CN102231746A - Method for validating identification information and terminal thereof - Google Patents

Method for validating identification information and terminal thereof Download PDF

Info

Publication number
CN102231746A
CN102231746A CN2011101930201A CN201110193020A CN102231746A CN 102231746 A CN102231746 A CN 102231746A CN 2011101930201 A CN2011101930201 A CN 2011101930201A CN 201110193020 A CN201110193020 A CN 201110193020A CN 102231746 A CN102231746 A CN 102231746A
Authority
CN
China
Prior art keywords
information
verification
terminal
client
verification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011101930201A
Other languages
Chinese (zh)
Other versions
CN102231746B (en
Inventor
张凤明
张帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hao Lei
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201110193020.1A priority Critical patent/CN102231746B/en
Publication of CN102231746A publication Critical patent/CN102231746A/en
Priority to PCT/CN2012/072290 priority patent/WO2012149840A1/en
Application granted granted Critical
Publication of CN102231746B publication Critical patent/CN102231746B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a method for validating identification information and a terminal thereof. The method comprises the following steps: a client of a terminal acquires identification information which needs to be validated and is inputted by a user, and the identification information is used for identifying a terminal; the client generates or obtains a validation code used for validation from a server; through the terminal, the client sends the validation information to the terminal identified by the identification information, wherein the validation information contains the validation code; When the client receives the validation information through the terminal, according to the validation code generated by the client or obtained from the server, the client validates whether the validation code in the validation information is valid or not, if so, validation of identification information is successful. According to the invention, problems of distributing application identification for an application server by an operator and configuring the application identification in information gateway equipment of the operator are avoided. Dependence of the client corresponding to an application on the operator is effectively reduced, and configuration and maintenance cost of the operator are reduced.

