CN105825120B - The method and system of interactive authentication between a kind of computer and mobile terminal - Google Patents

The method and system of interactive authentication between a kind of computer and mobile terminal Download PDF

Info

Publication number
CN105825120B
CN105825120B CN201610140690.XA CN201610140690A CN105825120B CN 105825120 B CN105825120 B CN 105825120B CN 201610140690 A CN201610140690 A CN 201610140690A CN 105825120 B CN105825120 B CN 105825120B
Authority
CN
China
Prior art keywords
computer
mobile terminal
server
task
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610140690.XA
Other languages
Chinese (zh)
Other versions
CN105825120A (en
Inventor
黄雅
王录祥
李恒召
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING TCHZT INFORMATION TECHNOLOGY Co Ltd
Original Assignee
BEIJING TCHZT INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING TCHZT INFORMATION TECHNOLOGY Co Ltd filed Critical BEIJING TCHZT INFORMATION TECHNOLOGY Co Ltd
Priority to CN201610140690.XA priority Critical patent/CN105825120B/en
Publication of CN105825120A publication Critical patent/CN105825120A/en
Application granted granted Critical
Publication of CN105825120B publication Critical patent/CN105825120B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Abstract

The invention discloses a kind of method and system of interactive authentication between computer and mobile terminal, the method comprise the steps that computer, which generates an identity code and one, allows the task of mobile terminal login, and identity code and task are sent to server;Mobile scanning terminal and after reading identity code, connection server gets task of mobile terminal being allowed to log in;The message that mobile terminal has got task is sent to computer by server;Computer sends the response for allowing mobile terminal to log in server;Server sends the message for allowing its log into thr computer to mobile terminal after receiving response;Mobile terminal receives log into thr computer after message.Using the above scheme, reduce the security risk for carrying out multi-screen interactive between individual mobile terminal and common equipment or transmitting vital document between devices, improve the safety and efficiency of more equipment interconnections, the user experience is improved.

