CN101640591A - Authentication method - Google Patents

Authentication method Download PDF

Info

Publication number
CN101640591A
CN101640591A CN200810135338A CN200810135338A CN101640591A CN 101640591 A CN101640591 A CN 101640591A CN 200810135338 A CN200810135338 A CN 200810135338A CN 200810135338 A CN200810135338 A CN 200810135338A CN 101640591 A CN101640591 A CN 101640591A
Authority
CN
China
Prior art keywords
password
user
certificate server
authentication
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810135338A
Other languages
Chinese (zh)
Inventor
王超
刘康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Siemens Ltd China
Original Assignee
Siemens Ltd China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Siemens Ltd China filed Critical Siemens Ltd China
Priority to CN200810135338A priority Critical patent/CN101640591A/en
Publication of CN101640591A publication Critical patent/CN101640591A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides an authentication method. The method comprises the following steps: setting an authentication password rule on an authentication server for a user; sending an authentication request to the authentication server through a user terminal; generating a character table by the authentication server and extracting a first password from the character table according to the authentication password rule; sending the character table to the user terminal by the authentication server; extracting a second password from the character table received by the user terminal and sending thesecond password to the authentication server; and comparing the received second password and first password by the authentication server. If the first password and the second password are consistent,the authentication is successful; and if the first password and the second password are not consistent, the authentication fails. In the authentication method, because the password is hidden in the character table, a rule set by the user is difficult to guess even if the character table is acquired by other people, the password of the user is difficult to know, and further the user can perform theauthentication more safely by using the one-time password.