Description

Method and terminal for verifying identification information
Technical Field
The embodiment of the invention relates to the communication technology, in particular to a method and a terminal for verifying identification information.
Background
With the development of communication technology, more and more application functions are integrated in the terminal, such as: flyer, electronic payment, etc. The application programs corresponding to these application functions need to operate based on the identification information (e.g., telephone number, email address, etc.) of the terminal. Since the client corresponding to the application program cannot directly obtain the identification information of the terminal from the terminal, the user of the terminal is required to input the identification information. After the client acquires the identification information input by the user, the identification information is verified through the application server. For example: the application server generates a verification code according to the identification information, then calls an interface provided by an operator and used for sending the short message, and sends the short message containing the verification code to the terminal through a Short Message Service Center (SMSC). The client sends the verification code input by the user according to the short message to the application server for verification, and after the verification is passed, the client can provide the service of the application program for the terminal and continue to perform the corresponding service flow.
However, in the above prior art, the operator needs to provide an interface for sending the short message to the application server, so that the application server can interface with the short message gateway device of the operator; in addition, an operator is also required to allocate an application identifier to the application server, and the application identifier needs to be configured in the short message gateway device of the operator, so that the dependency on the operator is enhanced, and the configuration and maintenance cost of the operator is increased.
Disclosure of Invention
The embodiment of the invention provides a method and a terminal for verifying identification information, which are used for reducing the dependency of a client corresponding to an application program on an operator and reducing the configuration and maintenance cost of the operator.
The embodiment of the invention provides a method for verifying identification information, which comprises the following steps:
a client on a terminal acquires identification information needing to be verified, which is input by a user of the terminal, wherein the identification information is used for identifying one terminal;
the client generates or acquires a verification code for verification from a server;
the client sends verification information to the terminal identified by the identification information through the terminal, wherein the verification information comprises the verification code;
and when the client receives the verification information through the terminal, verifying whether a verification code in the verification information is legal or not according to the verification code generated by the client or acquired from the server, and if the verification code is legal, successfully verifying the identification information.
An embodiment of the present invention further provides a terminal, including:
the client is used for acquiring identification information which is input by a user of the terminal and needs to be verified, the identification information is used for identifying one terminal, a verification code for verification is generated or acquired from a server, and verification information is sent to the terminal identified by the identification information through an information sending function system, wherein the verification information comprises the verification code; when the verification information is received, verifying whether a verification code in the verification information is legal or not according to the generated verification code or the verification code acquired from the server, and if the verification code is legal, successfully verifying the identification information;
and the information sending function system is used for sending verification information to the terminal identified by the identification information according to the indication of the client.
It can be known from the above technical solutions that, after the client on the terminal in the embodiment of the present invention obtains the identification information to be verified, which is input by the user of the terminal, the client generates or obtains the verification code for verification from the server, and sends the verification information to the terminal identified by the identification information through the terminal, when the client receives the verification information through the terminal, the client verifies whether the verification code in the verification information is legal according to the verification code generated by the client or obtained from the server, if the verification code is legal, the verification of the identification information is successful, the application server does not need to send the verification information to the terminal through an interface provided by the operator to the application server, which can avoid the problem that the operator allocates the application identifier to the application server and configures the application identifier in the information gateway device of the operator, thereby effectively reducing the dependency of the client corresponding to the operator, and meanwhile, the configuration and maintenance cost of an operator is also reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating a method for verifying identification information according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a method for verifying identification information according to another embodiment of the present invention;
fig. 3 is a schematic structural diagram of a terminal according to another embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal according to another embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal according to another embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: the terminal according to the embodiment of the present invention may include, but is not limited to, a mobile phone, a Personal Digital Assistant (PDA), a wireless handheld device, a wireless netbook, a Personal computer, a portable computer, an MP3 player, an MP4 player, and the like.
In a specific embodiment, there may be various applications provided for the user on the terminal, some applications provide services for the terminal user, and the application starts to work only after the current user provides correct terminal identification information for successful registration. Therefore, the terminal is provided with the client for verifying the identification information for each application, and the client can be respectively arranged on each application or integrally arranged to provide a verification function for each application in a unified manner, which is not described herein again.
Fig. 1 is a schematic flow chart of a method for verifying identification information according to an embodiment of the present invention, as shown in fig. 1, the method for verifying identification information according to the embodiment may include:
101. the client on the terminal acquires identification information which needs to be verified and is input by a user of the terminal, wherein the identification information is used for identifying one terminal.
The identification information may be any identification capable of identifying a terminal, including but not limited to a Mobile Subscriber Integrated Service digital network Number (MSISDN), a Session Initiation Protocol (SIP) address bound to the terminal, or an internet application registration identification, for example: an electronic mail address (email address), and the like.
102. The client generates or acquires a verification code for verification from the server.
Alternatively, the client may obtain authentication information from itself, where the authentication information is generated by the client according to the identification information.
Optionally, the client may further obtain authentication information from an application server, where the authentication information is generated by the application server according to the identification information sent by the client.