Description

The method and system of interactive authentication between a kind of computer and mobile terminal
Technical field
The present invention relates to interactive authentication fields, and in particular to a kind of method of interactive authentication between computer and mobile terminal And system.
Background technique
The mobile terminals such as smart phone, tablet computer, PDA have independent operating system as PC, independent Running space, can voluntarily be installed by user the third party service provider offer program, and can by mobile communication network come Realize wireless network access.In recent years, mobile terminal oneself penetrated into we live in, user can use mobile terminal and see News speculates in the stock market, sees that weather, object for appreciation game, application program downloading, the downloading of music picture, authentication are even completed to prop up online Pay etc., many businessmans such as shop 4S, market, amusement arcade, library, bookstore, recreation ground, cinema, coffee-house etc., they are in order to inhale Draw client, display screen can be set in shop, user can be interacted by connecting the free WiFi of its offer with display screen.
Multi-screen interactive is that a kind of technology quietly risen at present is led to IGRS protocol, Miracast agreement etc. WiFi network connection is crossed, it is (such as common to be based on iOS, Android, Symbian different operating system in different multimedia terminal On different intelligent terminal device, such as between smart phone, PAD, computer, television set, display screen), multimedia can be carried out The sequence of operations such as the transmission, parsing, displaying, control of (audio, picture, video) content, can be same in different platform equipment When it is shared show content, enrich the multimedia life of user.Briefly, multi-screen interactive is exactly the screen of several equipment, is passed through Special connection equipment can interconnect conversion, for example the film on mobile phone can play on computers, tablet computer On picture can share on a television set, the content of computer can project on television set.
Roller blind function is one of the critical function in multi-screen interactive, existing roller blind technology include DLNA, AirPlay, Miracast and some privately owned roller blind agreements, roller blind function have in fields such as home entertaining, business offices and its widely answer Use prospect.DLNA full name Digital Living Network Alliance, Sony, Intel, Microsoft, Google etc. initiate at It is vertical, it is intended to solve interconnecting for smart machine, Digital Media document is allow arbitrarily to transmit between distinct device, is shared. AirPlay is the wireless sharing agreement for having Apple Inc. to develop, and is set by what AirPlay technology can be convenient in different iOS Document is wirelessly transferred between standby.Miracast is the wireless transmission protocol initiated by Wi-Fi Alliance, and Miracast user can The photo that takes of smart phone is browsed on large-size screen monitors TV heartily, by conference room projectors Real-Time Sharing notebook screens, Or the programme televised live of family ShowKey J2S is watched on tablet computer.
In addition, also having been produced in the prior art through two-dimensional bar code/two dimensional code (2-dimensional bar Code the mode of roller blind function) is realized.User installs two dimensional code client on mobile terminals, when needing to carry out roller blind, The two-dimension code image generated on computer shoots using mobile terminal and identifies the two-dimension code image, obtains two dimensional code and is stored Content simultaneously triggers mobile terminal and logs on to computer.
Problems of the prior art are: one) usually not purview certification between the equipment due to carrying out multi-screen interactive Therefore function carries out multi-screen interactive, or transmit between devices important between individual mobile terminal and common equipment When file, it is easy to bring security risk;Two) existing purview certification function between the equipment of multi-screen interactive is carried out, user is needed The authentication informations such as user name, password are manually entered, and need to manually locate the needing to operate of the task, it is cumbersome.
The present inventor proposes a kind of new computer and movement on the basis of studying existing interactive authentication mode The method and system of interactive authentication between terminal efficiently can easily overcome defect of the existing technology.
Summary of the invention
In order to solve the above problem mentioned by background technique, the present invention provides to be handed between a kind of computer and mobile terminal The method mutually authenticated, which is characterized in that the described method includes:
The computer generate an identity code and one allow mobile terminal to log in task, and by the identification Code and the task are sent to server;
One mobile scanning terminal and after reading the identity code that the computer generates, connects the server, And the task that the permission mobile terminal logs in is got from the server;
The message that the mobile terminal has got the task is sent to the computer by the server, and waits institute Computer is stated to be confirmed whether that the mobile terminal is allowed to log in the computer;
The computer sends the response for allowing the mobile terminal to log in the server;
After the server receives the response, Xiang Suoshu mobile terminal, which is sent, allows it to log in disappearing for the computer Breath;And
After the mobile terminal receives its message for logging in the computer of the permission of the server transmission, log in The computer.
According to the method for interactive authentication between the computer and mobile terminal, wherein the identity code is at least Including one or more of type: two dimensional code (2-dimensional bar code), one-dimensional bar code, color bar code, Visual character string;Also, all or part of information for generating the identity code is encrypted, and/or to described Identity code is encrypted.
According to the method for interactive authentication between the computer and mobile terminal, wherein know for generating the identity The information of other code includes at least any combination of one or more of information: the user name of the computer, the computer MAC Address, the IP address of the computer, the task ID, the description information of the task, current time stamp, the clothes The business user name of device, the MAC Address of the server, the domain name of the server, the IP address of the server.
According to the method for interactive authentication between the computer and mobile terminal, wherein the computer is by the body After part identification code and the task are sent to the server, server described in poll or keep long always with the server and connect It connects, gets the task with equal standby communication terminals.
According to the method for interactive authentication between the computer and mobile terminal, wherein the mobile terminal is from described While server gets the task that the permission mobile terminal logs in, the relevant information of the mobile terminal is sent to described Server, for carrying out purview certification to the mobile terminal;The relevant information is believed including at least one or more of Any combination of breath: device type, device name, International Mobile Station Equipment Identification (International Mobile Equipment Identity, IMEI), phone number, owner's ID card No., owner's name, owner's age, owner address, Owner's head portrait, owner E-mail address.