Description

A kind of authentication method
Technical field
The present invention relates to a kind of authentication (Authentication) method, especially a kind of one-time password (One Time Password, OTP) authentication method.
Background technology
In present network, there is the weakness of anti-attack ability difference in some traditional authentication methods (for example authentication method of Chang Yong " user name+password ").These authentication methods password (or claiming password) in long a period of time is constant.Transmit in network owing to use expressly, so the assailant is easier to guess password or be easier to use the monitoring instrument to realize the transmission content, thereby realizes user password.In addition, under the content record that some wooden horse instruments also can knock the user when the user knocks keyboard, and then the identification user password.Have, even the user has used ciphertext transmission data sometimes, the assailant is difficult to crack user's password plaintext again, but the assailant still can obtain user's access rights by the packet that simulation transmission user has sent.
At the weakness in the above-mentioned authentication method, the higher authentication method of some fail safes has been proposed in the prior art, one of them is the one-time password method.In the one-time password method, user's password be not as traditional authentication method in a period of time password constant, but for each time the authentication all use a new password, so be called one-time password.
Authenticate with one-time password at present and can use an one-time password token (OTP Token).This token is a hardware device, is used for carrying out synchronously with certificate server, and synchronized result is presented on the screen of token.But the weakness of this method is that token has certain life cycle, surpasses this life cycle and just need purchase token again, therefore causes the cost costliness of buying or upgrading.
Therefore, (Short Message Service, SMS) substituting disposable password token transmits one-time password to use Short Message Service at present usually.That is to say, when the user will use an application service, be to authenticate by mobile phone rather than one-time password token.Certificate server (is for example verified by the cell-phone number and the PIN code of mobile phone) after the identity of having verified the user, can send a short message that comprises one-time password to user's mobile phone, the user reads short message from mobile phone, just can utilize the one-time password in the short message to authenticate.
But the one-time password authentication method that is undertaken by Short Message Service is that certificate server produces the one-time password of a text formatting and this password is passed to mobile phone at present, and does not encrypt usually.Can there be some safety problems in this process, for example, is seen that by other people other people will learn this one-time password if the user forgets the content of short message that makes somewhere in the mobile phone with mobile phone.Even use some wireless devices to come the transmission primaries password, the assailant still might monitor or realize the one-time password of aerial transmission.If this password is not used and is in effective life cycle, then probably be used to the authentication that obtains to palm off by other people.
Summary of the invention
Main purpose of the present invention is to provide a kind of authentication method, adopt this method can make that verification process is safer, even the content that certificate server sends is obtained by other people, other people also are difficult to obtain user password, thereby make the user can utilize one time property password to authenticate saferly.
For achieving the above object, technical scheme of the present invention specifically is achieved in that a kind of authentication method, and the method includes the steps of:
(1) on a certificate server, the authenticate password rule is set for the user;
(2) send authentication request by a user terminal to described certificate server;
(3) described certificate server generates a character list and extracts first password according to described authenticate password rule from described character list;
(4) described certificate server sends to described user terminal with described character list;
(5) from the character list that described user terminal receives, extract second password and described second password is sent to described certificate server;
(6) described certificate server compares second password and first password that is received, and is identical as if both, then authentication success; Otherwise authentification failure.
In the described step (1), on described certificate server by an original character table for the user is provided with described authenticate password rule.Described original character table be shaped as rectangle, annular or the honeycombed of forming by cell.
As if the rectangle that is shaped as of the original character table of being made up of cell, the row, column cell number of then described rectangle original character table is respectively between 6-9.Preferably, the row, column cell number of described rectangle original character table is 8.
When the authenticate password rule is set, can the authenticate password rule be set according to the row or the row of cell selected in the described original character table; Perhaps, the shape according to cell selected in the described original character table is provided with the authenticate password rule.
Further, described each cell has colouring information.In the case, also the authenticate password rule is set according to the colouring information and the direction of cell selected in the described original character table.
In the described step (1), the character list that described certificate server generates has a life cycle.
In the described step (1), the authenticate password rule is set on described certificate server by a user interface.
Correspondingly, the present invention also provides a kind of Verification System, comprise a terminal and a certificate server, described terminal is used for sending authentication request and second password that is obtained being passed to described certificate server to described certificate server, described server is used to receive the authentication request of described terminal, and second password that it received and its first password of storing compared judges whether success of authentication.According to the present invention, comprise an one-time password generation module on the described certificate server, be used for generating a character list and extract first password from described character list according to the authenticate password rule that the user is provided with.
Comprise a subscriber interface module on the described certificate server, the user is provided with the authenticate password rule by described user interface on described certificate server.
Adopt authentication method provided by the present invention, by the user on certificate server to its authenticate password rule but not password be provided with.Character list of certificate server generation and the authenticate password Rule Extraction that is provided with according to the user go out user password.Subsequently, certificate server passes to user terminal with the character list that generates, and the user is according to the character list that receives, and according to the own definite password of authenticate password rule that is provided with, and sends to certificate server and authenticates.As seen, certificate server does not directly transmit password to terminal, but transmits a character list that is implying password.Because password lies in the character list, even therefore character list is known by other people, also be difficult to guess the rule that is provided with that the user, thereby be difficult to know user's password that the user just can utilize one time property password to authenticate saferly like this.
Secondly, after the user is provided with the authenticate password rule, need not to remember tediously long password and only need remember the authenticate password rule that he is set.Because the usually authenticate password rule easier memory of password that compares, therefore more convenient for the user, more be difficult for forgetting, the assailant of malice owing to be difficult to guess user's the rule that is provided with, has therefore been improved authenticating safety.
Once more, because authentication method provided by the present invention need not the one-time password token of hardware, therefore on equipment cost, also greatly reduce.
Description of drawings
Below in conjunction with accompanying drawing the specific embodiment of the present invention is described in further detail, wherein:
Fig. 1 is the flow chart of authentication method of the present invention;
Fig. 2 is embodiments of the invention one, the authentication method flow chart that uses during by surfing Internet with cell phone;
Fig. 3 is the character list that exists on certificate server in the embodiments of the invention one, and wherein (a) is the original character table, (b) is the character list after generating;
Fig. 4 (a) is that the user selects second row, direction 8 characters from right to left that the authenticate password rule schematic diagram of this user password is set in the embodiments of the invention one, and Fig. 4 (b) is the password schematic diagram that certificate server extracts from the character list that generates according to this authenticate password rule;
Fig. 5 (a) be in the embodiments of the invention one user select the third line, direction from left to right 3 characters and the 7th row, direction 5 characters from top to bottom totally 8 characters the authenticate password rule schematic diagrames of this user password, the password schematic diagram that Fig. 5 (b) extracts from the character list that generates according to this authenticate password rule for certificate server are set;
Fig. 6 (a) is that the user selects two rectangles in the original character table in the embodiments of the invention one, and using totally 8 regular schematic diagrames of authenticate password that character is provided with this user password at four angles of these two rectangles, Fig. 6 (b) is the password schematic diagram that certificate server extracts from the character list that generates according to this authenticate password rule;
Fig. 7 is the colouring information schematic diagram of each cell in the original character table shown in Fig. 3 (a);
Fig. 8 (a) is that the user according to the redness in the original character table and from top to bottom in the embodiments of the invention one, direction from left to right is provided with the authenticate password rule schematic diagram of its password, the password schematic diagram that Fig. 8 (b) extracts according to this authenticate password rule for certificate server from the character list that generates;
Fig. 9 (a) is that the user according to the green in the original character table and from bottom to up in the embodiments of the invention one, dextrosinistral direction is provided with the authenticate password rule schematic diagram of its password, the password schematic diagram that Fig. 9 (b) extracts according to this authenticate password rule for certificate server from the character list that generates;
Figure 10 (a) be in the embodiments of the invention one user according to the redness in the original character table, from top to bottom, direction from left to right is provided with preceding four passwords, according to the green in the original character table, from bottom to up, dextrosinistral direction is provided with the authenticate password rule schematic diagram of back four passwords, the password schematic diagram that Figure 10 (b) extracts according to this authenticate password rule for certificate server from the character list that generates;
Figure 11 is embodiments of the invention two, the authentication method flow chart that uses when authenticating by door control system;
Figure 12 is embodiments of the invention one employed Verification System schematic diagrames.
Embodiment
Fig. 1 is the flow chart of authentication method of the present invention.Have user terminal and a certificate server in the methods of the invention, its invention step is as follows:
(1) user is provided with the authenticate password rule on a certificate server;
(2) user sends authentication request by a user terminal to certificate server;
(3) certificate server generates a character list and extracts this user's password according to the authenticate password rule that user in the step (1) is provided with from the character list that generates, and is called first password and stores this password;
(4) certificate server sends to user terminal with the character list that is generated;
(5) user goes out this user's password according to its set authenticate password Rule Extraction from the character list that user terminal receives, and is called second password;
(6) user sends to certificate server by user terminal with second password;
(7) certificate server compares second password that is received and first password of being stored, and is identical as if both, then authentication success; Otherwise authentification failure.
Fig. 2 is the embodiment of the invention one, the authentication method flow chart that uses during by surfing Internet with cell phone, and its step specifies as follows:
(1) cellphone subscriber is provided with authenticate password rule for this user by a user interface on certificate server.
The user at first can register its phone number and PIN code to certificate server by this user interface.Have an original character table on certificate server, shown in Fig. 3 (a), this original character table is the square of being made up of the cell of 8*8.The user can see this original character table from user interface, on this original character table the authenticate password rule is set then.
The user can be provided with the authenticate password rule according to the custom of oneself, and for example the user can select one that the authenticate password rule is set from following several modes at least:
First kind of mode: the user is provided with the authenticate password rule according to the row and/or the row of cell selected in the original character table shown in Fig. 3 (a).For example, the user selects second row, direction 8 characters from right to left that this user's authenticate password rule is set, and promptly is set to the authenticate password rule shown in Fig. 4 (a).Again for example, the user selects the third line, direction 3 characters from left to right; The 7th row, direction 5 characters from top to bottom totally 8 characters are provided with this user's authenticate password rule, promptly are set to the authenticate password rule shown in Fig. 5 (a).
The second way: the user is provided with the authenticate password rule according to the shape that cell constituted selected in the original character table shown in Fig. 3 (a).For example, the user selects two rectangles in the original character table, and uses totally 8 characters at four angles of these two rectangles that the authenticate password rule is set, and promptly is set to the authenticate password rule shown in Fig. 6 (a).
Each cell all has colouring information in the original character table shown in the third mode: Fig. 3 (a).In the case, also the authenticate password rule is set according to the colouring information and the direction of cell selected in the described original character table.For example, the colouring information of supposing each cell in the original character table shown in Fig. 3 (a) as shown in Figure 7.
Suppose that user A likes red, this user is provided with its authenticate password rule according to redness in the original character table and direction, and direction is for from top to bottom, from left to right, promptly shown in Fig. 8 (a).
Suppose that again user B likes green, this user is provided with its authenticate password rule according to green in the original character table and direction, direction for from bottom to up, from right to left, promptly shown in Fig. 9 (a).
Suppose that again user C not only likes red but also like green, this user is provided with its authenticate password rule according to the redness in the original character table and green and direction thereof, for example preceding four passwords are set from top to bottom, from left to right according to the redness in the original character table, direction, according to the green in the original character table, direction back four passwords are set from bottom to up, from right to left, promptly shown in Figure 10 (a).
(2) user send an authentication request message to an authentication proxy to trigger the OTP authentication request, have this user's phone number and PIN code in the authentication request message.Authentication proxy herein can for example be a webpage.
(3) authentication proxy is transmitted to certificate server with described OTP authentication request message.
(4) after certificate server receives authentication request message, use user's phone number and the identity that PIN code is verified the user.If authentication is passed through, then continue next step (5).
(5) certificate server generates a character list and extracts first password according to the authenticate password rule that the user is provided with from the character list that generates.
The character list that certificate server generates is to fill character on the basis of original character table, for example shown in Fig. 3 (b).On the basis of the character list that generates, the authenticate password rule that certificate server is provided with according to this user in the step (1) extracts this user's one-time password from the character list that generates, be referred to as first password.
If the user sets the authenticate password rule according to first kind of mode in step (1), then the rule set according to first kind of mode of certificate server extracts one-time password from the character list of the generation shown in Fig. 3 (b).For example, the user selects second row, direction 8 characters from right to left that this user's authenticate password rule is set, and what then extract is the password shown in Fig. 4 (b), and promptly 20903135.Again for example, the user selects the third line, direction 3 characters from left to right; The 7th row, direction 5 characters from top to bottom totally 8 characters are provided with this user's authenticate password rule, and what then extract is the password shown in Fig. 5 (b), and promptly 23530410.
If the user sets the authenticate password rule according to the second way in step (1), then certificate server extracts one-time password according to the rule of second way setting from the character list of the generation shown in Fig. 3 (b).For example, the user selects two rectangles in the original character table, and uses totally 8 characters at four angles of these two rectangles that the authenticate password rule is set, and what then extract is the password shown in Fig. 6 (b), and promptly 51604285.
If the user sets the authenticate password rule according to the third mode in step (1), be that each cell all has as shown in Figure 7 colouring information in the original character table shown in Fig. 3 (a), then the rule set according to the third mode of certificate server extracts one-time password from the character list of the generation shown in Fig. 3 (b).
Suppose that user A likes red, this user is provided with its authenticate password rule according to redness in the original character table and direction, and direction is for from top to bottom, from left to right, and what then extract is the password shown in Fig. 8 (b), and promptly 65347557.
Suppose that again user B likes green, this user is provided with its authenticate password rule according to green in the original character table and direction, direction for from bottom to up, from right to left, what then extract is the password shown in Fig. 9 (b), promptly 14082321.
Suppose that again user C not only likes red but also like green, this user is provided with its authenticate password rule according to the redness in the original character table and green and direction thereof, for example preceding four passwords are set from top to bottom, from left to right according to the redness in the original character table, direction, according to the green in the original character table, direction back four passwords are set from bottom to up, from right to left, what then extract is the password shown in Figure 10 (b), promptly 65341408.
(6) certificate server is stored the password that is extracted, and is that each password sets life cycle, and for example this cycle can be minute being unit.
(7) character list that comprises one-time password that certificate server will generate sends to the MMS system, and the MMS system is forwarded to user mobile phone with the character list that this comprises one-time password subsequently.
(8) user opens the MMS multimedia message that mobile phone receives, and extracts one-time password from the character list that comprises one-time password that mobile phone receives, and is called second password.
The user extracts password according to the authenticate password rule that oneself is provided with from the shown character list of MMS multimedia message process and the middle process of extracting of above-mentioned steps (5) are similar.
(9) user's second password that will extract sends to authentication proxy.
(10) authentication proxy transmits second password to certificate server.
(11) certificate server compares second password that is received and first password of being stored, and is identical as if both, then authentication success; Otherwise authentification failure.
(12) certificate server returns to mobile phone terminal with authentication result.
Figure 11 is the embodiment of the invention two, the authentication method flow chart that door control system uses, and this door control system comprises a screen, is used for showing the character list that authentication module generates; A keyboard, second password that the user can extract from character list with the input of this keyboard; A card reader is used for reading the information of badge.Its authenticating step is described as follows:
(1) user is provided with the authenticate password rule on authentication module, returns a successfully sign if authentication module is set successfully.
(2) use a badge and a card reader to obtain data necessary, for example can obtain a sequence code, this sequence code is generally used for identifying user.
(3) card reader sends above-mentioned sequence code to authentication module.
(4) authentication module generates the array that a random number is formed, and this array is a matrix usually, and matrix size for example is 8*8, and authentication module generates a character list according to this array.
The authenticate password rule that authentication module is provided with according to the user obtains user's password (first password) from the character list that generates, this password is stored in the authentication module.
(5) authentication module sends character list to display unit.
(6) user reads character list from display unit, calculates authenticate password (second password) according to the authenticate password rule that is provided with in the step (1).
(7) user imports second password on keyboard, and keyboard sends to authentication module with second password.
(8) authentication module compares second password that is received and first password of being stored, and is identical as if both, then authentication success; Otherwise authentification failure.
(9) certificate server turns back to display unit with authentication result.
Figure 12 is embodiments of the invention one employed Verification System schematic diagrames.As can be seen from Figure 12, this Verification System comprises four main modular, is respectively authentication proxy's module, certificate server module, multi-media SMS business module and user terminal.
Authentication proxy's module is used to send authentication request to the certificate server module, and it comprises two modules again, and one is the authentication request module, is used for sending disposable authentication request message to certificate server, carries user's cell-phone number and PIN code in this message; It two is an authentication module, be used to receive the one-time password (i.e. second password) of user's input, also to calculate Hash (hash) value of this password when being necessary, this one-time password (one-time password after perhaps encrypting through cryptographic Hash) is sent to the certificate server module.
The certificate server module is used to authenticate, and it comprises four modules, and one is an one-time password maker module, is used to generate a character list, can go out one-time password (first password) according to the authenticate password Rule Extraction that the user is provided with from this character list; It two is the one-time password memory module, is used for the one-time password that the authentication storage server extracts; Whether it three is the one-time password authentication module, is used for first password that the one-time password memory module is stored and second password that receives from authentication proxy's module compares, correct with the one-time password of checking user input; It four is a subscriber interface module, is used for providing register interface to the user, for its input authentication password rule.
The multi-media SMS business module contains a multimedia gateway, is used for the character list that the certificate server module sends is transmitted to user terminal.
User terminal links to each other with the authentication proxy module, is used to receive the character list that the certificate server module sends, and the user extracts second password according to this character list.
From the foregoing description as can be seen, certificate server that this hits or authentication module directly do not transmit password to terminal, but transmit a character list that is implying password.Because password lies in the character list, even therefore character list is known by other people, also be difficult to guess the rule that is provided with that the user, thereby be difficult to know user's password that the user just can utilize one time property password to authenticate saferly like this.

Claims (13)

1. authentication method is characterized in that the method includes the steps of:
(1) on a certificate server, the authenticate password rule is set for the user;
(2) send authentication request by a user terminal to described certificate server;
(3) described certificate server generates a character list and extracts first password according to described authenticate password rule from described character list;
(4) described certificate server sends to described user terminal with described character list;
(5) from the character list that described user terminal receives, extract second password and described second password is sent to described certificate server;
(6) described certificate server compares second password and first password that is received, and is identical as if both, then authentication success; Otherwise authentification failure.
2. authentication method according to claim 1 is characterized in that: in the described step (1), on described certificate server by an original character table for the user is provided with described authenticate password rule.
3. authentication method according to claim 2 is characterized in that: described original character table be shaped as rectangle, annular or the honeycombed of forming by cell.
4. authentication method according to claim 3 is characterized in that: the row, column cell number of described rectangle original character table is respectively between 6-9.
5. authentication method according to claim 4 is characterized in that: the row, column cell number of described rectangle original character table is 8.
6. authentication method according to claim 4 is characterized in that: row or row according to cell selected in the described original character table are provided with the authenticate password rule.
7. authentication method according to claim 4 is characterized in that: according to the shape that cell constituted selected in the described original character table authenticate password rule is set.
8. authentication method according to claim 3 is characterized in that: described each cell has colouring information.
9. authentication method according to claim 8 is characterized in that: colouring information and direction according to cell selected in the described original character table are provided with the authenticate password rule.
10. authentication method according to claim 1 is characterized in that: in the described step (1), the character list that described certificate server generates has a life cycle.
11. authentication method according to claim 2 is characterized in that: in the described step (1), the authenticate password rule is set on described certificate server by a user interface.
12. Verification System, comprise a terminal and a certificate server, described terminal is used for sending authentication request and second password that is obtained being passed to described certificate server to described certificate server, described server is used to receive the authentication request of described terminal, and second password that it received and its first password of storing compared judge whether success of authentication, it is characterized in that: comprise an one-time password generation module on the described certificate server, be used for generating a character list and extract first password from described character list according to the authenticate password rule that the user is provided with.
13. Verification System according to claim 12 is characterized in that: comprise a subscriber interface module on the described certificate server, the user is provided with the authenticate password rule by described user interface on described certificate server.
CN200810135338A 2008-07-31 2008-07-31 Authentication method Pending CN101640591A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810135338A CN101640591A (en) 2008-07-31 2008-07-31 Authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810135338A CN101640591A (en) 2008-07-31 2008-07-31 Authentication method

Publications (1)

Publication Number Publication Date
CN101640591A true CN101640591A (en) 2010-02-03

Family

ID=41615400

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810135338A Pending CN101640591A (en) 2008-07-31 2008-07-31 Authentication method

Country Status (1)

Country Link
CN (1) CN101640591A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368918A (en) * 2012-04-01 2013-10-23 西门子公司 Method, device and system for dynamic password authentication
CN104009851A (en) * 2014-06-17 2014-08-27 烟台大学 One-time pad bidirectional authentication safe logging technology for internet bank
CN107423609A (en) * 2016-09-09 2017-12-01 天地融科技股份有限公司 A kind of authoring system, method and card

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368918A (en) * 2012-04-01 2013-10-23 西门子公司 Method, device and system for dynamic password authentication
CN104009851A (en) * 2014-06-17 2014-08-27 烟台大学 One-time pad bidirectional authentication safe logging technology for internet bank
CN104009851B (en) * 2014-06-17 2018-08-10 烟台大学 A kind of bank net one-time pad two-way authentication secure log technology
CN107423609A (en) * 2016-09-09 2017-12-01 天地融科技股份有限公司 A kind of authoring system, method and card
CN107423609B (en) * 2016-09-09 2020-03-24 天地融科技股份有限公司 Authorization system, method and card

Similar Documents

Publication Publication Date Title
US8407463B2 (en) Method of authentication of users in data processing systems
JP6264674B2 (en) Authentication system and method using QR code
CN103795545B (en) Safety communication method and system
CN104468531B (en) The authorization method of sensitive data, device and system
US8661254B1 (en) Authentication of a client using a mobile device and an optical link
JP5601729B2 (en) How to log into a mobile radio network
KR101383761B1 (en) User authentication system and method thereof
KR100548638B1 (en) Creating and authenticating one time password using smartcard and the smartcard therefor
US20120066749A1 (en) Method and computer program for generation and verification of otp between server and mobile device using multiple channels
US9635022B2 (en) Method of allowing establishment of a secure session between a device and a server
CN101997824A (en) Identity authentication method based on mobile terminal as well as device and system thereof
WO2013043534A1 (en) Mobile computing device authentication using scannable images
CN106100848A (en) Double factor identity authorization system based on smart mobile phone and user password and method
CN101662458A (en) Authentication method
CN101355555A (en) Authentication system and authentication method
CN105208013A (en) Cross-device high-security non-password login method
CN107465649A (en) Control method of electronic device, terminal and control system
CN107113613A (en) Server, mobile terminal, real-name network authentication system and method
CN104660401A (en) Authentication method, authentication system and terminal
CN105515781B (en) A kind of application platform login system and its login method
TWI540874B (en) Identity authentication method, device and system
CN101640591A (en) Authentication method
KR102016976B1 (en) Unified login method and system based on single sign on service
EP2940618A1 (en) Method, system, user equipment and program for authenticating a user
WO2016076558A1 (en) Certification pattern determination method and payment method using same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20100203