103. And the client sends verification information to the terminal identified by the identification information through the terminal, wherein the verification information comprises the verification code.
The transmission channel of the verification message may use any P2P communication method, including but not limited to Short Message Service (SMS), Multimedia Message Service (MMS), instant message, Email (Email), or internet application private information. Alternatively, the above-mentioned sending process may be a process that is not perceived by the user, and the client may refer to the authentication information as silent information at this time.
Specifically, the client may invoke an information sending function system of the terminal to send the verification information. For example: the client can call the information sending function system of the terminal, and send the acquired verification information to the terminal through the called information sending function system according to the identification information. That is, the client may communicate with the information gateway device of the operator through the existing terminal, for example: and the interfaces between a Short Message Service Center (SMSC), a Multimedia Message Service Center (MMSC), and a Service access gateway send the verification information. For example: the client may specifically send the verification information through a short message, multimedia information, instant information, Email (Email), or internet application private information, etc.
The authentication information has a specified format that the client can recognize. Since the authentication information and the normal message use the same transmission channel, the specified format is to be distinguished from the normal message. For example: "< application name > authentication: < authentication code > ", where < application name > is the name of the application itself; the < verification code > is a verification code generated by the application server or the client; "<", ">" are part of the message content and the authentication code requires encryption. Such as "MyAPPathendication: <123456789abcdefg > ". Of course, the specified format may be in other forms, such as including a special message field to indicate that the message is a verification message. So that the information received by the future client monitoring terminal is identified as the verification information according to the specified format.
104. And if the client receives the verification information through the terminal, verifying whether the verification code in the verification information is legal or not according to the verification code generated by the client or acquired from the server, and if the verification code is legal, successfully verifying the identification information.
Optionally, before 104, the client may monitor an information receiving function system of the terminal, and if the information conforming to the specified format is monitored, perform the verification processing in 104 using the information as the verification information.
Further, after the information reception function system receives the information, the information may be stored in the memory of the terminal. Optionally, the client may further delete the authentication information from the memory of the terminal, so that the terminal does not perceive the existence of the information and the information does not occupy the storage resource of the terminal.
Optionally, in 104, if the client verifies that the verification code in the verification information is consistent with the verification code generated by the client or acquired from the server, the verification code in the verification information is legal.
Optionally, in 104, if the client verifies that the verification code in the verification information and the verification code generated by the client or acquired from the server meet the requirement of association, the verification code in the verification information is legal. Wherein, meeting the requirement of relevance may be understood as that the verification code in the verification information and the verification code generated by the client or obtained from the server have a binding relationship, for example: the verification code generated by the client or obtained from the server is a user name of a user of the terminal in a certain application, and the verification code in the verification information may be identification information of the terminal. In this embodiment, the association relationship may be preferably maintained by an information storage system on the terminal: namely whether the identification information of the terminal has a binding relationship with the verification code. In addition, the association relationship may be maintained by the server.
Optionally, if the client does not receive the verification information through the terminal within a set time, the verification of the identification information fails; or, if the verification code in the verification information is found to be illegal in the verification process, the verification of the identification information fails.
In this way, only after the client in 104 verifies the verification code in the verification information, the application on the terminal can provide the service of the application program for the user, and continue to perform the corresponding service flow, for example: registration process, inquiry process or various entertainment applications, etc.
In this embodiment, after the client on the terminal obtains the identification information to be verified, which is input by the user of the terminal, the client generates or obtains the verification code for verification from the server, and sends the authentication information to the terminal identified by the identification information through the terminal, and when the client receives the authentication information through the terminal, verifying whether the verification code in the verification information is legal according to the verification code generated by the client or obtained from the server, if the identification information is legal, the identification information is successfully verified, the application server does not need to send verification information to the terminal through an interface provided by the operator to the application server, the operator can be prevented from distributing the application identification to the application server, and the problem of configuring the application identifier in the information gateway equipment of the operator effectively reduces the simplification of a communication service system and the saving of communication system resources in the process of providing the application service by the terminal.
In order to make the method provided by the embodiment of the present invention clearer, the identification information of the terminal is taken as the MSISDN (i.e. telephone number) of the mobile phone, and the verification information is taken as a short message as an example. Fig. 2 is a flowchart illustrating a method for verifying identification information according to another embodiment of the present invention, in this embodiment, a user registers through a client in a terminal, and the input terminal identification information is an MSISDN (i.e., a telephone number). As shown in fig. 2, the method for verifying identification information of this embodiment may include:
201. the client acquires the MSISDN of the terminal input by the user and the password initially set;
specifically, the user opens the registration page of the client, inputs MSISDN and Password (Password), and clicks the registration button. The client may then prompt the user that the MSISDN is being authenticated.
202. The client sends a request message to the application server to request the application server to acquire the verification code, wherein the request message comprises the MSISDN;
203. the application server generates a verification code according to a preset generation rule and an MSISDN;
it can be understood that: the authentication code generated by the application server needs to be globally unique. For example: the verification code at least comprises one item of English letters, numbers and underlines, cannot comprise special characters, and the maximum length cannot exceed 100 bytes so as to ensure that the verification code can be sent by a short message.
204. The application server sends the verification code to the client;
optionally, 202-204 is not executed, and the client generates the verification code by itself.
205. The client sends the short message to the terminal identified by the MSISDN through an interface used for sending the short message of the terminal, namely through an SMSC, wherein the short message comprises a verification code;
specifically, the format of the short message can be specified to be different from the general short message. For example, the short message format may include a verification identifier, and the short message format is "verification identifier: < authentication code > ", wherein the format of the authentication identification may be" < application name > authentication ". The < application name > is the name of the application program corresponding to the client, and can be no more than 10 bytes; the < authentication code > is an authentication code generated by an application server or a client. It should be noted that: "<", ">" are part of the content of the short message, and the verification code may be further encrypted, for example: "< MyAPP > authentication: <123456789abcdefg > ".
206. The client monitors the short message received by the terminal, and if the short message received by the terminal is in the specified format (for example, the short message contains a verification identifier), the client analyzes the short message to analyze a verification code contained in the message;
specifically, the client prompts the user that the registration fails if the short message containing the verification identifier received by the terminal is not monitored within a preset time after the client sends the short message to the terminal identified by the MSISDN through the interface of the terminal for sending the short message.
207. The client compares the verification codes obtained through 205-206 with the verification codes obtained from the application server through 204 or generated by the client, if the verification codes are consistent, the verification is passed, 208 is executed, otherwise, the verification is not passed, the user is prompted to register failure, and the registration process is ended;
208. after the verification is successful, the client sends a registration request message to the application server, wherein the registration request message comprises an MSISDN and a password;
209. the application server registers the terminal and returns successful registration information to the terminal.
In the embodiment, the client sends the acquired verification code to the terminal through the interface for sending the short message of the terminal where the client is located, and the application server does not need to send the verification code to the terminal through the interface provided by the operator to the application server, so that the problems that the operator distributes the application identifier to the application server and configures the application identifier in the information gateway equipment of the operator can be avoided, the dependency of the client corresponding to the application program on the operator is effectively reduced, and the configuration and maintenance cost of the operator is also reduced.
It should be noted that: while, for purposes of simplicity of explanation, the foregoing method embodiments have been described as a series of acts or combination of acts, it will be appreciated by those skilled in the art that the present invention is not limited by the illustrated ordering of acts, as some steps may occur in other orders or concurrently with other steps in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
Fig. 3 is a schematic structural diagram of a terminal according to another embodiment of the present invention, and as shown in fig. 3, the terminal according to this embodiment may include a client 31 and an information sending function system 32. The client 31 is configured to obtain identification information that needs to be verified and is input by a user of the terminal, where the identification information is used to identify a terminal, generate or obtain a verification code for verification from a server, and send verification information to the terminal identified by the identification information through an information sending function system 32, where the verification information includes the verification code, and when receiving the verification information, verify whether the verification code in the verification information is legal according to the verification code generated or obtained from the server, and if the verification code is legal, verify the identification information successfully; the information sending function system 32 is configured to send the authentication information to the terminal identified by the identification information acquired by the client terminal 31.
The identification information may include, but is not limited to, MSISDN, i.e. telephone number, internet application registration identifier bound to the terminal, or SIP address bound to the terminal, for example: an electronic mail address (email address), and the like.
The functions of the client in the embodiments corresponding to fig. 1 and fig. 2 may be implemented by the client 31 in the terminal provided in this embodiment.
Further, if the client 31 in this embodiment does not receive the authentication information within a set time, the authentication of the identification information fails.
Specifically, the client 31 in this embodiment may specifically invoke the information sending function system 32 to send the authentication information, where the authentication information has a specified format that can be recognized by the client.
Further, as shown in fig. 4, the terminal of the present embodiment may further include an information receiving function system 41 for receiving information sent to the terminal.
Further, the client 31 in this embodiment may further monitor the information receiving function system 41, and if information conforming to the specified format is monitored, perform the authentication processing on the information as the authentication information.
Further, as shown in fig. 5, the terminal provided in this embodiment may further include a memory 51 for storing the authentication information received by the information receiving function system 41; optionally, the client 31 may further delete the authentication information from the memory 51.
Specifically, the client 31 in this embodiment verifies whether the verification code in the verification information is legal according to the verification code generated or obtained from the server, specifically, if the verification code in the verification information is verified to be consistent with the verification code generated by the client or obtained from the server, the verification code in the verification information is legal; or, if it is verified that the verification code in the verification information and the verification code generated by the client or acquired from the server meet the association requirement, the verification code in the verification information is legal.
In this embodiment, after the client acquires the identification information to be verified input by the user of the terminal, the client generates or acquires the verification code for verification from the server, and sends the verification information to the terminal identified by the identification information through the information sending function system, if the client receives the verification information through the information receiving function system, verifying whether the verification code in the verification information is legal or not according to the verification code generated by the client or acquired from the server, if the identification information is legal, the identification information is successfully verified, the application server does not need to send verification information to the terminal through an interface provided by the operator to the application server, the operator can be prevented from distributing the application identification to the application server, and the problem of configuring the application identifier in the information gateway equipment of the operator is solved, so that the dependency of a client corresponding to the application program on the operator is effectively reduced, and the configuration and maintenance cost of the operator is reduced.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (15)

1. A method of verifying identification information, comprising:
a client on a terminal acquires identification information needing to be verified, which is input by a user of the terminal, wherein the identification information is used for identifying one terminal;
the client generates or acquires a verification code for verification from a server;
the client sends verification information to the terminal identified by the identification information through the terminal, wherein the verification information comprises the verification code;
and when the client receives the verification information through the terminal, verifying whether a verification code in the verification information is legal or not according to the verification code generated by the client or acquired from the server, and if the verification code is legal, successfully verifying the identification information.
2. The method of claim 1, further comprising:
if the client side does not receive the verification information through the terminal within the set time, the identification information verification fails; or,
and in the step that the client verifies whether the verification code in the verification information is legal or not according to the verification code generated by the client or acquired from the server, if the verification code is illegal, the identification information verification fails.
3. The method of claim 1, wherein the sending, by the client, authentication information to the terminal identified by the identification information via the terminal comprises:
and the client calls an information sending function system of the terminal to send the verification information, wherein the verification information has a specified format which can be identified by the client.
4. The method of claim 1, further comprising:
and the client monitors an information receiving function system of the terminal, and if the information conforming to the specified format is monitored, the information is used as the verification information to carry out verification processing.
5. The method according to claim 4, wherein the client monitors an information receiving function system of the terminal, and if information conforming to the specified format is monitored, after performing the verification processing on the information as the verification information, the method further comprises:
and the client deletes the verification information from the memory of the terminal.
6. The method according to claim 1, wherein the client verifies whether the verification code in the verification information is legal according to the verification code generated by the client or obtained from the server, including:
if the client verifies that the verification code in the verification information is consistent with the verification code generated by the client or acquired from the server, the verification code in the verification information is legal; or,
and if the client verifies that the verification code in the verification information and the verification code generated by the client or acquired from the server meet the association requirement, the verification code in the verification information is legal.
7. The method according to any of claims 1 to 6, wherein the identification information is the MSISDN of the terminal, an Internet application registration identifier bound to the terminal, or an SIP address bound to the terminal.
8. The method according to any of claims 1 to 6, wherein the authentication information is silence information.
9. The method according to any one of claims 1 to 6, wherein the verification information is a short message, a multimedia message, an instant message, an email, or an internet application private message.
10. A terminal, comprising:
the client is used for acquiring identification information which is input by a user of the terminal and needs to be verified, the identification information is used for identifying one terminal, a verification code for verification is generated or acquired from a server, and verification information is sent to the terminal identified by the identification information through an information sending function system, wherein the verification information comprises the verification code; when the verification information is received, verifying whether a verification code in the verification information is legal or not according to the generated verification code or the verification code acquired from the server, and if the verification code is legal, successfully verifying the identification information;
and the information sending function system is used for sending verification information to the terminal identified by the identification information according to the indication of the client.
11. The terminal of claim 10, wherein the client is further configured to
And if the verification information is not received within the set time, the identification information fails to verify.
12. The terminal according to claim 10, wherein the authentication information has a specified format that can be recognized by the client.
13. The terminal of claim 12, further comprising an information receiving function system for receiving information transmitted to the terminal;
the client is also used for monitoring the information receiving function system, and if the information conforming to the specified format is monitored, the information is used as the verification information to carry out verification processing.
14. The terminal of claim 10,
the terminal also comprises a memory used for storing the verification information;
the client is also used for deleting the verification information from the memory.
15. The terminal according to any of claims 10 to 14, wherein the client is specifically configured to
When the verification code in the verification information is verified to be consistent with the verification code generated by the client or acquired from the server, the verification code in the verification information is legal; or,
and when the verification code in the verification information and the verification code generated by the client or acquired from the server are verified to meet the association requirement, the verification code in the verification information is legal.
CN201110193020.1A 2011-07-11 2011-07-11 Method for validating identification information and terminal thereof Expired - Fee Related CN102231746B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201110193020.1A CN102231746B (en) 2011-07-11 2011-07-11 Method for validating identification information and terminal thereof
PCT/CN2012/072290 WO2012149840A1 (en) 2011-07-11 2012-03-14 Method and terminal for verifying identification information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110193020.1A CN102231746B (en) 2011-07-11 2011-07-11 Method for validating identification information and terminal thereof

Publications (2)

Publication Number Publication Date
CN102231746A true CN102231746A (en) 2011-11-02
CN102231746B CN102231746B (en) 2014-03-12

Family

ID=44844279

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110193020.1A Expired - Fee Related CN102231746B (en) 2011-07-11 2011-07-11 Method for validating identification information and terminal thereof

Country Status (2)

Country Link
CN (1) CN102231746B (en)
WO (1) WO2012149840A1 (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012149840A1 (en) * 2011-07-11 2012-11-08 华为技术有限公司 Method and terminal for verifying identification information
CN102791024A (en) * 2012-06-25 2012-11-21 华为软件技术有限公司 Registering method and client device
CN103139733A (en) * 2011-11-25 2013-06-05 中国移动通信集团公司 System and method for pulling up off-line application programs through short messages
CN103685249A (en) * 2013-12-03 2014-03-26 华为技术有限公司 Method for application registration, terminals and server
WO2014161259A1 (en) * 2013-07-26 2014-10-09 中兴通讯股份有限公司 Verification code processing method, device, terminal and server
CN104182660A (en) * 2013-05-22 2014-12-03 北大方正集团有限公司 User equipment identification management method and system for digital right management
CN104426904A (en) * 2013-09-08 2015-03-18 王正伟 Automatic login method
CN104468486A (en) * 2013-09-23 2015-03-25 联想(北京)有限公司 Information processing method and system and electronic device
CN104618315A (en) * 2013-12-30 2015-05-13 腾讯科技(深圳)有限公司 Method, device and system for verification information push, and method, device and system for information verification
CN105072080A (en) * 2015-07-01 2015-11-18 赛肯(北京)科技有限公司 Information verification method, device and system
CN105207777A (en) * 2014-06-30 2015-12-30 腾讯科技(深圳)有限公司 Network information verification method and apparatus
CN105376770A (en) * 2014-08-29 2016-03-02 电信科学技术研究院 Signal sending method, detection method, and related equipment
CN105744520A (en) * 2016-03-30 2016-07-06 华为技术有限公司 Application service provisioning verification methods, apparatuses and system
CN105847288A (en) * 2016-05-16 2016-08-10 珠海市魅族科技有限公司 Verification code processing method and device
CN106301787A (en) * 2016-08-14 2017-01-04 汪念鸿 A kind of by the method for time authentication code
WO2017071207A1 (en) * 2015-10-26 2017-05-04 宇龙计算机通信科技(深圳)有限公司 Application installation method, corresponding apparatus, and application installation system
CN106921552A (en) * 2015-12-25 2017-07-04 航天信息股份有限公司 Terminal, gateway and tunnel multiplex system
CN107222861A (en) * 2017-05-19 2017-09-29 珠海市魅族科技有限公司 Auth method, authentication means, terminal and non-volatile memory medium
CN107231236A (en) * 2017-04-17 2017-10-03 韩凤龙 A kind of data processing method, device and electronic equipment based on succession checking
CN107733891A (en) * 2017-10-17 2018-02-23 深圳市金立通信设备有限公司 A kind of user registering method, server and computer-readable recording medium
CN107786569A (en) * 2017-11-06 2018-03-09 维沃移动通信有限公司 A kind of identifying code sending method, method of reseptance and relevant device
CN107979467A (en) * 2016-10-21 2018-05-01 中国移动通信有限公司研究院 Verification method and device
WO2018219056A1 (en) * 2017-05-27 2018-12-06 华为技术有限公司 Authentication method, device, system and storage medium
CN109120588A (en) * 2018-06-29 2019-01-01 华为技术有限公司 Obtain method and the data center of verification information
CN112214751A (en) * 2019-07-11 2021-01-12 上海游昆信息技术有限公司 Verification code generation method and device
US11373181B2 (en) 2013-12-30 2022-06-28 Tencent Technology (Shenzhen) Company Limited System and method for verifying identity information using a social networking application

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104735028B (en) * 2013-12-19 2018-02-23 中国移动通信集团辽宁有限公司 A kind of website authenticity identification method, system, device and mobile device
CN110650447B (en) * 2019-10-09 2022-02-18 中国联合网络通信集团有限公司 Short message access management method and system, terminal and operator server

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101521886A (en) * 2009-01-21 2009-09-02 北京握奇数据系统有限公司 Method and device for authenticating terminal and telecommunication smart card
CN101656933A (en) * 2009-09-16 2010-02-24 中兴通讯股份有限公司 Method, device and system in group system for positioning by short message
CN101834834A (en) * 2009-03-09 2010-09-15 华为软件技术有限公司 Authentication method, device and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056196A (en) * 2006-04-12 2007-10-17 腾讯科技(深圳)有限公司 Secure login method, client and its server
CN101242404B (en) * 2007-02-08 2011-05-25 联想(北京)有限公司 A validation method and system based on heterogeneous network
CN102231746B (en) * 2011-07-11 2014-03-12 华为技术有限公司 Method for validating identification information and terminal thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101521886A (en) * 2009-01-21 2009-09-02 北京握奇数据系统有限公司 Method and device for authenticating terminal and telecommunication smart card
CN101834834A (en) * 2009-03-09 2010-09-15 华为软件技术有限公司 Authentication method, device and system
CN101656933A (en) * 2009-09-16 2010-02-24 中兴通讯股份有限公司 Method, device and system in group system for positioning by short message

Cited By (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012149840A1 (en) * 2011-07-11 2012-11-08 华为技术有限公司 Method and terminal for verifying identification information
CN103139733B (en) * 2011-11-25 2015-12-09 中国移动通信集团公司 By the System and method for of note pull-up off-line application program
CN103139733A (en) * 2011-11-25 2013-06-05 中国移动通信集团公司 System and method for pulling up off-line application programs through short messages
CN102791024A (en) * 2012-06-25 2012-11-21 华为软件技术有限公司 Registering method and client device
CN104182660A (en) * 2013-05-22 2014-12-03 北大方正集团有限公司 User equipment identification management method and system for digital right management
CN104182660B (en) * 2013-05-22 2017-03-29 北大方正集团有限公司 For the customer equipment identification management method and system of digital copyright protecting
WO2014161259A1 (en) * 2013-07-26 2014-10-09 中兴通讯股份有限公司 Verification code processing method, device, terminal and server
CN104426904A (en) * 2013-09-08 2015-03-18 王正伟 Automatic login method
CN104468486B (en) * 2013-09-23 2019-01-15 联想(北京)有限公司 Information processing method, system and electronic equipment
CN104468486A (en) * 2013-09-23 2015-03-25 联想(北京)有限公司 Information processing method and system and electronic device
CN103685249B (en) * 2013-12-03 2016-10-05 华为技术有限公司 A kind of register the method for application, terminal and server
CN103685249A (en) * 2013-12-03 2014-03-26 华为技术有限公司 Method for application registration, terminals and server
CN104618315A (en) * 2013-12-30 2015-05-13 腾讯科技(深圳)有限公司 Method, device and system for verification information push, and method, device and system for information verification
US11373181B2 (en) 2013-12-30 2022-06-28 Tencent Technology (Shenzhen) Company Limited System and method for verifying identity information using a social networking application
CN104618315B (en) * 2013-12-30 2019-02-15 腾讯科技(深圳)有限公司 A kind of method, apparatus and system of verification information push and Information Authentication
CN105207777B (en) * 2014-06-30 2019-09-20 腾讯科技(深圳)有限公司 The method and apparatus of network information verifying
CN105207777A (en) * 2014-06-30 2015-12-30 腾讯科技(深圳)有限公司 Network information verification method and apparatus
CN105376770B (en) * 2014-08-29 2018-12-21 电信科学技术研究院 A kind of signaling method, detection method and relevant device
CN105376770A (en) * 2014-08-29 2016-03-02 电信科学技术研究院 Signal sending method, detection method, and related equipment
CN105072080A (en) * 2015-07-01 2015-11-18 赛肯(北京)科技有限公司 Information verification method, device and system
CN105072080B (en) * 2015-07-01 2018-04-13 广州密码科技有限公司 A kind of Information Authentication method, apparatus and system
WO2017071207A1 (en) * 2015-10-26 2017-05-04 宇龙计算机通信科技(深圳)有限公司 Application installation method, corresponding apparatus, and application installation system
CN106921552A (en) * 2015-12-25 2017-07-04 航天信息股份有限公司 Terminal, gateway and tunnel multiplex system
CN105744520B (en) * 2016-03-30 2019-12-24 华为技术有限公司 Method, device and system for issuing and verifying application service
CN105744520A (en) * 2016-03-30 2016-07-06 华为技术有限公司 Application service provisioning verification methods, apparatuses and system
CN105847288B (en) * 2016-05-16 2019-09-27 珠海市魅族科技有限公司 A kind of identifying code treating method and apparatus
CN105847288A (en) * 2016-05-16 2016-08-10 珠海市魅族科技有限公司 Verification code processing method and device
CN106301787B (en) * 2016-08-14 2019-03-22 汪念鸿 A method of with time authentication code
CN106301787A (en) * 2016-08-14 2017-01-04 汪念鸿 A kind of by the method for time authentication code
CN107979467A (en) * 2016-10-21 2018-05-01 中国移动通信有限公司研究院 Verification method and device
CN107979467B (en) * 2016-10-21 2020-07-21 中国移动通信有限公司研究院 Verification method and device
CN107231236B (en) * 2017-04-17 2021-08-31 韩凤龙 Data processing method and device based on inheritance verification and electronic equipment
CN107231236A (en) * 2017-04-17 2017-10-03 韩凤龙 A kind of data processing method, device and electronic equipment based on succession checking
CN107222861A (en) * 2017-05-19 2017-09-29 珠海市魅族科技有限公司 Auth method, authentication means, terminal and non-volatile memory medium
CN107222861B (en) * 2017-05-19 2020-10-09 珠海市魅族科技有限公司 Identity authentication method, identity authentication device, terminal and nonvolatile storage medium
CN108964885A (en) * 2017-05-27 2018-12-07 华为技术有限公司 Method for authenticating, device, system and storage medium
WO2018219056A1 (en) * 2017-05-27 2018-12-06 华为技术有限公司 Authentication method, device, system and storage medium
US11336631B2 (en) 2017-05-27 2022-05-17 Huawei Technologies Co., Ltd. Authorization method
CN107733891A (en) * 2017-10-17 2018-02-23 深圳市金立通信设备有限公司 A kind of user registering method, server and computer-readable recording medium
CN107786569A (en) * 2017-11-06 2018-03-09 维沃移动通信有限公司 A kind of identifying code sending method, method of reseptance and relevant device
CN109120588B (en) * 2018-06-29 2021-04-09 华为技术有限公司 Method for acquiring verification information and data center
CN109120588A (en) * 2018-06-29 2019-01-01 华为技术有限公司 Obtain method and the data center of verification information
CN112214751A (en) * 2019-07-11 2021-01-12 上海游昆信息技术有限公司 Verification code generation method and device

Also Published As

Publication number Publication date
WO2012149840A1 (en) 2012-11-08
CN102231746B (en) 2014-03-12

Similar Documents

Publication Publication Date Title
CN102231746B (en) Method for validating identification information and terminal thereof
CN105592065B (en) A kind of Website logging method and its login system based on SMS
KR101488268B1 (en) Push message service system and method thereof
US20170161721A1 (en) Method and system for opening account based on euicc
CN107249004B (en) Identity authentication method, device and client
CN106209726B (en) Mobile application single sign-on method and device
US20150180870A1 (en) Authorization Authentication Method And Apparatus
CN102088691B (en) Mobile phone mobile Internet user application certification recognition system and method
CN112188493B (en) Authentication method, system and related equipment
CN107241336B (en) Identity verification method and device
CN104168557A (en) Upgrading method for operating systems and upgrading device for operating systems
CN105142139A (en) Method and device for obtaining verification information
CN106713315B (en) Login method and device of plug-in application program
CN113132977A (en) Network distribution method, network distribution system and computer readable storage medium
US20150180851A1 (en) Method, device, and system for registering terminal application
CN109558710B (en) User login method, device, system and storage medium
CN105577606B (en) A kind of method and apparatus for realizing authenticator registration
CN108574658B (en) Application login method and device
EP3079329B1 (en) Terminal application registration method, device and system
KR20140090279A (en) Service security authentication method and web application server therof
CN110650014B (en) Signature authentication method, system, equipment and storage medium based on hessian protocol
CN106685914B (en) Information verification method, server and client
KR102422719B1 (en) Method of user authentication uisng usim information and device for user authentication performing the same
CN104184804A (en) Cloud storage system and system and method for downloading/providing data from cloud storage system
CN114584971A (en) Account registration method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20170714

Address after: 510640 Guangdong City, Tianhe District Province, No. five, road, public education building, unit 371-1, unit 2401

Patentee after: Guangdong Gaohang Intellectual Property Operation Co., Ltd.

Address before: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen

Patentee before: Huawei Technologies Co., Ltd.

CB03 Change of inventor or designer information

Inventor after: Hao Lei

Inventor before: Zhang Fengming

Inventor before: Zhang Fan

CB03 Change of inventor or designer information
TR01 Transfer of patent right

Effective date of registration: 20170904

Address after: 252300 No. 2 West Han Bei Road, Yanggu County, Liaocheng City, Shandong Province

Patentee after: Hao Lei

Address before: 510640 Guangdong City, Tianhe District Province, No. five, road, public education building, unit 371-1, unit 2401

Patentee before: Guangdong Gaohang Intellectual Property Operation Co., Ltd.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140312

Termination date: 20180711

CF01 Termination of patent right due to non-payment of annual fee