According to the method for interactive authentication between the computer and mobile terminal, wherein the server is sent to institute It states comprising link in its message for logging in the computer of the permission of mobile terminal, the mobile terminal can pass through the chain It connects and directly logs in the computer.
According to the method for interactive authentication between the computer and mobile terminal, wherein the mobile terminal logs in institute After stating computer, further comprise:
The mobile terminal acquires image, and the image of acquisition is uploaded to the computer;
The computer increases the image to the coherent video in image database or the update image database.
To achieve the goals above, the present invention also provides a kind of system of interactive authentication between computer and mobile terminal, It is characterized in that, the system comprises a computer, a mobile terminal and a servers, in which:
The computer allows the task of mobile terminal login for generating an identity code and one, by the identity Identification code and the task are sent to the server, and have got described appoint receiving the mobile terminal that the server is sent After the message of business, Xiang Suoshu server sends the response for allowing the mobile terminal to log in;
The mobile terminal, after scanning and reading the identity code that the computer generates, described in connection Server gets the task that the permission mobile terminal logs in from the server, and in the institute for receiving the server transmission It states after allowing its message for logging in the computer, logs in the computer;And
The server, the message for the mobile terminal have been got the task are sent to the computer, etc. It is confirmed whether that the mobile terminal is allowed to log in the computer to the computer, and is receiving permitting for the computer transmission Perhaps after the response that the described mobile terminal logs in, Xiang Suoshu mobile terminal, which is sent, allows its message for logging in the computer.
According to the system of interactive authentication between the computer and mobile terminal, wherein the identity code is at least Including one or more of type: two dimensional code (2-dimensional bar code), one-dimensional bar code, color bar code, Visual character string;Also, all or part of information for generating the identity code is encrypted, and/or to described Identity code is encrypted.
According to the system of interactive authentication between the computer and mobile terminal, wherein know for generating the identity The information of other code includes at least any combination of one or more of information: the user name of the computer, the computer MAC Address, the IP address of the computer, the task ID, the description information of the task, current time stamp, the clothes The business user name of device, the MAC Address of the server, the domain name of the server, the IP address of the server.
According to the system of interactive authentication between the computer and mobile terminal, wherein the computer is further used In after the identity code and the task are sent to the server, always server described in poll or with the clothes Being engaged in, device holding is long to be connected, and gets the task with equal standby communication terminals.
According to the system of interactive authentication between the computer and mobile terminal, wherein the mobile terminal is further For while getting the task that the permission mobile terminal logs in from the server, the correlation of the mobile terminal to be believed Breath is sent to the server, for carrying out purview certification to the mobile terminal;The relevant information includes at least following Any combination of one or more information: device type, device name, International Mobile Station Equipment Identification (International Mobile Equipment Identity, IMEI), phone number, owner's ID card No., owner's name, owner's age, machine Main address, owner's head portrait, owner E-mail address.
According to the system of interactive authentication between the computer and mobile terminal, wherein the server is further used In including link in its message for logging in the computer of the permission for being sent to the mobile terminal, so that the movement Terminal can directly log in the computer by the link.
According to the system of interactive authentication between the computer and mobile terminal, in which:
The mobile terminal is further used for acquiring image after logging in the computer, and will be on the image of acquisition Pass to the computer;
The computer is further used for increasing the image to image database or update in the image database Coherent video.
The method of interactive authentication and it is for above-mentioned defect, between computer and mobile terminal proposed by the invention System based on mobile scanning terminal and reads the function of identity code, and by third-party server, to the computer of interconnection with The permission of mobile terminal interacts certification, compared with the prior art scheme, the best advantage is that, it is possible to reduce The safety for carrying out multi-screen interactive between individual mobile terminal and common equipment or transmitting vital document between devices is hidden Suffer from, improves the safety and efficiency of more equipment interconnections, promote user experience.
Detailed description of the invention
Fig. 1 is the method flow of interactive authentication between the computer and mobile terminal provided according to the preferred embodiment of the present invention Figure;
Fig. 2 is the system architecture of interactive authentication between the computer and mobile terminal provided according to the preferred embodiment of the present invention Figure.
Specific embodiment
Technical solution of the present invention and preferred embodiment hereafter are described with detailed reference to attached drawing, whereby to the present invention how Applied technology method solves technical problem, and the realization process for reaching technical effect can fully understand and implement.In order to The comprehensive understanding present invention, refers to many details, it will be understood by those skilled in the art that of the invention in the following detailed description It may not need these details and realize.In other embodiments, it is not described in detail well known method, process, in order to avoid need not Strategic point keeps embodiment fuzzy.
Referring to Fig. 1, the side of interactive authentication between the computer and mobile terminal that preferred embodiment according to the present invention provides In method, the method specifically includes the following steps:
S100, computer, which generate an identity code and one, allows the task of mobile terminal login, and the identity is known Other code and the task are sent to server.
In the present invention, computer refer to PC, network computer, supercomputer, embedded computer etc. by Various computing devices composed by hardware system and software systems, it might even be possible to cover the television set with computer function, show Display screen etc.;Mobile terminal refers to the computer equipment that can be used on the move, and broad sense is said including smart phone, PDA, plate Computer, notebook, POS machine include even vehicle-mounted computer.It is settable for accessing network in the computer and mobile terminal The browser of information or other network information processing softwares.
