CN103532971B - Authentication method, device and system based on two-dimensional code - Google Patents

Authentication method, device and system based on two-dimensional code Download PDF

Info

Publication number
CN103532971B
CN103532971B CN201310507099.XA CN201310507099A CN103532971B CN 103532971 B CN103532971 B CN 103532971B CN 201310507099 A CN201310507099 A CN 201310507099A CN 103532971 B CN103532971 B CN 103532971B
Authority
CN
China
Prior art keywords
dimensional code
identifier
account
information
authorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310507099.XA
Other languages
Chinese (zh)
Other versions
CN103532971A (en
Inventor
武卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Ruishan Network Co Ltd
Original Assignee
Beijing Star Net Ruijie Networks Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Star Net Ruijie Networks Co Ltd filed Critical Beijing Star Net Ruijie Networks Co Ltd
Priority to CN201310507099.XA priority Critical patent/CN103532971B/en
Publication of CN103532971A publication Critical patent/CN103532971A/en
Application granted granted Critical
Publication of CN103532971B publication Critical patent/CN103532971B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention provides an authentication method, a device and a system based on a two-dimensional code. The method comprises the steps that first two-dimensional code information sent by wireless access equipment is received by a Portal authentication server, wherein the first two-dimensional code information is information acquired by user equipment by scanning the two-dimensional code, and comprises a first authorization guarantee user marker and a first two-dimensional code marker; request information for acquiring an account number allowing the user equipment to perform network access authentication is sent to a two-dimensional code authorization component, wherein the request information comprises the first authorization guarantee user marker and the first two-dimensional code marker; the two-dimensional code authorization component obtains a relation between the user equipment and a first authorization guarantee user; response information is sent to the Portal authentication server according to the first authorization guarantee user marker and the first two-dimensional code marker; and the Portal authentication server performs network access authentication management on the user equipment according to the response information sent by the two-dimensional code authorization component. The method, the device and the system improve the efficiency of use authority authentication of a wireless network.

Description

Authentication method, device and system based on two-dimensional code
Technical Field
The present invention relates to communications technologies, and in particular, to an authentication method, apparatus, and system based on a two-dimensional code.
Background
With the rapid development of wireless communication technology, wireless networks are more and more widely applied, however, for places with large personnel mobility and high safety requirements, such as schools, airports, stations, and the like, people pay attention to the method for authenticating the use permission of the wireless networks.
In the prior art, the authority of a user to use a wireless network is controlled through an account, however, for places where people flow greatly, a visitor is a temporary user, the authentication process of the wireless network is complex, for example, a school is used, the visitor needs to carry effective identity documents to a network management center to handle network access registration, the network management center authenticates the identity of the visitor, and associates the account with the identity of the visitor, so that the account of the visitor can be granted, the account can be composed of a user name and a password, the visitor is allowed to use the account to authenticate the wireless network using the school, and when the visitor leaves, the visitor still needs to be checked by the network management center. Obviously, the method for authenticating the use permission of the wireless network in the prior art is not efficient.
Disclosure of Invention
The invention provides an authentication method, device and system based on a two-dimensional code, and aims to improve the efficiency of authentication of the use permission of a wireless network.
The invention provides an authentication method based on a two-dimensional code, which comprises the following steps: receiving first two-dimensional code information sent by wireless access equipment, wherein the first two-dimensional code information is information obtained by scanning a first two-dimensional code by user equipment, and the first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier;
sending request information for acquiring an account number for the user equipment to perform network access authentication to a two-dimensional code authorization component, wherein the request information comprises an identifier of the first authorization guarantee user and the first two-dimensional code identifier, so that the two-dimensional code authorization component sends response information according to the identifier of the first authorization guarantee user and the first two-dimensional code identifier;
and performing network access authentication management on the user equipment according to the response information sent by the two-dimension code authorization component.
The second aspect of the present invention provides an authentication method based on a two-dimensional code, including: receiving request information sent by an entrance authentication server and used for acquiring an account number for user equipment to perform network access authentication, wherein the request information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier, and the identifier of the first authorized guarantee user and the first two-dimensional code identifier are acquired by scanning a first two-dimensional code by the user equipment;
and determining response information sent to the entrance authentication server according to the identifier of the first authorization guarantee user and the first two-dimensional code identifier, so that the entrance authentication server performs access authentication management according to the response information.
A third aspect of the present invention provides an authentication apparatus based on a two-dimensional code, including: the wireless access device comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving first two-dimensional code information sent by the wireless access device, the first two-dimensional code information is information obtained by scanning a first two-dimensional code by user equipment, and the first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier;
a sending module, configured to send, to a two-dimensional code authorization component, request information for obtaining an account for the user equipment to perform network access authentication, where the request information includes an identifier of the first authorization and guarantee user and the first two-dimensional code identifier, so that the two-dimensional code authorization component sends response information according to the identifier of the first authorization and guarantee user and the first two-dimensional code identifier;
and the authentication module is used for carrying out network access authentication management on the user equipment according to the response information sent by the two-dimension code authorization component.
A fourth aspect of the present invention provides an authentication apparatus based on a two-dimensional code, including: the system comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving request information which is sent by an entrance authentication server and used for acquiring an account number for user equipment to carry out network access authentication, the request information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier, and the identifier of the first authorized guarantee user and the first two-dimensional code identifier are acquired by the user equipment through scanning a first two-dimensional code;
and the processing module is used for determining response information sent to the entrance authentication server according to the identifier of the first authorization guarantee user and the first two-dimensional code identifier so as to enable the entrance authentication server to carry out network access authentication management according to the response information.
The fifth aspect of the present invention provides an authentication system based on a two-dimensional code, including:
an apparatus as in the third aspect and an apparatus as in the fourth aspect.
The authentication method, device and system based on the two-dimensional code provided by the embodiment of the invention receive first two-dimensional code information sent by wireless access equipment through an entrance authentication server, the first two-dimensional code information is information obtained by scanning the two-dimensional code by user equipment, the first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier, request information for obtaining an account number for the user equipment to carry out network access authentication is sent to a two-dimensional code authorization component, the request information comprises the identifier of the first authorized guarantee user and the first two-dimensional code identifier, thereby enabling the two-dimensional code authorization component to learn the relationship of the user device to the first authorization vouching user, and then response information is sent to the entrance authentication server according to the identifier of the first authorization guarantee user and the identifier of the first two-dimensional code, and the entrance authentication server carries out network access authentication management on the user equipment according to the response information sent by the two-dimensional code authorization component. In the process, the identity relationship between the visitor and the authorized guarantee user can be obtained by scanning the two-dimensional code by the visitor, and then an account is allocated to the visitor from the corresponding account information table according to the identification of the authorized guarantee user in the two-dimensional code and the identification of the two-dimensional code, so that the efficiency of the authentication of the use permission of the wireless network is improved.
Drawings
Fig. 1 is a schematic flowchart of a first embodiment of an authentication method based on two-dimensional codes according to the present invention;
fig. 2 is a schematic flowchart of a second embodiment of an authentication method based on two-dimensional codes according to the present invention;
fig. 3 is a schematic flowchart of a third embodiment of an authentication method based on two-dimensional codes according to the present invention;
fig. 4 is a schematic structural diagram of a first authentication device based on two-dimensional codes according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a second authentication device based on two-dimensional codes according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a two-dimensional code-based authentication system according to a first embodiment of the present invention.
Detailed Description
In order to improve the efficiency of the authentication of the use permission of the wireless network, the network management center grants a legal user capable of acquiring specific identity information to have a certain guarantee permission, the user with the certain guarantee permission is called an authorized guarantee user, the authorized guarantee user has the permission of guaranteeing the legal identities of a certain number of visitors, and the visitors can acquire the permission of using the wireless network by adopting the identities of the authorized guarantee users guaranteed by the visitors. The method comprises the steps that a two-dimensional code and an account information table corresponding to the two-dimensional code are established according to requirement information of an authorized guarantee user, the two-dimensional code comprises an identification of the authorized guarantee user and an identification of the two-dimensional code, identity information of a visitor is obtained by scanning the two-dimensional code through user equipment used by the visitor, and the identity information of the visitor refers to the relationship between the visitor and the authorized guarantee user, namely the visitor belongs to the visitor of the authorized guarantee user corresponding to the identification of the authorized guarantee user contained in the two-dimensional code; an account used for network access authentication is allocated to the visitor from an account information table corresponding to the two-dimensional code scanned by the visitor, so that the visitor can be managed to use the wireless network permission; in the process, the identity relationship between the visitor and the authorized guarantee user can be obtained by scanning the two-dimensional code by the visitor, and then an account is allocated to the visitor from the corresponding account information table according to the identification of the authorized guarantee user in the two-dimensional code and the identification of the two-dimensional code, so that the efficiency of the authentication of the use permission of the wireless network is improved.
The technical scheme of the invention can be applied to various places with large personnel flow and high safety requirements, and for convenience of description, the following description only takes schools as an example.
For convenience in description, in the process of generating the two-dimension code and the account information table corresponding to the two-dimension code, the generated two-dimension code is called a second two-dimension code, the authorized guarantee user who inputs the demand information is called a second authorized guarantee user, the identification of the authorized guarantee user contained in the second two-dimension code is called the identification of the second authorized guarantee user, and the identification of the two-dimension code contained in the second two-dimension code is called the identification of the second two-dimension code. In the process of acquiring the two-dimension code information by scanning the two-dimension code, the two-dimension code scanned by the user equipment is called a first two-dimension code, the information acquired by scanning the first two-dimension code is called first two-dimension code information, the identification of the authorized guarantee user contained in the first two-dimension code information is called the identification of the first authorized guarantee user, and the two-dimension code identification contained in the first two-dimension code information is called the first two-dimension code identification.
Fig. 1 is a schematic flow chart of a first embodiment of an authentication method based on two-dimensional codes according to the present invention, where an execution subject of the embodiment is a Portal authentication server, and as shown in fig. 1, the method of the embodiment is as follows:
s101: and receiving first two-dimension code information sent by the wireless access equipment.
The first two-dimensional code information is information obtained by the user equipment through scanning the first two-dimensional code, and the first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier.
The user device in this step refers to a user device held by a visitor, for example, a school enters an academic exchange conference, the out-of-school attendee is a visitor, if the visitor wants to use the wireless network of the school, the visitor scans a first two-dimensional code by using the held user device, the first two-dimensional code is a two-dimensional code generated by a first authorized security user according to the demand information, the attendee can scan the meeting person generally by pasting the meeting person in a fixed position or printing the meeting person on a brochure, the visitor scans the first two-dimensional code to obtain first two-dimensional code information, the first two-dimensional code information includes an identifier of a first authorized security user and an identifier of the first two-dimensional code, the first authorized security user can be a person in charge of the academic exchange conference, the first two-dimensional code is substantially equivalent to an HTTP link, the link includes first two-dimensional code information, the scanning of the first two-dimensional code is equivalent to initiating an authentication request by hh, when the HTTP message passes through the wireless access equipment, the HTTP message is redirected to a Portal authentication server by the wireless access equipment.
S102: and sending request information for acquiring the account number for the user equipment to perform network access authentication to a two-dimensional code authorization component, wherein the request information comprises an identifier of a first authorization guarantee user and a first two-dimensional code identifier.
After receiving the first two-dimensional code information, the Portal authentication server sends request information for acquiring an account number for the user equipment (visitor) to perform network access authentication to the two-dimensional code authorization component, and the request information contains the identifier of the first authorization guarantee user and the identifier of the first two-dimensional code, so that the two-dimensional code authorization component sends response information according to the identifier of the first authorization guarantee user and the identifier of the first two-dimensional code.
The two-dimension code authorization part stores an account information table corresponding to a second two-dimension code generated according to the requirement information of a second authorization guarantee user, and the process is as follows:
first, demand information input by a second authorized guarantee user is received, wherein the demand information comprises the number of first users, the first internet surfing time and a first service life. And then, generating a second two-dimensional code, wherein the second two-dimensional code comprises the identifier of the second authorized guarantee user and the identifier of the second two-dimensional code. And generating an account information table corresponding to the identifier of the second authorized guarantee user and the second two-dimensional code identifier according to the demand information, wherein the number of accounts contained in the account information table is the first user number in the demand information, the maximum internet surfing time of each account in the account information table is the first internet surfing time in the demand information, and the service life of each account in the account information table is the first service life.
For example, the second authorized vouching user is a person in charge of the academic conference for a school, and the second authorized vouching user is identified by the name of the person in charge, such as: zhang III; the total number of the participants participating in the academic communication conference is 10, the conference duration is 5 days in 5 months in 2013 to 10 days in 5 months in 2013, the internet surfing time required by each participant is 20 hours, and the second authorized guarantee user inputs the demand information as the number of the first users: "10", first internet surfing time: "20 hours", first life: from 5 days in 5 months in 2013 to 10 days in 5 months in 2013, the two-dimensional code authorization component generates a second two-dimensional code according to the demand information input by a second authorization security user, the second two-dimensional code comprises an identifier of the second authorization security user and a second two-dimensional code identifier, the second two-dimensional code identifier can be an academic exchange conference, one second authorization security user can correspond to a plurality of second two-dimensional code identifiers, namely, one authorization security user can establish a plurality of second two-dimensional codes, each second two-dimensional code is distinguished by the second two-dimensional code identifier, and the plurality of second two-dimensional code identifiers corresponding to the same second authorization security user do not have repeated second two-dimensional code identifiers; and simultaneously generating an account information table corresponding to the identifier of the second authorized guarantee user and the identifier of the second two-dimensional code, wherein the account information table is an account information table corresponding to Zhang III and academic conference communication, the account information table comprises 10 accounts, the maximum internet surfing time of each account in the account information table is 20 hours, and the service life of each account in the account information table is from 5 months and 5 days in 2013 to 5 months and 10 days in 2013. When the visitor scans the first two-dimensional code containing Zhang III and academic exchange conference, the account can be obtained from the account information table corresponding to Zhang III and academic exchange conference, so that the visitor can carry out internet authentication.
After receiving request information sent by a Portal authentication server for obtaining an account number for user equipment (visitor) to perform network access authentication, a two-dimensional code authorization component determines response information sent to the Portal authentication server according to an identifier of a first authorization guarantee user and a first two-dimensional code identifier contained in the request information, the response information can be response information agreeing to access or response information refusing to access, the response information agreeing to access contains the account number for the user equipment to perform network access authentication, the response information refusing to access is used for indicating the Portal authentication server to refuse to perform network access authentication on the user equipment, and the two-dimensional code authorization component determines that the response information is specifically divided into the following conditions:
in the first case: the two-dimensional code authorization component does not store an account information table corresponding to the identifier of the second authorized guarantee user and the identifier of the second two-dimensional code which are respectively the same as the identifier of the first authorized guarantee user and the identifier of the first two-dimensional code in the request information, the response information is determined to be access refusal response information, the specific form of the access refusal response information can be 'two-dimensional code invalid' or 'the user is an illegal user' or 'access refusal' or 'request failure' and the like. After receiving the access rejection response message, the Portal authentication server displays an access failure prompt to the user equipment, which is not limited by the invention.
In the second case: the two-dimensional code authorization component stores an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are respectively the same as the first authorized guarantee user identifier and the first two-dimensional code identifier in the request information, but the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is expired, the service life is expired, the current time for receiving the request information is out of the range of the service life, the service life is the first service life input by the second authorized guarantee user, and the response information is determined to be the access refusing response information.
In the third case: the two-dimensional code authorization component stores an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier in the request information, the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is not expired, the service life is not expired, the current time for receiving the request information is within the range of the service life, an unassigned account is not in the account information table, and the response information is determined to be response information refusing access. For example, if there are 10 accounts in the account information table and 10 accounts have been completely allocated, it is considered that there is no unassigned account in the account information table.
In a fourth case: the two-dimensional code authorization component stores an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier, the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is not expired, the service life is not expired, the current time for receiving the request information is within the service life range, an unassigned account is in the account information table, and an account for the user equipment to perform network access authentication is determined from the unassigned accounts. And determining that the response information is access approval response information, wherein the access approval response information comprises the account number for the user equipment to perform network access authentication.
Optionally, the first two-dimensional code information may further include a two-dimensional code network access authentication type identifier, where the two-dimensional code network access authentication type identifier is used to indicate that the first two-dimensional code information is used for requesting an account for network access authentication, and correspondingly, before executing S102, the method further includes: and determining whether the first two-dimensional code information contains the two-dimensional code network access authentication type identifier. If the first two-dimensional code information includes the two-dimensional code network access authentication type identifier, the first two-dimensional code is considered to be used for requesting a network access authentication account, and the subsequent step S103 is executed. And if the first two-dimensional code information does not contain the two-dimensional code network access authentication type identification, the first two-dimensional code is considered to be a common two-dimensional code, and the processing is carried out according to the prior art.
It should be noted that it may also be determined that the first two-dimensional code information is used for requesting the network access authentication account through other manners, for example, if the first two-dimensional code information includes an identifier of an authorized vouching user and a first two-dimensional code identifier, the first two-dimensional code information is considered to be used for requesting the network access authentication account, and if not, the first two-dimensional code information is considered to be a common two-dimensional code, and the processing is performed according to the prior art.
S103: and performing network access authentication management on the user equipment according to the response information sent by the two-dimension code authorization component.
If the response information is response information refusing to access, the Portal authentication server feeds back an access failure prompt to the user equipment.
If the response information is the access agreement response information, the Portal authentication server authenticates through the access authentication server by adopting the account number in the access agreement response information, namely, the Portal authentication server sends the account number in the access agreement response information to the access authentication server, the access authentication server enters authentication according to the account number, and after the access authentication server passes the authentication, the Portal authentication server informs the wireless access equipment to open an internet access channel of user equipment (visitor), and the visitor can use the wireless network to surf the internet.
The network access authentication server in this embodiment may be Remote user dial-up (RADIUS) authentication.
In the embodiment, a Portal authentication server receives first two-dimensional code information sent by a wireless access device, the first two-dimensional code information is information obtained by user equipment through scanning a two-dimensional code, the first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier, request information for obtaining an account number for network access authentication of the user equipment is sent to a two-dimensional code authorization component, the request information comprises the identifier of the first authorized guarantee user and the first two-dimensional code identifier, so that the two-dimensional code authorization component obtains the relationship between the user equipment and the first authorized guarantee user, response information is sent to the Portal authentication server according to the identifier of the first authorized guarantee user and the first two-dimensional code identifier, and the Portal authentication server conducts network access authentication management on the user equipment according to the response information sent by the two-dimensional code authorization component. In the process, the identity relationship between the visitor and the authorized guarantee user can be obtained by scanning the two-dimensional code by the visitor, and then an account is allocated to the visitor from the corresponding account information table according to the identification of the authorized guarantee user in the two-dimensional code and the identification of the two-dimensional code, so that the efficiency of the authentication of the use permission of the wireless network is improved.
Fig. 2 is a schematic flowchart of a second embodiment of the authentication method based on the two-dimensional code, as shown in fig. 2, an execution subject of this embodiment is a two-dimensional code authorization component, which may be an independent entity component or a component integrated in other network devices, and the method of this embodiment is as follows:
s201: and receiving request information sent by a Portal authentication server for acquiring an account number for the user equipment to perform network access authentication.
The request information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier, the identifier of the first authorized guarantee user and the first two-dimensional code identifier are obtained by scanning a two-dimensional code by user equipment, and the user equipment is user equipment used by a visitor.
After the two-dimensional code authorization component receives the request information, because the request information contains the identifier of the first authorization guarantee user and the identifier of the first two-dimensional code, the identity of the visitor is obtained, namely the visitor of which first authorization guarantee user the visitor belongs to.
S202: and determining response information sent to the Portal authentication server according to the identification information of the first authorized guarantee user and the first two-dimensional code identification.
The response information can be access refusing response information and access agreeing response information, and the access refusing response information is used for indicating a Portal authentication server to refuse to carry out network access authentication on the user equipment. The access agreement response message contains an account number for the user equipment to carry out network access authentication. The specific manner of determining the response information by the two-dimensional code authorization component is the same as four cases in S102, which are described in detail in S102 in the embodiment shown in fig. 1 and are not described herein again.
The Portal authentication server performs authentication management according to the response information, and specifically, the method for performing authentication management on different response information refers to the detailed description in S103 in the embodiment shown in fig. 1, which is not repeated herein.
It is worth mentioning that before executing S201, the following steps may be further included:
the two-dimension code authorization component receives requirement information input by a second authorization guarantee user, wherein the requirement information comprises the number of first users, the first internet surfing time and a first service life; generating a second two-dimensional code, wherein the second two-dimensional code comprises an identifier of a second authorized guarantee user and a second two-dimensional code identifier; and generating an account information table corresponding to the identifier of the second authorized guarantee user and the second two-dimensional code identifier according to the demand information, wherein the number of accounts contained in the account information table is the number of the first user, the maximum internet surfing time of each account in the account information table is the first internet surfing time, and the service life of each account in the account information table is the first service life.
Optionally, after the two-dimensional code authorization component receives the requirement information input by the second authorization guarantee user, the method further includes: and judging whether the requirement information is in the guarantee authority range of the second authorized guarantee user, wherein the network management center allocates authorization levels to different second authorized guarantee users, different authorization levels correspond to different guarantee authority ranges, the guarantee authority ranges comprise the maximum number of users capable of guaranteeing, the maximum internet surfing time length and a guarantee period, the guarantee period refers to the maximum guarantee duration, and corresponds to the first service life in the requirement information. And if the required information input by the second authorized guarantee user is out of the guarantee authority corresponding to the authorization level of the second authorized guarantee user, refusing to generate the second two-dimensional code and refusing to generate the identifier of the second authorized guarantee user and the account information table corresponding to the identifier of the second two-dimensional code. And if the required information input by the second authorized guarantee user is within the guarantee authority corresponding to the authorization level of the second authorized guarantee user, generating a second two-dimensional code, and generating an account information table corresponding to the identifier of the second authorized guarantee user and the identifier of the second two-dimensional code according to the required information. Optionally, the two-dimension code authorization component further defines a second authorization guarantee webpage popped up after Portal authentication of the user at different authorization levels.
In this embodiment, request information for acquiring an account number for a user equipment to perform network access authentication, which is sent by a Portal authentication server, is received, where the request information includes an identifier of a first authorized secured user and a first two-dimensional code identifier, and the identifier of the first authorized secured user and the first two-dimensional code identifier are acquired by the user equipment through scanning a two-dimensional code, so that a relationship between the user equipment and the first authorized secured user can be obtained, and then response information sent to the Portal authentication server is determined according to the identifier of the first authorized secured user and the first two-dimensional code identifier, so that the Portal authentication server performs network access authentication management according to the response information. In the process, the identity relationship between the visitor and the authorized guarantee user can be obtained by scanning the two-dimensional code by the visitor, and then an account is allocated to the visitor from the corresponding account information table according to the identification of the authorized guarantee user in the two-dimensional code and the identification of the two-dimensional code, so that the efficiency of the authentication of the use permission of the wireless network is improved.
Fig. 3 is a schematic flowchart of a third embodiment of the authentication method based on two-dimensional codes according to the present invention, as shown in fig. 3, the method of this embodiment is as follows:
s301: the two-dimensional code authorization component obtains an authorization level of a second authorization vouching user.
S302: the two-dimensional code authorization component receives requirement information input by a second authorization guarantee user.
The demand information includes the number of the first users, the first internet surfing time and a first service life.
S303: the two-dimensional code authorizing means judges whether or not the required information is within the guarantee authority range corresponding to the authorization level of the second authorization guarantee user, if so, S305 is executed, and if not, S304 is executed.
S304: the authority is limited and the operation fails.
S305: and the two-dimension code authorization component generates a second two-dimension code and generates an account information table corresponding to the identifier of the second authorization guarantee user and the identifier of the second two-dimension code according to the demand information.
S306: the wireless access equipment redirects first two-dimensional code information acquired by the user equipment through scanning the first two-dimensional code to a Portal authentication server.
The first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier.
S307: the Portal authentication server sends request information for acquiring an account number for the user equipment to perform network access authentication to the two-dimensional code authorization component, wherein the request information comprises an identifier of a first authorization guarantee user and a first two-dimensional code identifier.
And S308, the two-dimensional code authorization component determines response information sent to a Portal authentication server according to the identification information of the first authorization guarantee user and the identification of the first two-dimensional code.
S309: and performing network access authentication management on the user equipment according to the response information sent by the two-dimension code authorization component.
If the response information is response information refusing to access, the Portal authentication server feeds back an access failure prompt to the user equipment.
If the response information is the access agreement response information, the Portal authentication server adopts the account number in the access agreement response information to carry out authentication through the network access authentication server. After the authentication of the network access authentication server is passed, S310 is executed.
S310: the network access authentication server informs the wireless access equipment to open the network access channel of the user equipment (visitor).
Thus, the visitor can surf the internet by using the wireless network.
In the embodiment, the identity relationship between the visitor and the authorized guarantee user can be obtained by scanning the two-dimensional code by the visitor, and then the account is distributed to the visitor from the corresponding account information table according to the identification of the authorized guarantee user and the identification of the two-dimensional code.
Fig. 4 is a schematic structural diagram of a first embodiment of an authentication apparatus based on a two-dimensional code according to the present invention, where the apparatus of this embodiment may be deployed in an entrance authentication server, and the apparatus of this embodiment includes: the wireless access device comprises a receiving module 401, a sending module 402 and an authentication module 403, wherein the receiving module 401 is configured to receive first two-dimensional code information sent by a wireless access device, the first two-dimensional code information is information obtained by scanning a first two-dimensional code by a user device, and the first two-dimensional code information includes an identifier of a first authorized warranty user and an identifier of the first two-dimensional code; the sending module 402 is configured to send request information for obtaining an account for the user equipment to perform network access authentication to a two-dimensional code authorization component, where the request information includes an identifier of the first authorized vouching user and the first two-dimensional code identifier, so that the two-dimensional code authorization component sends response information according to the identifier of the first authorized vouching user and the first two-dimensional code identifier; the authentication module 403 is configured to perform network access authentication management on the user equipment according to the response information sent by the two-dimensional code authorization component.
In the embodiment, the response information is access denial response information or access approval response information, where the access denial response information is used to indicate that the user equipment is denied to perform access authentication, and the access approval response information includes an account number for the user equipment to perform access authentication;
if the response information is the response information of access agreement; the authentication module 403 is specifically configured to send an account for performing network access authentication on the user equipment in the access agreement response message to the network access authentication server, so that the network access authentication server performs network access authentication on the user equipment according to the account. And if the response information is response information for refusing access, the authentication module is specifically used for feeding back an access failure prompt to the user equipment.
In the embodiment, the first two-dimensional code information further includes a two-dimensional code network access authentication type identifier, where the two-dimensional code authentication type identifier is used to indicate that the first two-dimensional code information is used for requesting an account for network access authentication;
the sending module 402 is further configured to determine that the first two-dimensional code information includes the two-dimensional code network access authentication type identifier before sending the request information for obtaining the account number for the user equipment to perform network access authentication to the two-dimensional code authorization component.
The apparatus of the above embodiment may correspondingly perform the technical solution of the method embodiment shown in fig. 1, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 5 is a schematic structural diagram of a second embodiment of an authentication apparatus based on a two-dimensional code according to the present invention, the apparatus of this embodiment is deployed in a two-dimensional code authorization component, and the apparatus of this embodiment includes a receiving module 501 and a processing module 502, where the receiving module 501 is configured to receive request information sent by an entry authentication server to acquire an account for a user equipment to perform network access authentication, where the request information includes an identifier of a first authorized guarantee user and a first two-dimensional code identifier, and the identifier of the first authorized guarantee user and the first two-dimensional code identifier are acquired by the user equipment through scanning a first two-dimensional code; the processing module 502 is configured to determine response information sent to the portal authentication server according to the identifier of the first authorization guaranty user and the identifier of the first two-dimensional code, so that the portal authentication server performs access authentication management according to the response information.
In the embodiment, the processing module 502 is further configured to receive, by the receiving module 501, requirement information input by a second authorized vouching user before the receiving module receives request information sent by an entry authentication server to acquire an account for a user equipment to perform network access authentication, where the requirement information includes a first user number, a first internet surfing time length, and a first service life; generating a second two-dimensional code, wherein the second two-dimensional code comprises an identifier of a second authorized guarantee user and a second two-dimensional code identifier; and generating an account information table corresponding to the identifier of the second authorized guarantee user and the second two-dimensional code identifier according to the demand information, wherein the number of accounts contained in the account information table is the number of the first user, the maximum internet surfing time of each account in the account information table is the first internet surfing time, and the service life of each account in the account information table is the first service life.
In the above embodiment, the response information is access denial response information, and the access denial response information is used to instruct the portal authentication server to deny the access authentication to the user equipment; the processing module 502 is specifically configured to determine that the response information is response information for denying access if an account information table corresponding to an identifier of a second authorized guaranteed user and a second two-dimensional code identifier, which are respectively the same as the identifier of the first authorized guaranteed user and the identifier of the first two-dimensional code, is not stored; or, if an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier is stored, but the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is expired, determining the response information as response information for refusing access; or, if an account information table corresponding to a second authorized guaranteed user identifier and a second two-dimensional code identifier which are the same as the first authorized guaranteed user identifier and the first two-dimensional code identifier is stored, and the service life of the account information table corresponding to the second authorized guaranteed user identifier and the second two-dimensional code identifier is not expired, but the account information table does not have an unassigned account, determining that the response information is response information refusing access
In the embodiment, the response information is access approval response information, and the access approval response information includes an account number for the user equipment to perform network access authentication; the processing module 502 is specifically configured to determine an account for the user equipment to perform network entry authentication from the unassigned accounts if an account information table corresponding to a second authorized guaranteed user identifier and a second two-dimensional code identifier, which are the same as the first authorized guaranteed user identifier and the first two-dimensional code identifier, is stored, and a lifetime of the account information table corresponding to the second authorized guaranteed user identifier and the second two-dimensional code identifier is not expired, and the account information table has unassigned accounts, determine the response information as access agreement response information, where the access agreement response information includes an account for the user equipment to perform network entry authentication.
The apparatus of the above embodiment may correspondingly perform the technical solution of the method embodiment shown in fig. 2, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 6 is a schematic structural diagram of a first embodiment of the two-dimensional code-based authentication system according to the present invention, where the system of this embodiment includes a two-dimensional code-based authentication device 601 and a two-dimensional code-based authentication device 602, where the two-dimensional code-based authentication device 601 may adopt the device in the embodiment shown in fig. 4, the two-dimensional code-based authentication device 602 may adopt the device in the embodiment shown in fig. 5, the two-dimensional code-based authentication device 601 may be used to execute the technical solution in the embodiment of the method shown in fig. 1, and the two-dimensional code-based authentication device 602 may be used to execute the technical solution in the embodiment of the method shown in fig. 2, and specific structures and functions thereof are not described herein again, and the two-dimensional code authentication method related to the system may refer to the above-described embodiment.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (15)

1. An authentication method based on two-dimensional codes is characterized by comprising the following steps:
receiving first two-dimensional code information sent by wireless access equipment, wherein the first two-dimensional code information is information obtained by scanning a first two-dimensional code by user equipment, and the first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier;
sending request information for acquiring an account number for the user equipment to perform network access authentication to a two-dimensional code authorization component, wherein the request information comprises an identifier of the first authorization guarantee user and the first two-dimensional code identifier, so that the two-dimensional code authorization component sends response information according to the identifier of the first authorization guarantee user and the first two-dimensional code identifier;
and performing network access authentication management on the user equipment according to the response information sent by the two-dimension code authorization component.
2. The method according to claim 1, wherein the response information is access denial response information or access agreement response information, wherein the access denial response information is used to indicate that the user equipment is denied to perform access authentication, and the access agreement response information includes an account for the user equipment to perform access authentication;
if the response information is the response information of access agreement;
the network access authentication management of the user equipment according to the response information sent by the two-dimension code authorization component comprises the following steps:
and sending an account number for the user equipment to perform network access authentication in the access agreement response message to a network access authentication server, so that the network access authentication server performs network access authentication on the user equipment according to the account number.
3. The method according to claim 1 or 2, wherein the first two-dimensional code information further includes a two-dimensional code network access authentication type identifier, and the two-dimensional code authentication type identifier is used for indicating an account number for requesting network access authentication of the first two-dimensional code information;
before sending request information for acquiring an account for the user equipment to perform network access authentication to a two-dimensional code authorization component, the method further includes:
and determining that the first two-dimension code information contains the two-dimension code network access authentication type identification.
4. An authentication method based on two-dimensional codes is characterized by comprising the following steps:
receiving request information sent by an entrance authentication server and used for acquiring an account number for user equipment to perform network access authentication, wherein the request information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier, and the identifier of the first authorized guarantee user and the first two-dimensional code identifier are acquired by scanning a first two-dimensional code by the user equipment;
and determining response information sent to the entrance authentication server according to the identifier of the first authorization guarantee user and the first two-dimensional code identifier, so that the entrance authentication server performs access authentication management according to the response information.
5. The method according to claim 4, wherein before receiving the request information for acquiring the account for the user equipment to perform the network access authentication, which is sent by the portal authentication server, the method further comprises:
receiving demand information input by a second authorized guarantee user, wherein the demand information comprises the number of first users, the first internet surfing time and a first service life;
generating a second two-dimensional code, wherein the second two-dimensional code comprises an identifier of a second authorized guarantee user and a second two-dimensional code identifier;
and generating an account information table corresponding to the identifier of the second authorized guarantee user and the second two-dimensional code identifier according to the demand information, wherein the number of accounts contained in the account information table is the number of the first users, the maximum internet surfing time of each account in the account information table is the first internet surfing time, and the service life of each account in the account information table is the first service life.
6. The method according to claim 5, wherein the response message is a response message of access denial, and the response message of access denial is used to instruct the portal authentication server to deny the user equipment from performing network access authentication;
the determining, according to the identifier of the first authorized vouching user and the first two-dimensional code identifier, response information to be sent to the portal authentication server includes:
if an account information table corresponding to the identifier of the second authorized guarantee user and the identifier of the second two-dimensional code which are respectively the same as the identifier of the first authorized guarantee user and the identifier of the first two-dimensional code is not stored, determining the response information as response information refusing to access; or,
if an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier is stored, but the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is expired, determining that the response information is response information refusing access; or,
and if an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier is stored, the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is not expired, but the account information table does not have an unassigned account, determining that the response information is response information refusing access.
7. The method according to claim 5, wherein the response information is an access agreement response information, and the access agreement response information includes an account for the user equipment to perform network access authentication;
the determining, according to the identifier of the first authorized vouching user and the first two-dimensional code identifier, response information to be sent to the portal authentication server includes:
if an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier is stored, and the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is not expired, and an unassigned account is in the account information table, determining an account for the user equipment to perform network access authentication from the unassigned account, determining that the response information is access approval response information, wherein the access approval response information comprises an account for the user equipment to perform network access authentication.
8. An authentication apparatus based on a two-dimensional code, comprising:
the wireless access device comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving first two-dimensional code information sent by the wireless access device, the first two-dimensional code information is information obtained by scanning a first two-dimensional code by user equipment, and the first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier;
a sending module, configured to send, to a two-dimensional code authorization component, request information for obtaining an account for the user equipment to perform network access authentication, where the request information includes an identifier of the first authorization and guarantee user and the first two-dimensional code identifier, so that the two-dimensional code authorization component sends response information according to the identifier of the first authorization and guarantee user and the first two-dimensional code identifier;
and the authentication module is used for carrying out network access authentication management on the user equipment according to the response information sent by the two-dimension code authorization component.
9. The apparatus according to claim 8, wherein the response information is access denial response information or access agreement response information, where the access denial response information is used to indicate that network access authentication is denied for the user equipment, and the access agreement response information includes an account for the user equipment to perform network access authentication;
if the response information is the response information of access agreement;
the authentication module is specifically configured to send an account for the user equipment to perform network access authentication in the access agreement response message to a network access authentication server, so that the network access authentication server performs network access authentication on the user equipment according to the account.
10. The device according to claim 8 or 9, wherein the first two-dimensional code information further includes a two-dimensional code network access authentication type identifier, and the two-dimensional code authentication type identifier is used to indicate that the first two-dimensional code information is used for requesting an account for network access authentication;
the sending module is further configured to determine that the first two-dimensional code information includes the two-dimensional code network access authentication type identifier before sending, to a two-dimensional code authorization component, request information for obtaining an account number for the user equipment to perform network access authentication.
11. An authentication apparatus based on a two-dimensional code, comprising:
the system comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving request information which is sent by an entrance authentication server and used for acquiring an account number for user equipment to carry out network access authentication, the request information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier, and the identifier of the first authorized guarantee user and the first two-dimensional code identifier are acquired by the user equipment through scanning a first two-dimensional code;
and the processing module is used for determining response information sent to the entrance authentication server according to the identifier of the first authorization guarantee user and the first two-dimensional code identifier so as to enable the entrance authentication server to carry out network access authentication management according to the response information.
12. The apparatus according to claim 11, wherein the processing module is further configured to receive, by the receiving module, requirement information input by a second authorized vouching user before the receiving module receives request information sent by an entry authentication server to acquire an account for a user equipment to perform access authentication, where the requirement information includes a first user number, a first internet surfing time length, and a first lifetime; generating a second two-dimensional code, wherein the second two-dimensional code comprises an identifier of a second authorized guarantee user and a second two-dimensional code identifier; and generating an account information table corresponding to the identifier of the second authorized guarantee user and the second two-dimensional code identifier according to the demand information, wherein the number of accounts contained in the account information table is the number of the first users, the maximum internet surfing time of each account in the account information table is the first internet surfing time, and the service life of each account in the account information table is the first service life.
13. The apparatus according to claim 12, wherein the response message is a response message for denying access, and the response message for denying access is used to instruct the portal authentication server to deny the user equipment from performing network access authentication;
the processing module is specifically configured to determine that the response information is response information for denying access if an account information table corresponding to an identifier of a second authorized guaranteed user and a second two-dimensional code identifier, which are the same as the identifier of the first authorized guaranteed user and the first two-dimensional code identifier, is not stored; or if an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier is stored, but the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is expired, determining that the response information is response information refusing access; or if an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier is stored, and the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is not expired, but the account information table does not have an unassigned account, determining that the response information is response information refusing access.
14. The apparatus according to claim 12, wherein the response information is an access grant response information, and the access grant response information includes an account for the user equipment to perform network access authentication;
the processing module is specifically configured to determine an account for the user equipment to perform network access authentication from the unassigned accounts if an account information table corresponding to a second authorized guaranteed user identifier and a second two-dimensional code identifier, which are the same as the first authorized guaranteed user identifier and the first two-dimensional code identifier, is stored, and the service life of the account information table corresponding to the second authorized guaranteed user identifier and the second two-dimensional code identifier is not expired, and the account information table has unassigned accounts, determine the response information as access approval response information, where the access approval response information includes an account for the user equipment to perform network access authentication.
15. An authentication system based on two-dimensional codes, comprising:
apparatus as claimed in any one of claims 8 to 10 and apparatus as claimed in any one of claims 11 to 14.
CN201310507099.XA 2013-10-24 2013-10-24 Authentication method, device and system based on two-dimensional code Active CN103532971B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310507099.XA CN103532971B (en) 2013-10-24 2013-10-24 Authentication method, device and system based on two-dimensional code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310507099.XA CN103532971B (en) 2013-10-24 2013-10-24 Authentication method, device and system based on two-dimensional code

Publications (2)

Publication Number Publication Date
CN103532971A CN103532971A (en) 2014-01-22
CN103532971B true CN103532971B (en) 2017-01-25

Family

ID=49934650

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310507099.XA Active CN103532971B (en) 2013-10-24 2013-10-24 Authentication method, device and system based on two-dimensional code

Country Status (1)

Country Link
CN (1) CN103532971B (en)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104144420B (en) * 2014-02-26 2015-11-25 腾讯科技(深圳)有限公司 A kind of radio switch-in method and relevant device, system
US9265079B2 (en) * 2014-03-13 2016-02-16 Microsoft Technology Licensing, Llc Authentication and pairing of devices using a machine readable code
CN104254073B (en) * 2014-09-03 2018-02-06 深信服网络科技(深圳)有限公司 The method and device being authenticated to access terminal
CN104598800A (en) * 2015-01-21 2015-05-06 浪潮通用软件有限公司 Authentication method and authentication system for identity information of grain depot and terminal equipment
CN107656502A (en) * 2016-07-26 2018-02-02 耿跃峰 A kind of automated machine equipment
CN106453243B (en) * 2016-08-29 2019-11-29 捷开通讯(深圳)有限公司 The verification method of server, terminal and its authorization code
CN108347469B (en) 2017-01-24 2021-11-16 西门子公司 Method, device and system for transmitting article information in Internet of things
CN107155185B (en) * 2017-06-30 2019-12-03 迈普通信技术股份有限公司 It is a kind of to access the authentication method of WLAN, apparatus and system
CN107454064A (en) * 2017-07-11 2017-12-08 上海斐讯数据通信技术有限公司 A kind of visitor's authentication method and system based on public number
CN107454594A (en) * 2017-08-15 2017-12-08 上海斐讯数据通信技术有限公司 The method and device of mobile terminal Internet access certification
CN107580321A (en) * 2017-09-07 2018-01-12 上海斐讯数据通信技术有限公司 A kind of authorization and authentication method and system
CN109962897B (en) * 2017-12-26 2022-04-12 航天信息股份有限公司 Open platform authentication and access method and system based on two-dimensional code scanning
CN108810896B (en) * 2018-07-17 2020-11-06 上海连尚网络科技有限公司 Connection authentication method and device of wireless access point
CN109218038B (en) * 2018-09-05 2022-03-01 四川译讯信息科技有限公司 Multi-language instant session platform
CN110336870B (en) * 2019-06-27 2024-03-05 深圳前海微众银行股份有限公司 Method, device and system for establishing remote office operation and maintenance channel and storage medium
CN110856173B (en) * 2019-11-26 2022-11-18 维沃移动通信有限公司 Network access method and device and electronic equipment
CN112073959B (en) * 2020-09-18 2023-04-07 珠海爱迪生智能家居股份有限公司 Zigbee module management method and network access method
CN113723126A (en) * 2021-08-31 2021-11-30 北京市商汤科技开发有限公司 Data acquisition method and device, electronic equipment and storage medium
CN114071650B (en) * 2021-09-26 2024-07-19 深圳市酷开网络科技股份有限公司 Cross-end distribution network method, device, computer equipment and storage medium
CN114492694A (en) * 2022-02-08 2022-05-13 北京城建设计发展集团股份有限公司 Rack building method and system based on rail transit and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102630004A (en) * 2012-04-12 2012-08-08 华为技术有限公司 Authentication method for video conference and related device
CN102821104A (en) * 2012-08-09 2012-12-12 腾讯科技(深圳)有限公司 Authorization method, authorization device and authorization system
CN103227796A (en) * 2013-05-06 2013-07-31 北京灵创众和科技有限公司 Method and system of sharing contact network based on two-dimensional code

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8677131B2 (en) * 2011-11-11 2014-03-18 The Vanguard Group, Inc. Method of securing data in 2D bar codes using SSL
CN103294938B (en) * 2012-02-29 2016-08-24 国际商业机器公司 Access request verification method and system, authorization message generation method, hardware device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102630004A (en) * 2012-04-12 2012-08-08 华为技术有限公司 Authentication method for video conference and related device
CN102821104A (en) * 2012-08-09 2012-12-12 腾讯科技(深圳)有限公司 Authorization method, authorization device and authorization system
CN103227796A (en) * 2013-05-06 2013-07-31 北京灵创众和科技有限公司 Method and system of sharing contact network based on two-dimensional code

Also Published As

Publication number Publication date
CN103532971A (en) 2014-01-22

Similar Documents

Publication Publication Date Title
CN103532971B (en) Authentication method, device and system based on two-dimensional code
CN106875515B (en) Gate inhibition verifies system and its gate inhibition's verification method
CN102111766B (en) Network accessing method, device and system
CN106394486A (en) Authorization method and system of virtual key and server
US8201226B2 (en) Authorizing network access based on completed educational task
CN106559783B (en) Authentication method, device and system for WIFI network
CN1941700A (en) Granting privileges and sharing resources in a telecommunications system
CN105681259A (en) Open authorization method and apparatus and open platform
CN107564140A (en) A kind of gate inhibition invites authorization identifying system
CN110011957B (en) Security authentication method and device for enterprise account, electronic equipment and storage medium
CN107067576A (en) Intelligent cabinet tenant remote authorization other people use method, apparatus and system
EP1449324A1 (en) Use of a public key key pair in the terminal for authentication and authorisation of the telecommunication user with the network operator and business partners
US9185098B2 (en) Method for user authentication
CN107277812A (en) A kind of wireless network authentication method and system based on Quick Response Code
CN104660405A (en) Business equipment authentication method and equipment
CN105703910A (en) Dynamic password verifying method based on Wechat service number
EP2705477A1 (en) Response to queries by means of the communication terminal of a user
CN103428698B (en) Mobile interchange participant's identity strong authentication method
CN108711205B (en) Visitor authentication system of conference system
CN111163063A (en) Edge application management method and related product
CN105812314B (en) A kind of user logs in the method and unification authentication platform of internet application
US11935348B2 (en) System and method for biometric access control
CN109859348A (en) A kind of authorization method of remote door access, apparatus and system
CN115410301B (en) Visitor invitation access control authority management method, device and system based on two-dimension code
CN114448725B (en) Equipment authentication method, system and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201225

Address after: 200030 full floor, 4 / F, 190 Guyi Road, Xuhui District, Shanghai

Patentee after: Shanghai Ruishan Network Co., Ltd

Address before: 12 / F, block a, East Tower, Zhongyi pengao Hotel, 29 Fuxing Road, Haidian District, Beijing 100036

Patentee before: Beijing Star-Net Ruijie Networks Co.,Ltd.