CN103368831B - A kind of anonymous instant communicating system identified based on frequent visitor - Google Patents

A kind of anonymous instant communicating system identified based on frequent visitor Download PDF

Info

Publication number
CN103368831B
CN103368831B CN201310342575.7A CN201310342575A CN103368831B CN 103368831 B CN103368831 B CN 103368831B CN 201310342575 A CN201310342575 A CN 201310342575A CN 103368831 B CN103368831 B CN 103368831B
Authority
CN
China
Prior art keywords
anonymous
step
temporarily
string
field
Prior art date
Application number
CN201310342575.7A
Other languages
Chinese (zh)
Other versions
CN103368831A (en
Inventor
沈剑
朱为
陈东
Original Assignee
五八同城信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 五八同城信息技术有限公司 filed Critical 五八同城信息技术有限公司
Priority to CN201310342575.7A priority Critical patent/CN103368831B/en
Publication of CN103368831A publication Critical patent/CN103368831A/en
Application granted granted Critical
Publication of CN103368831B publication Critical patent/CN103368831B/en

Links

Abstract

The invention provides a kind of anonymous instant communication method identified based on frequent visitor, comprise the steps: a) to receive the Anonymous communication request that client sends;B) with the Anonymous communication of user, checking asks whether the identity characteristic string sent is empty, if empty string, then enters step c);If not empty string, then this identity characteristic string being verified, if being verified, then entering step e);If checking is not passed through, then enter step c);C) it is this client application anonymous UID;D) anonymous Identity feature string is generated according to the anonymous UID generated;E) the identity characteristic string generated is returned to client;F) communication of client is opened.The instant communication method that support user anonymity according to the present invention logs in, can support frequent visitor's method thus remember user, it is possible to preserve history message to facilitate user to check from now on, convenient uses instant communicating system in a flexible way in user.

Description

A kind of anonymous instant communicating system identified based on frequent visitor

Technical field

The present invention relates to instant messaging field, particularly to a kind of anonymous instant communicating system identified based on frequent visitor and the means of communication.

Background technology

Instant messaging (Instant Messenger is called for short IM), is a kind of instant business exchanging message based on internet.Instant messaging allows two people or many people to use the instant transmission message language in networking, archives, voice to exchange with video.Due to its instantaneity, bring great convenience for communication two party.The special MSN that traditional instant communicating system is installed on computer terminals by user carries out communication.At present, as the convenient communication tool of one, instant communicating system gradually extends to mobile terminal from PC, such as mobile phone, panel computer etc..Another development trend is webpage version immediate communication tool, instant messaging service provider is in the middle of IM Integration ofTechnology to community, forum and generic web page, realize immediately exchanging when user browses web sites, not only facilitate user without downloading and installing software, the liveness of site visitor, website user's viscosity and the conversion ratio of visitor can also be improved, be commonly applied to the real-time communication of both parties in a lot of e-commerce website.

Existing instant communicating system requires that user registers an account number, or is associated with in native system in the most chartered account number in other websites by user, and does not the most support that user logs in anonymous way.It addition, existing instant communicating system does not the most support implicit login.Even if there being some system supports user only to log in anonymous way without registration, it does not the most support anonymous deferred information, i.e. user sign-on access once after, when next time carries out instant messaging with same target again, the identity of the other side this user of None-identified, user still needs to restart a new anonymous login, the most loaded down with trivial details.

In some occasion, such as in e-commerce transaction, user may the most undesirably register account number for the purpose of the immediate communication tool not frequently using the offer of this website.Or, user bothers in order to avoid advertisement from now on when transaction, is unwilling to allow others know the true account number of oneself.It addition, one instant messaging account number of registration typically at least needs the time of 5 minutes, a lot of users dislike the loaded down with trivial details registration account number of being also unwilling of process.Particularly under some transaction occasion, seller is the most always on, and user wishes promptly engage in the dialogue with seller when seller is online seeing, and avoids the chance missing communication caused due to loaded down with trivial details registration process.But, although these users are not intended to register account number, but still it is intended to use instant communication function in the way of anonymous, such as, exchanges in real time with seller.

Therefore, need a kind of method that can allow user anonymity log-in instant communication system and communication system, the existing instant communicating system not supporting anonymous login can be effectively improved, and frequent visitor's method can be supported thus remember user, history message can be preserved to facilitate user to check from now on, embody the instantaneity of instant messaging, convenient use instant communicating system in a flexible way in user.

Summary of the invention

It is an object of the invention to provide a kind of anonymous instant communication method identified based on frequent visitor, comprise the steps: a) to receive the Anonymous communication request that client sends;B) with the Anonymous communication of user, checking asks whether the identity characteristic string sent is empty, if empty string, then enters step c);If not empty string, then this identity characteristic string being verified, if being verified, then entering step e);If checking is not passed through, then enter step c);C) it is this client application anonymous UID;D) anonymous Identity feature string is generated according to the anonymous UID generated;E) the identity characteristic string generated is returned to client;F) communication of client is opened.

Preferably, when the identity characteristic string that user in step b) sends is verified, marking this user is frequent visitor, it is allowed to user checks history message.

Preferably, described history message is saved in client this locality or server end.

Preferably, the method generating described anonymous Identity feature string in described step d) comprises the steps: step d1): anonymous UID and time parameter and a random number are spliced, generates first and buffer field temporarily;Step d2): buffering field by first temporarily and carry out data shuffling, second after being shuffled buffers field temporarily;Step d3): buffer field by generate second temporarily and sign, generate the 3rd and buffer field temporarily;Step d4): the buffering field temporarily of the 3rd after signature is carried out data shuffling, obtains the 4th and buffer field temporarily;Step d5): by the generate the 4th temporarily buffering field and step d2) generate second utilize key to be encrypted after buffering field is spliced into new character string temporarily, generate described anonymous Identity feature string.

Preferably, described step d2) the data shuffling algorithm and step d4 that are used) in shuffle arithmetic be different algorithms.

Preferably, described step b) being verified, the method for described anonymous Identity feature string comprises the steps: step b1): described identity characteristic string is deciphered, then splits generation second buffering field and the 4th temporarily and buffer field temporarily;Step b2): buffer field by the generate the 4th temporarily and carry out inverse mixed washing, obtain the 3rd and buffer field temporarily;Step b3): buffer field by generate second temporarily and carry out inverse mixed washing, generate first and buffer field temporarily;Step b4): buffer field by first temporarily and split, obtain user anonymity UID, time parameter and a random number;Step b5): second generated temporarily buffering field is signed, with step b2) obtain the 3rd temporarily buffering field compare, if difference, not verified;If identical, then verify whether described time parameter meets term of validity requirement, if meeting, by checking, if not meeting, not verified.

Preferably, the term of validity that described time parameter is corresponding is by server system sets itself.

Preferably, described identity characteristic string is saved in described client in this locality, in order to the most again initiate to be sent to server authentication during communication.

Preferably, described client is the web browser of PC terminal, client software or mobile phone terminal app.

Preferably, described communication request is to initiate instant dialogue or send deferred information.

The instant communication method that support user anonymity according to the present invention logs in, the existing instant communicating system not supporting anonymous login can be effectively improved, and frequent visitor's method can be supported thus remember user, history message can be preserved to facilitate user to check from now on, convenient use instant communicating system in a flexible way in user.

Should be appreciated that aforementioned description substantially is exemplary illustration and explanation with follow-up detailed description, the restriction of content claimed to the present invention should not be used as.

Accompanying drawing explanation

With reference to the accompanying drawing enclosed, the more purpose of the present invention, function and advantage will be illustrated by the described below of embodiment of the present invention, wherein:

Fig. 1 schematically shows the flow chart of the Anonymous communication method according to the present invention;

Fig. 2 schematically shows the flow chart of the method generating anonymous Identity feature string according to the present invention;

Fig. 3 schematically shows the flow chart of the method for the checking identity characteristic string according to the present invention.

Hereinafter, embodiments of the invention will be described with reference to the drawings.In the accompanying drawings, identical reference represents same or similar parts, or same or similar step.

Detailed description of the invention

By with reference to one exemplary embodiment, the purpose of the present invention and function and will be illustrated for realizing the method for these purposes and function.But, the present invention is not limited to one exemplary embodiment disclosed below;By multi-form, it can be realized.The essence of specification is only the detail helping the various equivalent modifications Integrated Understanding present invention.

The inventive method is summarized

Fig. 1 schematically shows the flow chart of the Anonymous communication method according to the present invention.As shown in Fig. 1, in step 105, server system receives the Anonymous communication request that user is sent by client.According to the present invention, client can be the web browser of PC terminal, and user initiates anonymous login by the website that access server system provides to be asked, such as the respective links in webpage clicking.Client can also be client software or the form of mobile phone terminal app of PC terminal.In use, user can directly open communication function without filling out user name password.Communication request can be such as to initiate instant dialogue, transmission deferred information etc..

Server system is after receiving the Anonymous communication request that client is sent, and in step 110, verifies and asks whether the identity characteristic string sent is empty with the Anonymous communication of user.Identity characteristic string to anonymous, is used for identifying the feature string of anonymous identity information by server-assignment.

When user is to initiate Anonymous communication request for the first time, identity characteristic string the most not distributed to client due to server, therefore the identity characteristic string that client is sent to server is empty string, step 120 is entered when being judged as empty string, server system is this client application anonymous ID(User-ID, it is called for short UID), concrete generating algorithm will be explained below.Then in step 130, generating anonymous Identity feature string according to the UID generated, concrete generating algorithm will be explained below.Then in step 135, the identity characteristic string generated is returned to client, in client, this identity characteristic string is saved in this locality, in case the most again initiating to use during communication.Then, step 140 is entered.

If verifying in step 110 asks the identity characteristic string sent not for empty with the Anonymous communication of user, then explanation user is not to initiate Anonymous communication request for the first time, then the identity characteristic string that client is sent by entrance step 115 is verified.The process of checking is specific as follows: in step 125, identity characteristic string being carried out reverse resolution, carry out legitimate verification, concrete verification algorithm will be explained below.If finding, identity characteristic string is illegal, the such as size error of discovery identity characteristic string, signature mistake or time are expired etc., i.e. cannot be by checking, then this identity characteristic string cannot use, now return to step 120, this user is considered as a new anonymous, repeated as described above carries out step 120-135;If checking finds that identity characteristic string is legal in step 125, then this identity characteristic string is identified as frequent visitor by server system, and subsequently into step 135, identity characteristic string client sent is directly returned to client and is saved in this locality, then carries out step 140.

If verifying in step 125, identity characteristic string is legal, and i.e. identifying this client is frequent visitor, then this user can also look at the history message being saved in this locality.Owing to the physical support (such as PC, panel computer etc.) of the anonymous UID generated according to the present invention and client is bound by identity characteristic string, therefore when frequent visitor uses same physical support again to send communication request, then can check the history message being saved in this physical support, facilitate the communication process of user.Alternatively, history message can also presence service end, now need the anonymous UID of user to go server end to pull history message.The security of the most locally stored history message can be higher.

In step 140, user begins through client and carries out communication.Such as, open chat conversations frame in client and start session.The method of the Anonymous communication according to the present invention, client will not be similar to " logining successfully " message of conventional Registration user to user's prompting, and i.e. " implicit login " process is transparent to user.The process that this ensures that, anonymous login will not be solved by user is counter, improves the security of the means of communication of the present invention.

The generation method of anonymous UID

In the step 120 server system be the anonymous UID of this client application management in server system be similar with the personal code work of common normal registration, it is all user's mark in server system.In order to distinguish, anonymous UID and the UID of normal registration user can be assigned in different sections in same memory space, or the same section that distribution is in same memory space, and uses different allocation rule.Such as, if the distribution different sections in same memory space, then can set the name scope of domestic consumer UID as the name scope of 0-20 hundred million, anonymous UID is 3,000,000,000-40 hundred million.The most such as, if using different rules that anonymous UID and normal registration user UID is managed, the mantissa UID as odd number can be distributed by registering user, and anonymous is distributed the UID that mantissa is even number.

The anonymous be designated anonymous UID, this UID in server system is transparent to user, i.e. user can't see this UID during using anonymous UID communication.Anonymous account number is the account number character string identification based on anonymous UID of a terminaloriented user, can generate by the algorithm in addition modification generally registering user and generating UID.Such as, anonymous account number can use following character string forms, i.e.

Anonymous account number=" anonymous "+UID

Wherein " anonymous " can be mark anonymous certain character string, such as anonymous, UID be system be this anonymous generate unique code.The most such as, anonymous account number can be the form of " anonymous_53924 ".As long as the ID of this character string latter half is unique, the anonymous UID of generation is also unique.Compare UID, the form user oriented of account number, the most friendly, and by adding string prefix so that it is readable more preferable, and uniquely.

The generation method of anonymous Identity feature string

The anonymous Identity feature string generated according to anonymous UID in step 130 is the character string of mark anonymous identity.The generation of anonymous Identity feature string must assure that its security and can anti-counterfeiting and anti-tamper.Preferably, it is also possible to the identity characteristic string generated is set certain term of validity, thus also serves as the term of validity verifying the option that identity characteristic string is the most legal.

As in figure 2 it is shown, the algorithm generating anonymous Identity feature string according to the present invention is as follows:

Step 201): anonymity UID is spliced, generates first and buffer field buf1 temporarily.Anonymous UID can be stitched together with the random number that time parameter and system generate, i.e.

buf1=uid(8bytes)+time(4bytes)+random(4bytes)

Time parameter identifies this identity characteristic string, namely the term of validity of this anonymity UID, can be by server system sets itself, such as 1 month.

A specific embodiment according to the present invention, anonymous UID can be 8 bytes, and time parameter can be 4 bytes, and the random number that system generates can be 4 bytes, and result is spliced into the first interim buffering field buf1 of 16 bytes.

Step 202): by step 201) generate first temporarily buffering field buf1 carry out data shuffling, i.e. data and upset, buffering field buf2 temporarily of second after being shuffled.The purpose of shuffling method is to upset the order of character string, such as, odd bytes can be used to shuffle with the mode that even bytes exchanges, it would however also be possible to employ first byte exchanged with trail byte, the second byte is exchanged with byte second from the bottom, by that analogy etc..

Step 203): by step 202) generate second temporarily buffering field buf2 sign, generate the 3rd buffering field buf3 temporarily.The effect of signature is to allow buf2 information " be compressed " form becoming a kind of secrecy, such as, the byte serial of a random length is transformed into the hexadecimal number word string of a fixed length.Signature algorithm commonly used in the art, such as md5 algorithm can be used.

Step 204): will after signature the 3rd temporarily buffering field buf3 again carry out data shuffling, the data shuffling algorithm used can be with step 202) in algorithm consistent or inconsistent.In order to improve the security of identity characteristic string, it is preferred to use different shuffle arithmetic.Generate the 4th after shuffling and buffer field buf4 temporarily.

Step 205): the 4th generated after shuffling temporarily buffering field buf4 and step 202) generate second temporarily buffering field buf2 utilize key to be encrypted after being spliced into new character string, generate final anonymous Identity feature string.Encryption can use AES commonly used in the art, such as AES.For security, by key storage at server end, and will not be at transfers on network to client, it is ensured that client counter cannot solve identity characteristic string.

The process generating identity characteristic string according to algorithm above is carried out at server end, and owing to employing AES, as long as AES is not cracked, identity characteristic string just may be considered safe, and its security is equal to the safety of AES.Further, since the various signatures used and shuffle arithmetic are all carried out at server end, therefore these algorithms are all transparent to client, therefore identity characteristic string cannot be forged.Therefore the identity characteristic string generated possesses the highest security, ageing, and can anti-counterfeiting and anti-tamper.

The verification method of anonymous Identity feature string

In the step 115 of Fig. 1, if the identity characteristic string that client is sent is not for empty, then needing that client is sent identity characteristic string verifies, as it is shown on figure 3, the step of checking is specific as follows:

Step 301): the identity characteristic string sent employing key is decrypted, then the character string fractionation after deciphering is obtained the second interim buffering field buf2 and the 4th buffering field buf4 temporarily.The key of deciphering uses the decipherment algorithm corresponding with AES when generating identity characteristic string with decipherment algorithm.

Step 302): the 4th generated interim buffering field buf4 is used inverse shuffle arithmetic, obtains the 3rd and buffer field buf3 temporarily.The inverse shuffle arithmetic used is and above-mentioned steps 204) in the corresponding algorithm for inversion of shuffle arithmetic, i.e. the recovery to the process of shuffling.

Step 303): second generated interim buffering field buf2 is used inverse shuffle arithmetic, obtains first and buffer field buf1 temporarily.The inverse shuffle arithmetic used is and above-mentioned steps 202) in the corresponding algorithm for inversion of shuffle arithmetic, i.e. the recovery to the process of shuffling.

Step 304): buffer field buf1 by obtain first temporarily and split, obtain user anonymity UID, time parameter time and a random number.

Step 305) step 301 is generated second temporarily buffering field buf2 sign, the algorithm of signature is consistent with the signature algorithm in above-mentioned steps 203.Will after signature second buffering field buf2 and step 302 generate temporarily the 3rd buffer temporarily field buf3 compare see the most identical.If identical, then by checking, enter step 306) continue the checking term of validity;If it is different, then explanation identity characteristic string may be distorted by user, then it is assumed that this client is a new anonymous, enters step 307) regenerate anonymous UID, checking terminates.

Step 306) judge whether time crosses the term of validity.If not less than the term of validity, then being verified of this identity characteristic string, it is allowed to user initiates communication with the identity of anonymous frequent visitor;If alreading more than the term of validity, then it is assumed that this client is a new anonymous, enter step 307) regenerate anonymous UID, checking terminates.

It it is to carry out at server end according to above-mentioned verification algorithm, it is ensured that the security of checking.Verifying the term of validity additionally, due to needs, thus ensure that the ageing of identity characteristic string, once identity characteristic string is expired, can find at once during checking.

The instant communication method that support user anonymity according to the present invention logs in, the existing instant communicating system not supporting anonymous login can be effectively improved, and frequent visitor's method can be supported thus remember user, history message can be preserved to facilitate user to check from now on, convenient use instant communicating system in a flexible way in user.

In conjunction with explanation and the practice of the present invention disclosed here, other embodiments of the present invention are all easy to for those skilled in the art to expect and understand.Illustrating and embodiment is to be considered only as exemplary, true scope and the purport of the present invention are all defined in the claims.

Claims (9)

1. the anonymous instant communication method identified based on frequent visitor, comprises the steps:
A) the Anonymous communication request that client sends is received;
B) with the Anonymous communication of user, checking asks whether the identity characteristic string sent is empty, if It is empty string, then enters step c);If not empty string, then this identity characteristic string is verified, if It is verified, then enters step e);If checking is not passed through, then enter step c);
C) it is this client application anonymous UID;
D) generating anonymous Identity feature string according to the anonymous UID generated, step is as follows:
Step d1): anonymous UID and time parameter and a random number are spliced, raw Become first to buffer field temporarily;
Step d2): buffering field by first temporarily and carry out data shuffling, second after being shuffled faces Time buffering field;
Step d3): buffer field by generate second temporarily and sign, generate the 3rd and buffer temporarily Field;
Step d4): the buffering field temporarily of the 3rd after signature is carried out data shuffling, obtains the 4th and face Time buffering field;
Step d5): by the generate the 4th temporarily buffering field and step d2) generate second interim Buffering field utilizes key to be encrypted after being spliced into new character string, generates described anonymous Identity special Levy string;
E) the identity characteristic string generated is returned to client;
F) communication of client is opened.
2. anonymous instant communication method as claimed in claim 1, wherein uses in step b) When the identity characteristic string that family is sent is verified, marking this user is frequent visitor, it is allowed to user checks and goes through History message.
3. anonymous instant communication method as claimed in claim 2, wherein said history message preserves Local or the server end in client.
4. anonymous instant communication method as claimed in claim 1, wherein said step d2) adopted Data shuffling algorithm and step d4) in shuffle arithmetic be different algorithms.
5. anonymous instant communication method as claimed in claim 1, tests in wherein said step b) The method demonstrate,proving described anonymous Identity feature string comprises the steps:
Step b1): described identity characteristic string is deciphered, then splits generation second and buffer field temporarily Buffer field with the 4th temporarily;
Step b2): buffer field by the generate the 4th temporarily and carry out inverse mixed washing, obtain the 3rd and delay temporarily Rush field;
Step b3): buffer field by generate second temporarily and carry out inverse mixed washing, generate first and delay temporarily Rush field;
Step b4): buffer field by first temporarily and split, obtain user anonymity UID, time Parameter and a random number;
Step b5): second generated buffering field temporarily is signed, with step b2) obtain The 3rd temporarily buffering field compare, if difference, not verified;If identical, then verify Whether described time parameter meets term of validity requirement, if meeting, by checking, if not meeting, not By checking.
6. anonymous instant communication method as claimed in claim 5, wherein said time parameter is corresponding The term of validity by server system sets itself.
7. anonymous instant communication method as claimed in claim 1, wherein in described client by institute State identity characteristic string and be saved in this locality, in order to the most again initiate to be sent to server authentication during communication.
8. anonymous instant communication method as claimed in claim 1, wherein said client is PC The web browser of terminal, client software or mobile phone terminal app.
9. anonymous instant communication method as claimed in claim 1, wherein said communication request is to send out Play instant dialogue or send deferred information.
CN201310342575.7A 2013-08-07 2013-08-07 A kind of anonymous instant communicating system identified based on frequent visitor CN103368831B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310342575.7A CN103368831B (en) 2013-08-07 2013-08-07 A kind of anonymous instant communicating system identified based on frequent visitor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310342575.7A CN103368831B (en) 2013-08-07 2013-08-07 A kind of anonymous instant communicating system identified based on frequent visitor

Publications (2)

Publication Number Publication Date
CN103368831A CN103368831A (en) 2013-10-23
CN103368831B true CN103368831B (en) 2016-08-24

Family

ID=49369400

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310342575.7A CN103368831B (en) 2013-08-07 2013-08-07 A kind of anonymous instant communicating system identified based on frequent visitor

Country Status (1)

Country Link
CN (1) CN103368831B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103595618B (en) * 2013-11-08 2016-12-14 北京奇立软件技术有限公司 One is used for keeping the successional method of instant communication session, server and system
CN104796317A (en) * 2014-01-22 2015-07-22 阿里巴巴集团控股有限公司 Instant messaging method and device
CN105391676B (en) * 2014-09-05 2019-09-17 腾讯科技(深圳)有限公司 Instant communication information processing method and processing device and system
CN104580983B (en) * 2015-01-15 2018-05-29 深圳市捷视飞通科技有限公司 A kind of method for realizing video communication PTT functions
CN107483389A (en) * 2016-06-07 2017-12-15 武汉斗鱼网络科技有限公司 A kind of temporary authority management method and device
CN108156273A (en) * 2017-12-14 2018-06-12 北京奇艺世纪科技有限公司 A kind of anonymous ID generation methods, device and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1653829A (en) * 2002-01-22 2005-08-10 雅虎公司 Providing instant messaging functionality in non-instant messaging environments
CN101207482A (en) * 2007-12-13 2008-06-25 深圳市戴文科技有限公司 System and method for implementation of single login
CN102238213A (en) * 2010-04-29 2011-11-09 腾讯科技(深圳)有限公司 Internet application login method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1653829A (en) * 2002-01-22 2005-08-10 雅虎公司 Providing instant messaging functionality in non-instant messaging environments
CN101207482A (en) * 2007-12-13 2008-06-25 深圳市戴文科技有限公司 System and method for implementation of single login
CN102238213A (en) * 2010-04-29 2011-11-09 腾讯科技(深圳)有限公司 Internet application login method and system

Also Published As

Publication number Publication date
CN103368831A (en) 2013-10-23

Similar Documents

Publication Publication Date Title
US8539569B2 (en) Systems and methods for facilitating user authentication over a network
JP4681010B2 (en) Authentication system and authentication method
US8813181B2 (en) Electronic verification systems
KR20170129866A (en) Automated demonstration of device integrity using block chains
JP2006525563A (en) User and web site authentication method and apparatus
CN101495956B (en) Extended one-time password method and apparatus
CN1252598C (en) Method and system for providing information related to status and preventing attacks from middleman
US20070162961A1 (en) Identification authentication methods and systems
US9191394B2 (en) Protecting user credentials from a computing device
US9722799B2 (en) Distributed system for multi-function secure verifiable signer authentication
US8209744B2 (en) Mobile device assisted secure computer network communication
ES2373489T3 (en) Procedure and system to authenticate a user through a mobile device.
KR101486782B1 (en) One-time password authentication with infinite nested hash chains
US8528076B2 (en) Method and apparatus for authenticating online transactions using a browser and a secure channel with an authentication server
US8132020B2 (en) System and method for user authentication with exposed and hidden keys
Ellison Ceremony Design and Analysis.
KR20070122495A (en) Peer-to-peer authentication and authorization
JP2002123492A (en) Technique for acquiring single sign-on certificate from foreign pki system using existing strong authentication pki system
RU2506637C2 (en) Method and device for verifying dynamic password
CN104662864A (en) User-convenient authentication method and apparatus using a mobile authentication application
CN102404116B (en) The additional authentication factor bound to the multiple identities of encryption devices
CN104320262A (en) User public key address binding, searching and verifying method and system based on crypto currency open account book technology
WO2012136083A1 (en) System and method for accessing third-party applications based on cloud platform
US20170048232A1 (en) Secure element authentication
TW200818838A (en) Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
GR01 Patent grant
C14 Grant of patent or utility model