Specifically, the information that the computer is used to generate the identity code is believed including at least one or more of Any combination of breath: the user name of the computer, the MAC Address of the computer, the IP address of the computer, described Be engaged in ID, the description information of the task, current time stamp, the user name of the server, the MAC Address of the server, institute State the domain name of server, the IP address of the server.The identity code can be the various types comprising identity information Recognizable coding, common are two-dimensional bar code/two dimensional code (2-dimensional bar code), one-dimensional bar code, colour One or more types such as bar code, visual character string;Also, believe for generating all or part of of the identity code Breath is encrypted, and/or is encrypted to the identity code.
Two-dimensional bar code/two dimensional code is with certain specific geometric figure according to certain rules in the chequered with black and white of plane distribution Graphic recording data symbol information;" 0 ", " 1 " for constituting computer-internal logical foundations are dexterously utilized in code compilation The concept of bit stream indicates text numerical information using several geometrical bodies corresponding with binary system, defeated by image Enter equipment or photoelectric scanning device automatically identifying and reading to realize automatic processing of information: its some general character with barcode technology: every kind Code system has its specific character set;Each character occupies certain width;With certain verifying function etc..Simultaneously also have pair The information automatic identification function and the processing rotationally-varying point of figure that do not go together.
Two dimensional code, which is applied, can be divided into according to business form difference by reading class and main reading class two major classes.By the common application of reading class Mode is after business information encryption, being compiled into image in 2 D code using side, to be sent out two dimensional code by way of short message or multimedia message Send to the mobile terminal of user, user using when by being located at the dedicated recognizing apparatus of service network to two on mobile terminal Dimension code image carries out recognition certification, supports various applications as the voucher of transaction or identification.The common application of main reading class Mode is that user installs two dimensional code client on mobile phone, and the packet of the printed thereons such as media, newspaper is shot and identified using mobile phone Two-dimension code image containing specific information, obtain two dimensional code institute's storage content and trigger surfing Internet with cell phone, business card is distinguished, is made a phone call It is a variety of operation associated.
The label that bar code is made of one group of regularly arranged item, sky and corresponding character, " item " refer to light The lower part of reflectivity, " sky " refer to the higher part of light reflectance, data representations of these and empty composition are certain Information, and can be distinguished with specific equipment, it is converted into the binary system and decimal system information compatible with computer.Generally for every A kind of article, its coding are uniquely, for common bar code, also to pass through Database bar code and commodity The corresponding relationship of information operates data by the application program on computer when the data of bar code pass on computer And processing.
Colour barcode is read miscellaneous mainly in conjunction with the mobile phone or PC that have video camera lens using camera lens Color bar code on will, newspaper, television set or computer screen, and it is transmitted to data center.Data center can be in response to the face received Vitta code is preferential to provide website data or consumption.The colour barcode place more winning than two-dimensional bar code, it is lower to be that it can use Resolution ratio higher data capacity is provided.On the one hand, color bar code is interpreted woth no need to the camera lens of high-resolution, makes ditch It is logical from unidirectionally becoming on both side, two lower resolution ratio are also enabled using the company of bar code in bar code plus changing, with raising The interest that reader participates in.
S110, a mobile scanning terminal and after reading the identity code that the computer generates, connect the clothes Business device, and the task that the permission mobile terminal logs in is got from the server.
After the identity code and the task are sent to the server by the computer, taken described in poll always Business device, polling mode are divided into two kinds, and a kind of comparison is conventional, and the computer timing, which sends Ajax to the server, asks It asks, the server horse back returning response information and closes connection after being connected to request;Another kind is long poll, the computer to The server sends Ajax request, and hold lives to connect after the server is connected to request, until there is new information ability returning response Information simultaneously closes connection, sends new request to the server again after the complete response message of computer disposal.Alternatively, described Computer and the server keep long connection, a Ge Yin KURA iframe are embedded in the page, by the src of this Yin KURA iframe As soon as attribute is set as requesting to the request of long connection or using xhr, the server can continuously be toward the calculating Machine input data.
In the present invention, for mobile terminal it is preferable to use main reading class two-dimensional code, user installs two dimensional code knowledge on mobile terminals Other client.When there is user to want to log in the computer by mobile terminal, using the mobile scanning terminal and institute is read The two dimensional code of computer generation is stated, with obtaining the user name for the computer that two dimensional code is stored, the MAC of the computer Location, the IP address of the computer, the task ID, the description information of the task, the user name of the server, the clothes The information such as the business MAC Address of device, the domain name of the server, the IP address of the server, and trigger the mobile terminal root The server is connected automatically according to the domain name of the server or the IP address of the server, and according to the task ID, institute It states description information of task etc. and gets the task that the permission mobile terminal logs in from the server.
Further, when the mobile terminal gets the same of the task of mobile terminal being allowed to log in from the server When, the relevant information of the mobile terminal is sent to the server, to be used for the server or the computer to institute It states mobile terminal and carries out purview certification.The relevant information includes at least any combination of one or more of information: equipment Type, device name, International Mobile Station Equipment Identification (International Mobile Equipment Identity, IMEI), Phone number, owner's ID card No., owner's name, owner's age, owner address, owner's head portrait, owner E-mail address.
The message that the mobile terminal has got the task is sent to the computer by S120, server, and is waited The computer is confirmed whether that the mobile terminal is allowed to log in the computer.
S130, computer send the response for allowing the mobile terminal to log in the server.
Preferably, disappearing for the task has been got when the computer receives the mobile terminal that the server is sent When breath, a dialog box is popped up on the screen of the computer, including prompt information and select button, the prompt letter Whether whether breath can be " mobile terminal that ID is * * * is allowed to log in ", " phone number be allowed to be that the mobile terminal of * * * is stepped on Whether record ", " mobile terminal of user * * * is allowed to log in " etc., the select button include at least " permission ", " not allowing " two Selection.When user selects " permission ", the computer sends the response for allowing the mobile terminal to log in the server; And when user selects " not allowing ", the computer sends the sound for not allowing the mobile terminal to log in the server It answers, terminates follow-up process.
After S140, server receive the response, Xiang Suoshu mobile terminal, which is sent, allows it to log in disappearing for the computer Breath.
After S150, mobile terminal receive its message for logging in the computer of the permission of the server transmission, step on Record the computer.
In the present invention, log into thr computer refers to establish with computer and communicate to connect, however it is not limited to the behaviour of log into thr computer Make system, further includes logging in or connecting any other system or the application program etc. that run in computer.Preferably, described Server is sent in its message for logging in the computer of the permission of the mobile terminal comprising link, when the movement After terminal receives described its message for logging in the computer of permission, show on the screen, if user clicks the link, The mobile terminal can directly log in the computer by the link.It, can after the mobile terminal logs in the computer To execute subsequent operation.For example, the mobile terminal acquires image, and the image of acquisition is uploaded into the computer; The computer increases the image and perhaps updates coherent video in the image database to image database or by institute It states image and is uploaded to server.
Referring to fig. 2, the system of interactive authentication between the computer and mobile terminal that preferred embodiment provides according to the present invention Including a computer 201, a mobile terminal 202 and a server 203, the computer 201, the mobile terminal 202 and institute It states and passes through network connection between server 203.It should be noted that, although showing the computer 201 and the service in figure Device 203 connects network by wired mode, and the mobile terminal 202 wirelessly connects network, but this is network rack Structure schematic diagram can select internetwork connection mode according to actual needs in practical applications.In addition, for the computer 201, The mobile terminal 202 and the server 203 also only schematically draw one in figure, practical application can be with For any amount.
In the present invention, computer 201 refers to PC, network computer, supercomputer, embedded computer etc. The various computing devices as composed by hardware system and software systems, it might even be possible to cover television set with computer function, Display screen etc.;Mobile terminal 202 refers to the computer equipment that can be used on the move, broad sense say including smart phone, PDA, tablet computer, notebook, POS machine include even vehicle-mounted computer.It can be set in the computer 201 and mobile terminal 202 Set the browser or other network information processing softwares for accessing the network information.
The computer 201 allows the task of the login of mobile terminal 202 for generating an identity code and one, by institute It states identity code and the task is sent to the server 203, and in the mobile terminal for receiving the transmission of server 203 After 202 have got the message of the task, Xiang Suoshu server 203 sends the response for allowing the mobile terminal 202 to log in.
Specifically, any group for including at least one or more of information for generating the information of the identity code Close: the user name of the computer 201, the computer 201 MAC Address, the IP address of the computer 201, the industry Be engaged in ID, the type of service, the business description, the user name of operation system, the User ID of operation system, the use of operation system Family institution where he works title, operation system user's institutional affiliation ID, the authority information of operation system, current time stamp, work as predecessor It is engaged in effective time, check information, the user name of the server 203, the MAC Address of the server 203, the server The IP address of 203 domain name, the server 203.The identity code can be to include the various types of of identity information It can recognize coding, common are two-dimensional bar code/two dimensional code (2-dimensional bar code), one-dimensional bar code, color-bar One or more types such as shape code, visual character string;Also, to all or part of information for generating the identity code It is encrypted, and/or the identity code is encrypted.
Two-dimensional bar code/two dimensional code is with certain specific geometric figure according to certain rules in the chequered with black and white of plane distribution Graphic recording data symbol information;" 0 ", " 1 " for constituting computer-internal logical foundations are dexterously utilized in code compilation The concept of bit stream indicates text numerical information using several geometrical bodies corresponding with binary system, defeated by image Enter equipment or photoelectric scanning device automatically identifying and reading to realize automatic processing of information: its some general character with barcode technology: every kind Code system has its specific character set;Each character occupies certain width;With certain verifying function etc..Simultaneously also have pair The information automatic identification function and the processing rotationally-varying point of figure that do not go together.
Two dimensional code, which is applied, can be divided into according to business form difference by reading class and main reading class two major classes.By the common application of reading class Mode is after business information encryption, being compiled into image in 2 D code using side, to be sent out two dimensional code by way of short message or multimedia message Send to the mobile terminal of user, user using when by being located at the dedicated recognizing apparatus of service network to two on mobile terminal Dimension code image carries out recognition certification, supports various applications as the voucher of transaction or identification.The common application of main reading class Mode is that user installs two dimensional code client on mobile phone, and the packet of the printed thereons such as media, newspaper is shot and identified using mobile phone Two-dimension code image containing specific information, obtain two dimensional code institute's storage content and trigger surfing Internet with cell phone, business card is distinguished, is made a phone call It is a variety of operation associated.
The label that bar code is made of one group of regularly arranged item, sky and corresponding character, " item " refer to light The lower part of reflectivity, " sky " refer to the higher part of light reflectance, data representations of these and empty composition are certain Information, and can be distinguished with specific equipment, it is converted into the binary system and decimal system information compatible with computer.Generally for every A kind of article, its coding are uniquely, for common bar code, also to pass through Database bar code and commodity The corresponding relationship of information operates data by the application program on computer when the data of bar code pass on computer And processing.
Colour barcode is read miscellaneous mainly in conjunction with the mobile phone or PC that have video camera lens using camera lens Color bar code on will, newspaper, television set or computer screen, and it is transmitted to data center.Data center can be in response to the face received Vitta code is preferential to provide website data or consumption.The colour barcode place more winning than two-dimensional bar code, it is lower to be that it can use Resolution ratio higher data capacity is provided.On the one hand, color bar code is interpreted woth no need to the camera lens of high-resolution, makes ditch It is logical from unidirectionally becoming on both side, two lower resolution ratio are also enabled using the company of bar code in bar code plus changing, with raising The interest that reader participates in.
Further, the computer 201 is also used to the identity code and the task being sent to the service After device 203, server 203 described in poll, polling mode are divided into two kinds always, and a kind of comparison is conventional, the computer 201 Timing sends Ajax request to the server 203, and the server 203 horse back returning response information and is closed after being connected to request Connection;Another kind is long poll, and the computer 201 sends Ajax request to the server 203, and the server 203 connects Hold lives to connect after to request, and until having new information ability returning response information and closing connection, the computer 201 has handled sound New request is sent to the server 203 again after answering information.Alternatively, the computer 201 keeps growing with the server 203 Connection, a Ge Yin KURA iframe is embedded in the page, the src attribute of this Yin KURA iframe is set as asking a long connection It asks or is requested using xhr, the server 203 just can continuously be toward 201 input data of computer.
Preferably, the computer 201 is also used to when the mobile terminal 202 for receiving the transmission of server 203 When having got the message of the task, a dialog box is popped up on its screen, including prompt information and select button, institute Whether whether state prompt information can be " mobile terminal that ID is * * * is allowed to log in ", " phone number be allowed to be the movement of * * * Whether terminal login ", " mobile terminal of user * * * is allowed to log in " etc., the select button include at least " permission ", " do not permit Perhaps two selections ".When user selects " permission ", the computer 201 is also used to send described in permission to the server 203 The response that mobile terminal 202 logs in;And when user selects " not allowing ", the computer 201 is also used to the server 203 send the response for not allowing the mobile terminal 202 to log in, and terminate follow-up process.
The mobile terminal 202, after scanning and reading the identity code that the computer 201 generates, even The server 203 is connect, gets the task that the permission mobile terminal 202 logs in from the server 203, and described receiving After its message for logging in the computer 201 of the permission of the transmission of server 203, the computer 201 is logged in.
In the present invention, log into thr computer 201 refers to establish with computer 201 and communicate to connect, however it is not limited to log in and calculate The operating system of machine 201 further includes logging in or connecting any other system or the application program that run in computer 201 Deng.In addition, mobile terminal 202, it is preferable to use main reading class two-dimensional code, user installs two dimensional code identification client on mobile terminal 202 End.When there is user to want to log in the computer 201 by mobile terminal 202, scans and read using the mobile terminal 202 The two dimensional code that the computer 201 generates, the user name for the computer 201 that acquisition two dimensional code is stored, the computer 201 MAC Address, the IP address of the computer 201, the task ID, the description information of the task, the server 203 user name, the MAC Address of the server 203, the domain name of the server 203, the IP address of the server 203 Etc. information, and trigger the mobile terminal 202 according to the domain name of the server 203 or the IP address of the server 203 from The dynamic connection server 203, and got according to the task ID, description information of the task etc. from the server 203 The task of mobile terminal 202 being allowed to log in.
Further, the mobile terminal 202, which is used to work as from the server 203, gets the permission mobile terminal 202 While the task of login, the relevant information of the mobile terminal 202 is sent to the server 203, to be used for the clothes Business device 203 or the computer 201 carry out purview certification to the mobile terminal 202.The relevant information includes at least following Any combination of one or more information: device type, device name, International Mobile Station Equipment Identification (International Mobile Equipment Identity, IMEI), phone number, IP address, MAC Address, owner's ID card No., owner's surname Name, owner's age, owner address, owner's head portrait, owner E-mail address.
The server 203, the message for the mobile terminal 202 have been got the task are sent to the calculating Machine 201 waits the computer 201 to be confirmed whether that the mobile terminal 202 is allowed to log in the computer 201, and is receiving After the response that the permission mobile terminal 202 that the computer 201 is sent logs in, Xiang Suoshu mobile terminal 202, which is sent, to be allowed Its message for logging in the computer 201.
Preferably, the server 203 be also used to the permission for being sent to the mobile terminal 202 its login described in Comprising link in the message of computer 201, the mobile terminal 202, which is also used to work as, receives its described computer of login of the permission It after 201 message, shows on the screen, and the computer is directly logged in by the link when user clicks the link 201.After the mobile terminal 202 logs in the computer 201, the mobile terminal 202 is further used for acquiring image, and The image of acquisition is uploaded into the computer 201;The computer 201 is further used for increasing the image to image Database perhaps updates the coherent video in the image database or the image is uploaded to server 203.
The foregoing is merely presently preferred embodiments of the present invention, is not intended to restrict the invention, all in spirit of that invention and original Any modifications, equivalent replacements, and improvements etc. done within then, is both contained within protection scope of the present invention.

Claims (10)

1. a kind of method of interactive authentication between computer and mobile terminal, which is characterized in that the described method includes:
The computer generate an identity code and one allow mobile terminal to log in task, and by the identity code and The task is sent to server;
After the identity code and the task are sent to the server by the computer, server described in poll always Or long connection is kept with the server, to wait standby communication terminals to get the task;
One mobile scanning terminal and after reading the identity code that the computer generates, connects the server, and from The server gets the task that the permission mobile terminal logs in, meanwhile, the relevant information of the mobile terminal is sent to The server, for carrying out purview certification to the mobile terminal;
The message that the mobile terminal has got the task is sent to the computer by the server, and waits the meter Calculation machine is confirmed whether that the mobile terminal is allowed to log in the computer;
The computer sends the response for allowing the mobile terminal to log in the server;
After the server receives the response, Xiang Suoshu mobile terminal, which is sent, allows its message for logging in the computer;With And
After the mobile terminal receives its message for logging in the computer of the permission of the server transmission, described in login Computer.
2. the method for interactive authentication between computer according to claim 1 and mobile terminal, which is characterized in that the body Part identification code includes at least one or more of type: two dimensional code, one-dimensional bar code, color bar code, visual character string;And And all or part of information for generating the identity code is encrypted, and/or the identity code is carried out Encryption.
3. the method for interactive authentication between computer according to claim 1 or 2 and mobile terminal, which is characterized in that use Any combination of one or more of information: the use of the computer is included at least in the information for generating the identity code Name in an account book, the MAC Address of the computer, the IP address of the computer, the IP address of the server, traffic ID, service class Type, user name, User ID, user institution where he works title, user's institutional affiliation ID, authority information, timestamp, is appointed at business description It is engaged in effective time, check information.
4. the method for interactive authentication between computer according to claim 3 and mobile terminal, which is characterized in that the phase Close any combination that information includes at least one or more of information: device type, device name, international mobile device mark Knowledge, phone number, IP address, MAC Address, owner's ID card No., owner's name, owner's age, owner address, Ji Zhutou Picture, owner E-mail address.
5. the method for interactive authentication between computer according to claim 4 and mobile terminal, which is characterized in that the shifting After dynamic terminal logs in the computer, further comprise:
The mobile terminal acquires image, and the image of acquisition is uploaded to the computer;
The computer increases the image to the coherent video in image database or the update image database.
6. the system of interactive authentication between a kind of computer and mobile terminal, which is characterized in that the system comprises a computer, One mobile terminal and a server, in which:
The computer allows the task of mobile terminal login for generating an identity code and one, by the identification Code and the task are sent to the server, and the computer is further used for by the identity code and the task After being sent to the server, server described in poll or long connection is kept with the server always, with equal standby communication terminals The task is got, and after receiving the mobile terminal that the server is sent and having got the message of the task, to the clothes Business device sends the response for allowing the mobile terminal to log in;
The mobile terminal connects the service after scanning and reading the identity code that the computer generates Device gets the task that the permission mobile terminal logs in from the server, meanwhile, the relevant information of the mobile terminal is sent out The server is given, for carrying out purview certification to the mobile terminal;And it is receiving described in the server transmission After allowing it to log in the message of the computer, the computer is logged in;And
The server, the message for the mobile terminal have been got the task are sent to the computer, wait institute It states computer to be confirmed whether that the mobile terminal is allowed to log in the computer, and in the permission institute for receiving the computer transmission After the response for stating mobile terminal login, Xiang Suoshu mobile terminal, which is sent, allows its message for logging in the computer.
7. the system of interactive authentication between computer according to claim 6 and mobile terminal, which is characterized in that the body Part identification code includes at least one or more of type: two dimensional code, one-dimensional bar code, color bar code, visual character string;And And all or part of information for generating the identity code is encrypted, and/or the identity code is carried out Encryption.
8. the system of interactive authentication between computer according to claim 6 or 7 and mobile terminal, which is characterized in that use Any combination of one or more of information: the use of the computer is included at least in the information for generating the identity code Name in an account book, the MAC Address of the computer, the IP address of the computer, the task ID, the description information of the task, when Preceding timestamp, the user name of the server, the MAC Address of the server, the domain name of the server, the server IP address.
9. the system of interactive authentication between computer according to claim 8 and mobile terminal, which is characterized in that the phase Close any combination that information includes at least one or more of information: device type, device name, international mobile device mark Knowledge, phone number, IP address, MAC Address, owner's ID card No., owner's name, owner's age, owner address, Ji Zhutou Picture, owner E-mail address.
10. the system of interactive authentication between computer according to claim 9 and mobile terminal, which is characterized in that wherein:
The mobile terminal is further used for acquiring image after logging in the computer, and the image of acquisition is uploaded to The computer;
The computer is further used for increasing the image to the phase in image database or the update image database Close image.
CN201610140690.XA 2016-03-11 2016-03-11 The method and system of interactive authentication between a kind of computer and mobile terminal Active CN105825120B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610140690.XA CN105825120B (en) 2016-03-11 2016-03-11 The method and system of interactive authentication between a kind of computer and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610140690.XA CN105825120B (en) 2016-03-11 2016-03-11 The method and system of interactive authentication between a kind of computer and mobile terminal

Publications (2)

Publication Number Publication Date
CN105825120A CN105825120A (en) 2016-08-03
CN105825120B true CN105825120B (en) 2019-09-10

Family

ID=56987785

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610140690.XA Active CN105825120B (en) 2016-03-11 2016-03-11 The method and system of interactive authentication between a kind of computer and mobile terminal

Country Status (1)

Country Link
CN (1) CN105825120B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107895436A (en) * 2017-11-08 2018-04-10 东莞市康茂电子有限公司 One kind is shared with screen device management system and its control method
CN109032546B (en) * 2018-06-12 2021-09-07 广州视源电子科技股份有限公司 Multi-screen interaction system and method
CN111836105B (en) * 2019-04-16 2023-04-28 中科网联数据科技有限公司 Television user identity recognition method and television terminal
CN110519551B (en) * 2019-09-19 2020-11-17 上海赛连信息科技有限公司 Method and device for personalized setting of video conference terminal
CN111368173A (en) * 2020-03-05 2020-07-03 五八有限公司 File transmission method and device, electronic equipment and readable storage medium
CN112887299B (en) * 2021-01-22 2022-07-08 平安普惠企业管理有限公司 Online interaction method and device, electronic equipment and storage medium
CN113111319B (en) * 2021-04-07 2021-10-08 珠海市鸿瑞信息技术股份有限公司 Identity authentication system and method based on industrial control system
CN114095789A (en) * 2021-11-17 2022-02-25 唐文兵 Tracing and recognizing protection method for identity of detection camera

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1758417A1 (en) * 2004-10-27 2007-02-28 Huawei Technologies Co., Ltd. Authentication method
CN103475636A (en) * 2013-06-13 2013-12-25 深圳创维-Rgb电子有限公司 Electronic account login method, intelligent terminal and mobile terminal
CN103763327A (en) * 2014-01-28 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Account number logging-in method and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102802071B (en) * 2012-08-24 2014-10-29 上海广电电子科技有限公司 Intelligent television, mobile terminal, multi-screen interaction system and wireless communication method
CN102868696B (en) * 2012-09-18 2015-10-07 广州市动景计算机科技有限公司 The communication of many equipment rooms and information synchronization method and system
CN104410899B (en) * 2014-11-14 2017-09-12 康佳集团股份有限公司 Multi-screen interactive processing method, system and TV set device based on television set

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1758417A1 (en) * 2004-10-27 2007-02-28 Huawei Technologies Co., Ltd. Authentication method
CN103475636A (en) * 2013-06-13 2013-12-25 深圳创维-Rgb电子有限公司 Electronic account login method, intelligent terminal and mobile terminal
CN103763327A (en) * 2014-01-28 2014-04-30 宇龙计算机通信科技(深圳)有限公司 Account number logging-in method and system

Also Published As

Publication number Publication date
CN105825120A (en) 2016-08-03

Similar Documents

Publication Publication Date Title
CN105825120B (en) The method and system of interactive authentication between a kind of computer and mobile terminal
US10976923B2 (en) Enhanced virtual keyboard
CN104704485B (en) A method of the content of the first browser is checked in the second position
CN105122288B (en) Apparatus and method for processing multimedia business service
JP6837066B2 (en) Information processing method and server, computer storage medium
CN103152404B (en) The multiple enterprises multi-user of the service-oriented information switching that swipes represents and exchange method
US9904469B2 (en) Keyboard stream logging
KR20120090388A (en) Method and apparatus for managing user device and contents using qr code
JP5530557B1 (en) Server, program and method for distributing content
CN104838386A (en) User authentication and authorization using personas
EP3414650B1 (en) Social keyboard
CN110166457A (en) A kind of advertisement machine information issuing method and its device
US10241976B2 (en) Techniques for peer-to-peer communication
CN113259140B (en) Cloud conference box rapid conference entering method and system
KR20130131543A (en) House lease system and method using qr code
US8966595B1 (en) Techniques for peer-to-peer communication using a “shared secret”
CN104539688B (en) A kind of retail shop's management system based on mPortal systems
KR20120137629A (en) System for providing shorten url browsing with branding , method thereof, and web client thereof
CN105592084A (en) Multi-enterprise multi-user shake switching presentation and interaction method oriented to service information
CN111885139B (en) Content sharing method, device and system, mobile terminal and server
CN103841153A (en) Information publishing system, device and method based on wireless local area network
KR101170322B1 (en) Method and device for providing cloud computing service using personal computer based on web
CN109286931B (en) Wireless local area network access method and device
CN106331305A (en) Method and system for customizing shake function of WeChat
CN108616611A (en) A kind of generation method and device of dynamic scape business card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant