the computer, the IP address of the computer, described
Be engaged in ID, the description information of the task, current time stamp, the user name of the server, the MAC Address of the server, institute
State the domain name of server, the IP address of the server.The identity code can be the various types comprising identity information
Recognizable coding, common are two-dimensional bar code/two dimensional code (2-dimensional bar code), one-dimensional bar code, colour
One or more types such as bar code, visual character string;Also, believe for generating all or part of of the identity code
Breath is encrypted, and/or is encrypted to the identity code.
Two-dimensional bar code/two dimensional code is with certain specific geometric figure according to certain rules in the chequered with black and white of plane distribution
Graphic recording data symbol information;" 0 ", " 1 " for constituting computer-internal logical foundations are dexterously utilized in code compilation
The concept of bit stream indicates text numerical information using several geometrical bodies corresponding with binary system, defeated by image
Enter equipment or photoelectric scanning device automatically identifying and reading to realize automatic processing of information: its some general character with barcode technology: every kind
Code system has its specific character set;Each character occupies certain width;With certain verifying function etc..Simultaneously also have pair
The information automatic identification function and the processing rotationally-varying point of figure that do not go together.
Two dimensional code, which is applied, can be divided into according to business form difference by reading class and main reading class two major classes.By the common application of reading class
Mode is after business information encryption, being compiled into image in 2 D code using side, to be sent out two dimensional code by way of short message or multimedia message
Send to the mobile terminal of user, user using when by being located at the dedicated recognizing apparatus of service network to two on mobile terminal
Dimension code image carries out recognition certification, supports various applications as the voucher of transaction or identification.The common application of main reading class
Mode is that user installs two dimensional code client on mobile phone, and the packet of the printed thereons such as media, newspaper is shot and identified using mobile phone
Two-dimension code image containing specific information, obtain two dimensional code institute's storage content and trigger surfing Internet with cell phone, business card is distinguished, is made a phone call
It is a variety of operation associated.
The label that bar code is made of one group of regularly arranged item, sky and corresponding character, " item " refer to light
The lower part of reflectivity, " sky " refer to the higher part of light reflectance, data representations of these and empty composition are certain
Information, and can be distinguished with specific equipment, it is converted into the binary system and decimal system information compatible with computer.Generally for every
A kind of article, its coding are uniquely, for common bar code, also to pass through Database bar code and commodity
The corresponding relationship of information operates data by the application program on computer when the data of bar code pass on computer
And processing.
Colour barcode is read miscellaneous mainly in conjunction with the mobile phone or PC that have video camera lens using camera lens
Color bar code on will, newspaper, television set or computer screen, and it is transmitted to data center.Data center can be in response to the face received
Vitta code is preferential to provide website data or consumption.The colour barcode place more winning than two-dimensional bar code, it is lower to be that it can use
Resolution ratio higher data capacity is provided.On the one hand, color bar code is interpreted woth no need to the camera lens of high-resolution, makes ditch
It is logical from unidirectionally becoming on both side, two lower resolution ratio are also enabled using the company of bar code in bar code plus changing, with raising
The interest that reader participates in.
S110, a mobile scanning terminal and after reading the identity code that the computer generates, connect the clothes
Business device, and the task that the permission mobile terminal logs in is got from the server.
After the identity code and the task are sent to the server by the computer, taken described in poll always
Business device, polling mode are divided into two kinds, and a kind of comparison is conventional, and the computer timing, which sends Ajax to the server, asks
It asks, the server horse back returning response information and closes connection after being connected to request;Another kind is long poll, the computer to
The server sends Ajax request, and hold lives to connect after the server is connected to request, until there is new information ability returning response
Information simultaneously closes connection, sends new request to the server again after the complete response message of computer disposal.Alternatively, described
Computer and the server keep long connection, a Ge Yin KURA iframe are embedded in the page, by the src of this Yin KURA iframe
As soon as attribute is set as requesting to the request of long connection or using xhr, the server can continuously be toward the calculating
Machine input data.
In the present invention, for mobile terminal it is preferable to use main reading class two-dimensional code, user installs two dimensional code knowledge on mobile terminals
Other client.When there is user to want to log in the computer by mobile terminal, using the mobile scanning terminal and institute is read
The two dimensional code of computer generation is stated, with obtaining the user name for the computer that two dimensional code is stored, the MAC of the computer
Location, the IP address of the computer, the task ID, the description information of the task, the user name of the server, the clothes
The information such as the business MAC Address of device, the domain name of the server, the IP address of the server, and trigger the mobile terminal root
The server is connected automatically according to the domain name of the server or the IP address of the server, and according to the task ID, institute
It states description information of task etc. and gets the task that the permission mobile terminal logs in from the server.
Further, when the mobile terminal gets the same of the task of mobile terminal being allowed to log in from the server
When, the relevant information of the mobile terminal is sent to the server, to be used for the server or the computer to institute
It states mobile terminal and carries out purview certification.The relevant information includes at least any combination of one or more of information: equipment
Type, device name, International Mobile Station Equipment Identification (International Mobile Equipment Identity, IMEI),
Phone number, owner's ID card No., owner's name, owner's age, owner address, owner's head portrait, owner E-mail address.
The message that the mobile terminal has got the task is sent to the computer by S120, server, and is waited
The computer is confirmed whether that the mobile terminal is allowed to log in the computer.
S130, computer send the response for allowing the mobile terminal to log in the server.
Preferably, disappearing for the task has been got when the computer receives the mobile terminal that the server is sent
When breath, a dialog box is popped up on the screen of the computer, including prompt information and select button, the prompt letter
Whether whether breath can be " mobile terminal that ID is * * * is allowed to log in ", " phone number be allowed to be that the mobile terminal of * * * is stepped on
Whether record ", " mobile terminal of user * * * is allowed to log in " etc., the select button include at least " permission ", " not allowing " two
Selection.When user selects " permission ", the computer sends the response for allowing the mobile terminal to log in the server;
And when user selects " not allowing ", the computer sends the sound for not allowing the mobile terminal to log in the server
It answers, terminates follow-up process.
After S140, server receive the response, Xiang Suoshu mobile terminal, which is sent, allows it to log in disappearing for the computer
Breath.
After S150, mobile terminal receive its message for logging in the computer of the permission of the server transmission, step on
Record the computer.
In the present invention, log into thr computer refers to establish with computer and communicate to connect, however it is not limited to the behaviour of log into thr computer
Make system, further includes logging in or connecting any other system or the application program etc. that run in computer.Preferably, described
Server is sent in its message for logging in the computer of the permission of the mobile terminal comprising link, when the movement
After terminal receives described its message for logging in the computer of permission, show on the screen, if user clicks the link,
The mobile terminal can directly log in the computer by the link.It, can after the mobile terminal logs in the computer
To execute subsequent operation.For example, the mobile terminal acquires image, and the image of acquisition is uploaded into the computer;
The computer increases the image and perhaps updates coherent video in the image database to image database or by institute
It states image and is uploaded to server.
Referring to fig. 2, the system of interactive authentication between the computer and mobile terminal that preferred embodiment provides according to the present invention
Including a computer 201, a mobile terminal 202 and a server 203, the computer 201, the mobile terminal 202 and institute
It states and passes through network connection between server 203.It should be noted that, although showing the computer 201 and the service in figure
Device 203 connects network by wired mode, and the mobile terminal 202 wirelessly connects network, but this is network rack
Structure schematic diagram can select internetwork connection mode according to actual needs in practical applications.In addition, for the computer 201,
The mobile terminal 202 and the server 203 also only schematically draw one in figure, practical application can be with
For any amount.
In the present invention, computer 201 refers to PC, network computer, supercomputer, embedded computer etc.
The various computing devices as composed by hardware system and software systems, it might even be possible to cover television set with computer function,
Display screen etc.;Mobile terminal 202 refers to the computer equipment that can be used on the move, broad sense say including smart phone,
PDA, tablet computer, notebook, POS machine include even vehicle-mounted computer.It can be set in the computer 201 and mobile terminal 202
Set the browser or other network information processing softwares for accessing the network information.
The computer 201 allows the task of the login of mobile terminal 202 for generating an identity code and one, by institute
It states identity code and the task is sent to the server 203, and in the mobile terminal for receiving the transmission of server 203
After 202 have got the message of the task, Xiang Suoshu server 203 sends the response for allowing the mobile terminal 202 to log in.
Specifically, any group for including at least one or more of information for generating the information of the identity code
Close: the user name of the computer 201, the computer 201 MAC Address, the IP address of the computer 201, the industry
Be engaged in ID, the type of service, the business description, the user name of operation system, the User ID of operation system, the use of operation system
Family institution where he works title, operation system user's institutional affiliation ID, the authority information of operation system, current time stamp, work as predecessor
It is engaged in effective time, check information, the user name of the server 203, the MAC Address of the server 203, the server
The IP address of 203 domain name, the server 203.The identity code can be to include the various types of of identity information
It can recognize coding, common are two-dimensional bar code/two dimensional code (2-dimensional bar code), one-dimensional bar code, color-bar
One or more types such as shape code, visual character string;Also, to all or part of information for generating the identity code
It is encrypted, and/or the identity code is encrypted.
Two-dimensional bar code/two dimensional code is with certain specific geometric figure according to certain rules in the chequered with black and white of plane distribution
Graphic recording data symbol information;" 0 ", " 1 " for constituting computer-internal logical foundations are dexterously utilized in code compilation
The concept of bit stream indicates text numerical information using several geometrical bodies corresponding with binary system, defeated by image
Enter equipment or photoelectric scanning device automatically identifying and reading to realize automatic processing of information: its some general character with barcode technology: every kind
Code system has its specific character set;Each character occupies certain width;With certain verifying function etc..Simultaneously also have pair
The information automatic identification function and the processing rotationally-varying point of figure that do not go together.
Two dimensional code, which is applied, can be divided into according to business form difference by reading class and main reading class two major classes.By the common application of reading class
Mode is after business information encryption, being compiled into image in 2 D code using side, to be sent out two dimensional code by way of short message or multimedia message
Send to the mobile terminal of user, user using when by being located at the dedicated recognizing apparatus of service network to two on mobile terminal
Dimension code image carries out recognition certification, supports various applications as the voucher of transaction or identification.The common application of main reading class
Mode is that user installs two dimensional code client on mobile phone, and the packet of the printed thereons such as media, newspaper is shot and identified using mobile phone
Two-dimension code image containing specific information, obtain two dimensional code institute's storage content and trigger surfing Internet with cell phone, business card is distinguished, is made a phone call
It is a variety of operation associated.
The label that bar code is made of one group of regularly arranged item, sky and corresponding character, " item " refer to light
The lower part of reflectivity, " sky " refer to the higher part of light reflectance, data representations of these and empty composition are certain
Information, and can be distinguished with specific equipment, it is converted into the binary system and decimal system information compatible with computer.Generally for every
A kind of article, its coding are uniquely, for common bar code, also to pass through Database bar code and commodity
The corresponding relationship of information operates data by the application program on computer when the data of bar code pass on computer
And processing.
Colour barcode is read miscellaneous mainly in conjunction with the mobile phone or PC that have video camera lens using camera lens
Color bar code on will, newspaper, television set or computer screen, and it is transmitted to data center.Data center can be in response to the face received
Vitta code is preferential to provide website data or consumption.The colour barcode place more winning than two-dimensional bar code, it is lower to be that it can use
Resolution ratio higher data capacity is provided.On the one hand, color bar code is interpreted woth no need to the camera lens of high-resolution, makes ditch
It is logical from unidirectionally becoming on both side, two lower resolution ratio are also enabled using the company of bar code in bar code plus changing, with raising
The interest that reader participates in.
Further, the computer 201 is also used to the identity code and the task being sent to the service
After device 203, server 203 described in poll, polling mode are divided into two kinds always, and a kind of comparison is conventional, the computer 201
Timing sends Ajax request to the server 203, and the server 203 horse back returning response information and is closed after being connected to request
Connection;Another kind is long poll, and the computer 201 sends Ajax request to the server 203, and the server 203 connects
Hold lives to connect after to request, and until having new information ability returning response information and closing connection, the computer 201 has handled sound
New request is sent to the server 203 again after answering information.Alternatively, the computer 201 keeps growing with the server 203
Connection, a Ge Yin KURA iframe is embedded in the page, the src attribute of this Yin KURA iframe is set as asking a long connection
It asks or is requested using xhr, the server 203 just can continuously be toward 201 input data of computer.
Preferably, the computer 201 is also used to when the mobile terminal 202 for receiving the transmission of server 203
When having got the message of the task, a dialog box is popped up on its screen, including prompt information and select button, institute
Whether whether state prompt information can be " mobile terminal that ID is * * * is allowed to log in ", " phone number be allowed to be the movement of * * *
Whether terminal login ", " mobile terminal of user * * * is allowed to log in " etc., the select button include at least " permission ", " do not permit
Perhaps two selections ".When user selects " permission ", the computer 201 is also used to send described in permission to the server 203
The response that mobile terminal 202 logs in;And when user selects " not allowing ", the computer 201 is also used to the server
203 send the response for not allowing the mobile terminal 202 to log in, and terminate follow-up process.
The mobile terminal 202, after scanning and reading the identity code that the computer 201 generates, even
The server 203 is connect, gets the task that the permission mobile terminal 202 logs in from the server 203, and described receiving
After its message for logging in the computer 201 of the permission of the transmission of server 203, the computer 201 is logged in.
In the present invention, log into thr computer 201 refers to establish with computer 201 and communicate to connect, however it is not limited to log in and calculate
The operating system of machine 201 further includes logging in or connecting any other system or the application program that run in computer 201
Deng.In addition, mobile terminal 202, it is preferable to use main reading class two-dimensional code, user installs two dimensional code identification client on mobile terminal 202
End.When there is user to want to log in the computer 201 by mobile terminal 202, scans and read using the mobile terminal 202
The two dimensional code that the computer 201 generates, the user name for the computer 201 that acquisition two dimensional code is stored, the computer
201 MAC Address, the IP address of the computer 201, the task ID, the description information of the task, the server
203 user name, the MAC Address of the server 203, the domain name of the server 203, the IP address of the server 203
Etc. information, and trigger the mobile terminal 202 according to the domain name of the server 203 or the IP address of the server 203 from
The dynamic connection server 203, and got according to the task ID, description information of the task etc. from the server 203
The task of mobile terminal 202 being allowed to log in.
Further, the mobile terminal 202, which is used to work as from the server 203, gets the permission mobile terminal 202
While the task of login, the relevant information of the mobile terminal 202 is sent to the server 203, to be used for the clothes
Business device 203 or the computer 201 carry out purview certification to the mobile terminal 202.The relevant information includes at least following
Any combination of one or more information: device type, device name, International Mobile Station Equipment Identification (International
Mobile Equipment Identity, IMEI), phone number, IP address, MAC Address, owner's ID card No., owner's surname
Name, owner's age, owner address, owner's head portrait, owner E-mail address.
The server 203, the message for the mobile terminal 202 have been got the task are sent to the calculating
Machine 201 waits the computer 201 to be confirmed whether that the mobile terminal 202 is allowed to log in the computer 201, and is receiving
After the response that the permission mobile terminal 202 that the computer 201 is sent logs in, Xiang Suoshu mobile terminal 202, which is sent, to be allowed
Its message for logging in the computer 201.
Preferably, the server 203 be also used to the permission for being sent to the mobile terminal 202 its login described in
Comprising link in the message of computer 201, the mobile terminal 202, which is also used to work as, receives its described computer of login of the permission
It after 201 message, shows on the screen, and the computer is directly logged in by the link when user clicks the link
201.After the mobile terminal 202 logs in the computer 201, the mobile terminal 202 is further used for acquiring image, and
The image of acquisition is uploaded into the computer 201;The computer 201 is further used for increasing the image to image
Database perhaps updates the coherent video in the image database or the image is uploaded to server 203.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to restrict the invention, all in spirit of that invention and original
Any modifications, equivalent replacements, and improvements etc. done within then, is both contained within protection scope of the present invention.
Claims (10)
1. a kind of method of interactive authentication between computer and mobile terminal, which is characterized in that the described method includes:
The computer generate an identity code and one allow mobile terminal to log in task, and by the identity code and
The task is sent to server;
After the identity code and the task are sent to the server by the computer, server described in poll always
Or long connection is kept with the server, to wait standby communication terminals to get the task;
One mobile scanning terminal and after reading the identity code that the computer generates, connects the server, and from
The server gets the task that the permission mobile terminal logs in, meanwhile, the relevant information of the mobile terminal is sent to
The server, for carrying out purview certification to the mobile terminal;
The message that the mobile terminal has got the task is sent to the computer by the server, and waits the meter
Calculation machine is confirmed whether that the mobile terminal is allowed to log in the computer;
The computer sends the response for allowing the mobile terminal to log in the server;
After the server receives the response, Xiang Suoshu mobile terminal, which is sent, allows its message for logging in the computer;With
And
After the mobile terminal receives its message for logging in the computer of the permission of the server transmission, described in login
Computer.
2. the method for interactive authentication between computer according to claim 1 and mobile terminal, which is characterized in that the body
Part identification code includes at least one or more of type: two dimensional code, one-dimensional bar code, color bar code, visual character string;And
And all or part of information for generating the identity code is encrypted, and/or the identity code is carried out
Encryption.
3. the method for interactive authentication between computer according to claim 1 or 2 and mobile terminal, which is characterized in that use
Any combination of one or more of information: the use of the computer is included at least in the information for generating the identity code
Name in an account book, the MAC Address of the computer, the IP address of the computer, the IP address of the server, traffic ID, service class
Type, user name, User ID, user institution where he works title, user's institutional affiliation ID, authority information, timestamp, is appointed at business description
It is engaged in effective time, check information.
4. the method for interactive authentication between computer according to claim 3 and mobile terminal, which is characterized in that the phase
Close any combination that information includes at least one or more of information: device type, device name, international mobile device mark
Knowledge, phone number, IP address, MAC Address, owner's ID card No., owner's name, owner's age, owner address, Ji Zhutou
Picture, owner E-mail address.
5. the method for interactive authentication between computer according to claim 4 and mobile terminal, which is characterized in that the shifting
After dynamic terminal logs in the computer, further comprise:
The mobile terminal acquires image, and the image of acquisition is uploaded to the computer;
The computer increases the image to the coherent video in image database or the update image database.
6. the system of interactive authentication between a kind of computer and mobile terminal, which is characterized in that the system comprises a computer,
One mobile terminal and a server, in which:
The computer allows the task of mobile terminal login for generating an identity code and one, by the identification
Code and the task are sent to the server, and the computer is further used for by the identity code and the task
After being sent to the server, server described in poll or long connection is kept with the server always, with equal standby communication terminals
The task is got, and after receiving the mobile terminal that the server is sent and having got the message of the task, to the clothes
Business device sends the response for allowing the mobile terminal to log in;
The mobile terminal connects the service after scanning and reading the identity code that the computer generates
Device gets the task that the permission mobile terminal logs in from the server, meanwhile, the relevant information of the mobile terminal is sent out
The server is given, for carrying out purview certification to the mobile terminal;And it is receiving described in the server transmission
After allowing it to log in the message of the computer, the computer is logged in;And
The server, the message for the mobile terminal have been got the task are sent to the computer, wait institute
It states computer to be confirmed whether that the mobile terminal is allowed to log in the computer, and in the permission institute for receiving the computer transmission
After the response for stating mobile terminal login, Xiang Suoshu mobile terminal, which is sent, allows its message for logging in the computer.
7. the system of interactive authentication between computer according to claim 6 and mobile terminal, which is characterized in that the body
Part identification code includes at least one or more of type: two dimensional code, one-dimensional bar code, color bar code, visual character string;And
And all or part of information for generating the identity code is encrypted, and/or the identity code is carried out
Encryption.
8. the system of interactive authentication between computer according to claim 6 or 7 and mobile terminal, which is characterized in that use
Any combination of one or more of information: the use of the computer is included at least in the information for generating the identity code
Name in an account book, the MAC Address of the computer, the IP address of the computer, the task ID, the description information of the task, when
Preceding timestamp, the user name of the server, the MAC Address of the server, the domain name of the server, the server
IP address.
9. the system of interactive authentication between computer according to claim 8 and mobile terminal, which is characterized in that the phase
Close any combination that information includes at least one or more of information: device type, device name, international mobile device mark
Knowledge, phone number, IP address, MAC Address, owner's ID card No., owner's name, owner's age, owner address, Ji Zhutou
Picture, owner E-mail address.
10. the system of interactive authentication between computer according to claim 9 and mobile terminal, which is characterized in that wherein:
The mobile terminal is further used for acquiring image after logging in the computer, and the image of acquisition is uploaded to
The computer;
The computer is further used for increasing the image to the phase in image database or the update image database
Close image.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610140690.XA CN105825120B (en) | 2016-03-11 | 2016-03-11 | The method and system of interactive authentication between a kind of computer and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610140690.XA CN105825120B (en) | 2016-03-11 | 2016-03-11 | The method and system of interactive authentication between a kind of computer and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105825120A CN105825120A (en) | 2016-08-03 |
CN105825120B true CN105825120B (en) | 2019-09-10 |
Family
ID=56987785
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610140690.XA Active CN105825120B (en) | 2016-03-11 | 2016-03-11 | The method and system of interactive authentication between a kind of computer and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105825120B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107895436A (en) * | 2017-11-08 | 2018-04-10 | 东莞市康茂电子有限公司 | One kind is shared with screen device management system and its control method |
CN109032546B (en) * | 2018-06-12 | 2021-09-07 | 广州视源电子科技股份有限公司 | Multi-screen interaction system and method |
CN111836105B (en) * | 2019-04-16 | 2023-04-28 | 中科网联数据科技有限公司 | Television user identity recognition method and television terminal |
CN110519551B (en) * | 2019-09-19 | 2020-11-17 | 上海赛连信息科技有限公司 | Method and device for personalized setting of video conference terminal |
CN111368173A (en) * | 2020-03-05 | 2020-07-03 | 五八有限公司 | File transmission method and device, electronic equipment and readable storage medium |
CN112887299B (en) * | 2021-01-22 | 2022-07-08 | 平安普惠企业管理有限公司 | Online interaction method and device, electronic equipment and storage medium |
CN113111319B (en) * | 2021-04-07 | 2021-10-08 | 珠海市鸿瑞信息技术股份有限公司 | Identity authentication system and method based on industrial control system |
CN114095789A (en) * | 2021-11-17 | 2022-02-25 | 唐文兵 | Tracing and recognizing protection method for identity of detection camera |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1758417A1 (en) * | 2004-10-27 | 2007-02-28 | Huawei Technologies Co., Ltd. | Authentication method |
CN103475636A (en) * | 2013-06-13 | 2013-12-25 | 深圳创维-Rgb电子有限公司 | Electronic account login method, intelligent terminal and mobile terminal |
CN103763327A (en) * | 2014-01-28 | 2014-04-30 | 宇龙计算机通信科技(深圳)有限公司 | Account number logging-in method and system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102802071B (en) * | 2012-08-24 | 2014-10-29 | 上海广电电子科技有限公司 | Intelligent television, mobile terminal, multi-screen interaction system and wireless communication method |
CN102868696B (en) * | 2012-09-18 | 2015-10-07 | 广州市动景计算机科技有限公司 | The communication of many equipment rooms and information synchronization method and system |
CN104410899B (en) * | 2014-11-14 | 2017-09-12 | 康佳集团股份有限公司 | Multi-screen interactive processing method, system and TV set device based on television set |
-
2016
- 2016-03-11 CN CN201610140690.XA patent/CN105825120B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1758417A1 (en) * | 2004-10-27 | 2007-02-28 | Huawei Technologies Co., Ltd. | Authentication method |
CN103475636A (en) * | 2013-06-13 | 2013-12-25 | 深圳创维-Rgb电子有限公司 | Electronic account login method, intelligent terminal and mobile terminal |
CN103763327A (en) * | 2014-01-28 | 2014-04-30 | 宇龙计算机通信科技(深圳)有限公司 | Account number logging-in method and system |
Also Published As
Publication number | Publication date |
---|---|
CN105825120A (en) | 2016-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105825120B (en) | The method and system of interactive authentication between a kind of computer and mobile terminal | |
US10976923B2 (en) | Enhanced virtual keyboard | |
CN104704485B (en) | A method of the content of the first browser is checked in the second position | |
CN105122288B (en) | Apparatus and method for processing multimedia business service | |
JP6837066B2 (en) | Information processing method and server, computer storage medium | |
CN103152404B (en) | The multiple enterprises multi-user of the service-oriented information switching that swipes represents and exchange method | |
US9904469B2 (en) | Keyboard stream logging | |
KR20120090388A (en) | Method and apparatus for managing user device and contents using qr code | |
JP5530557B1 (en) | Server, program and method for distributing content | |
CN104838386A (en) | User authentication and authorization using personas | |
EP3414650B1 (en) | Social keyboard | |
CN110166457A (en) | A kind of advertisement machine information issuing method and its device | |
US10241976B2 (en) | Techniques for peer-to-peer communication | |
CN113259140B (en) | Cloud conference box rapid conference entering method and system | |
KR20130131543A (en) | House lease system and method using qr code | |
US8966595B1 (en) | Techniques for peer-to-peer communication using a “shared secret” | |
CN104539688B (en) | A kind of retail shop's management system based on mPortal systems | |
KR20120137629A (en) | System for providing shorten url browsing with branding , method thereof, and web client thereof | |
CN105592084A (en) | Multi-enterprise multi-user shake switching presentation and interaction method oriented to service information | |
CN111885139B (en) | Content sharing method, device and system, mobile terminal and server | |
CN103841153A (en) | Information publishing system, device and method based on wireless local area network | |
KR101170322B1 (en) | Method and device for providing cloud computing service using personal computer based on web | |
CN109286931B (en) | Wireless local area network access method and device | |
CN106331305A (en) | Method and system for customizing shake function of WeChat | |
CN108616611A (en) | A kind of generation method and device of dynamic scape business card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |