CN103532971B - Authentication method, device and system based on two-dimensional code - Google Patents
Authentication method, device and system based on two-dimensional code Download PDFInfo
- Publication number
- CN103532971B CN103532971B CN201310507099.XA CN201310507099A CN103532971B CN 103532971 B CN103532971 B CN 103532971B CN 201310507099 A CN201310507099 A CN 201310507099A CN 103532971 B CN103532971 B CN 103532971B
- Authority
- CN
- China
- Prior art keywords
- dimensional code
- identifier
- account
- information
- authorized
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 238000013475 authorization Methods 0.000 claims abstract description 100
- 238000012545 processing Methods 0.000 claims description 20
- 239000003550 marker Substances 0.000 abstract 6
- 238000010586 diagram Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Landscapes
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the invention provides an authentication method, a device and a system based on a two-dimensional code. The method comprises the steps that first two-dimensional code information sent by wireless access equipment is received by a Portal authentication server, wherein the first two-dimensional code information is information acquired by user equipment by scanning the two-dimensional code, and comprises a first authorization guarantee user marker and a first two-dimensional code marker; request information for acquiring an account number allowing the user equipment to perform network access authentication is sent to a two-dimensional code authorization component, wherein the request information comprises the first authorization guarantee user marker and the first two-dimensional code marker; the two-dimensional code authorization component obtains a relation between the user equipment and a first authorization guarantee user; response information is sent to the Portal authentication server according to the first authorization guarantee user marker and the first two-dimensional code marker; and the Portal authentication server performs network access authentication management on the user equipment according to the response information sent by the two-dimensional code authorization component. The method, the device and the system improve the efficiency of use authority authentication of a wireless network.
Description
Technical Field
The present invention relates to communications technologies, and in particular, to an authentication method, apparatus, and system based on a two-dimensional code.
Background
With the rapid development of wireless communication technology, wireless networks are more and more widely applied, however, for places with large personnel mobility and high safety requirements, such as schools, airports, stations, and the like, people pay attention to the method for authenticating the use permission of the wireless networks.
In the prior art, the authority of a user to use a wireless network is controlled through an account, however, for places where people flow greatly, a visitor is a temporary user, the authentication process of the wireless network is complex, for example, a school is used, the visitor needs to carry effective identity documents to a network management center to handle network access registration, the network management center authenticates the identity of the visitor, and associates the account with the identity of the visitor, so that the account of the visitor can be granted, the account can be composed of a user name and a password, the visitor is allowed to use the account to authenticate the wireless network using the school, and when the visitor leaves, the visitor still needs to be checked by the network management center. Obviously, the method for authenticating the use permission of the wireless network in the prior art is not efficient.
Disclosure of Invention
The invention provides an authentication method, device and system based on a two-dimensional code, and aims to improve the efficiency of authentication of the use permission of a wireless network.
The invention provides an authentication method based on a two-dimensional code, which comprises the following steps: receiving first two-dimensional code information sent by wireless access equipment, wherein the first two-dimensional code information is information obtained by scanning a first two-dimensional code by user equipment, and the first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier;
sending request information for acquiring an account number for the user equipment to perform network access authentication to a two-dimensional code authorization component, wherein the request information comprises an identifier of the first authorization guarantee user and the first two-dimensional code identifier, so that the two-dimensional code authorization component sends response information according to the identifier of the first authorization guarantee user and the first two-dimensional code identifier;
and performing network access authentication management on the user equipment according to the response information sent by the two-dimension code authorization component.
The second aspect of the present invention provides an authentication method based on a two-dimensional code, including: receiving request information sent by an entrance authentication server and used for acquiring an account number for user equipment to perform network access authentication, wherein the request information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier, and the identifier of the first authorized guarantee user and the first two-dimensional code identifier are acquired by scanning a first two-dimensional code by the user equipment;
and determining response information sent to the entrance authentication server according to the identifier of the first authorization guarantee user and the first two-dimensional code identifier, so that the entrance authentication server performs access authentication management according to the response information.
A third aspect of the present invention provides an authentication apparatus based on a two-dimensional code, including: the wireless access device comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving first two-dimensional code information sent by the wireless access device, the first two-dimensional code information is information obtained by scanning a first two-dimensional code by user equipment, and the first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier;
a sending module, configured to send, to a two-dimensional code authorization component, request information for obtaining an account for the user equipment to perform network access authentication, where the request information includes an identifier of the first authorization and guarantee user and the first two-dimensional code identifier, so that the two-dimensional code authorization component sends response information according to the identifier of the first authorization and guarantee user and the first two-dimensional code identifier;
and the authentication module is used for carrying out network access authentication management on the user equipment according to the response information sent by the two-dimension code authorization component.
A fourth aspect of the present invention provides an authentication apparatus based on a two-dimensional code, including: the system comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving request information which is sent by an entrance authentication server and used for acquiring an account number for user equipment to carry out network access authentication, the request information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier, and the identifier of the first authorized guarantee user and the first two-dimensional code identifier are acquired by the user equipment through scanning a first two-dimensional code;
and the processing module is used for determining response information sent to the entrance authentication server according to the identifier of the first authorization guarantee user and the first two-dimensional code identifier so as to enable the entrance authentication server to carry out network access authentication management according to the response information.
The fifth aspect of the present invention provides an authentication system based on a two-dimensional code, including:
an apparatus as in the third aspect and an apparatus as in the fourth aspect.
The authentication method, device and system based on the two-dimensional code provided by the embodiment of the invention receive first two-dimensional code information sent by wireless access equipment through an entrance authentication server, the first two-dimensional code information is information obtained by scanning the two-dimensional code by user equipment, the first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier, request information for obtaining an account number for the user equipment to carry out network access authentication is sent to a two-dimensional code authorization component, the request information comprises the identifier of the first authorized guarantee user and the first two-dimensional code identifier, thereby enabling the two-dimensional code authorization component to learn the relationship of the user device to the first authorization vouching user, and then response information is sent to the entrance authentication server according to the identifier of the first authorization guarantee user and the identifier of the first two-dimensional code, and the entrance authentication server carries out network access authentication management on the user equipment according to the response information sent by the two-dimensional code authorization component. In the process, the identity relationship between the visitor and the authorized guarantee user can be obtained by scanning the two-dimensional code by the visitor, and then an account is allocated to the visitor from the corresponding account information table according to the identification of the authorized guarantee user in the two-dimensional code and the identification of the two-dimensional code, so that the efficiency of the authentication of the use permission of the wireless network is improved.
Drawings
Fig. 1 is a schematic flowchart of a first embodiment of an authentication method based on two-dimensional codes according to the present invention;
fig. 2 is a schematic flowchart of a second embodiment of an authentication method based on two-dimensional codes according to the present invention;
fig. 3 is a schematic flowchart of a third embodiment of an authentication method based on two-dimensional codes according to the present invention;
fig. 4 is a schematic structural diagram of a first authentication device based on two-dimensional codes according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a second authentication device based on two-dimensional codes according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a two-dimensional code-based authentication system according to a first embodiment of the present invention.
Detailed Description
In order to improve the efficiency of the authentication of the use permission of the wireless network, the network management center grants a legal user capable of acquiring specific identity information to have a certain guarantee permission, the user with the certain guarantee permission is called an authorized guarantee user, the authorized guarantee user has the permission of guaranteeing the legal identities of a certain number of visitors, and the visitors can acquire the permission of using the wireless network by adopting the identities of the authorized guarantee users guaranteed by the visitors. The method comprises the steps that a two-dimensional code and an account information table corresponding to the two-dimensional code are established according to requirement information of an authorized guarantee user, the two-dimensional code comprises an identification of the authorized guarantee user and an identification of the two-dimensional code, identity information of a visitor is obtained by scanning the two-dimensional code through user equipment used by the visitor, and the identity information of the visitor refers to the relationship between the visitor and the authorized guarantee user, namely the visitor belongs to the visitor of the authorized guarantee user corresponding to the identification of the authorized guarantee user contained in the two-dimensional code; an account used for network access authentication is allocated to the visitor from an account information table corresponding to the two-dimensional code scanned by the visitor, so that the visitor can be managed to use the wireless network permission; in the process, the identity relationship between the visitor and the authorized guarantee user can be obtained by scanning the two-dimensional code by the visitor, and then an account is allocated to the visitor from the corresponding account information table according to the identification of the authorized guarantee user in the two-dimensional code and the identification of the two-dimensional code, so that the efficiency of the authentication of the use permission of the wireless network is improved.
The technical scheme of the invention can be applied to various places with large personnel flow and high safety requirements, and for convenience of description, the following description only takes schools as an example.
For convenience in description, in the process of generating the two-dimension code and the account information table corresponding to the two-dimension code, the generated two-dimension code is called a second two-dimension code, the authorized guarantee user who inputs the demand information is called a second authorized guarantee user, the identification of the authorized guarantee user contained in the second two-dimension code is called the identification of the second authorized guarantee user, and the identification of the two-dimension code contained in the second two-dimension code is called the identification of the second two-dimension code. In the process of acquiring the two-dimension code information by scanning the two-dimension code, the two-dimension code scanned by the user equipment is called a first two-dimension code, the information acquired by scanning the first two-dimension code is called first two-dimension code information, the identification of the authorized guarantee user contained in the first two-dimension code information is called the identification of the first authorized guarantee user, and the two-dimension code identification contained in the first two-dimension code information is called the first two-dimension code identification.
Fig. 1 is a schematic flow chart of a first embodiment of an authentication method based on two-dimensional codes according to the present invention, where an execution subject of the embodiment is a Portal authentication server, and as shown in fig. 1, the method of the embodiment is as follows:
s101: and receiving first two-dimension code information sent by the wireless access equipment.
The first two-dimensional code information is information obtained by the user equipment through scanning the first two-dimensional code, and the first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier.
The user device in this step refers to a user device held by a visitor, for example, a school enters an academic exchange conference, the out-of-school attendee is a visitor, if the visitor wants to use the wireless network of the school, the visitor scans a first two-dimensional code by using the held user device, the first two-dimensional code is a two-dimensional code generated by a first authorized security user according to the demand information, the attendee can scan the meeting person generally by pasting the meeting person in a fixed position or printing the meeting person on a brochure, the visitor scans the first two-dimensional code to obtain first two-dimensional code information, the first two-dimensional code information includes an identifier of a first authorized security user and an identifier of the first two-dimensional code, the first authorized security user can be a person in charge of the academic exchange conference, the first two-dimensional code is substantially equivalent to an HTTP link, the link includes first two-dimensional code information, the scanning of the first two-dimensional code is equivalent to initiating an authentication request by hh, when the HTTP message passes through the wireless access equipment, the HTTP message is redirected to a Portal authentication server by the wireless access equipment.
S102: and sending request information for acquiring the account number for the user equipment to perform network access authentication to a two-dimensional code authorization component, wherein the request information comprises an identifier of a first authorization guarantee user and a first two-dimensional code identifier.
After receiving the first two-dimensional code information, the Portal authentication server sends request information for acquiring an account number for the user equipment (visitor) to perform network access authentication to the two-dimensional code authorization component, and the request information contains the identifier of the first authorization guarantee user and the identifier of the first two-dimensional code, so that the two-dimensional code authorization component sends response information according to the identifier of the first authorization guarantee user and the identifier of the first two-dimensional code.
The two-dimension code authorization part stores an account information table corresponding to a second two-dimension code generated according to the requirement information of a second authorization guarantee user, and the process is as follows:
first, demand information input by a second authorized guarantee user is received, wherein the demand information comprises the number of first users, the first internet surfing time and a first service life. And then, generating a second two-dimensional code, wherein the second two-dimensional code comprises the identifier of the second authorized guarantee user and the identifier of the second two-dimensional code. And generating an account information table corresponding to the identifier of the second authorized guarantee user and the second two-dimensional code identifier according to the demand information, wherein the number of accounts contained in the account information table is the first user number in the demand information, the maximum internet surfing time of each account in the account information table is the first internet surfing time in the demand information, and the service life of each account in the account information table is the first service life.
For example, the second authorized vouching user is a person in charge of the academic conference for a school, and the second authorized vouching user is identified by the name of the person in charge, such as: zhang III; the total number of the participants participating in the academic communication conference is 10, the conference duration is 5 days in 5 months in 2013 to 10 days in 5 months in 2013, the internet surfing time required by each participant is 20 hours, and the second authorized guarantee user inputs the demand information as the number of the first users: "10", first internet surfing time: "20 hours", first life: from 5 days in 5 months in 2013 to 10 days in 5 months in 2013, the two-dimensional code authorization component generates a second two-dimensional code according to the demand information input by a second authorization security user, the second two-dimensional code comprises an identifier of the second authorization security user and a second two-dimensional code identifier, the second two-dimensional code identifier can be an academic exchange conference, one second authorization security user can correspond to a plurality of second two-dimensional code identifiers, namely, one authorization security user can establish a plurality of second two-dimensional codes, each second two-dimensional code is distinguished by the second two-dimensional code identifier, and the plurality of second two-dimensional code identifiers corresponding to the same second authorization security user do not have repeated second two-dimensional code identifiers; and simultaneously generating an account information table corresponding to the identifier of the second authorized guarantee user and the identifier of the second two-dimensional code, wherein the account information table is an account information table corresponding to Zhang III and academic conference communication, the account information table comprises 10 accounts, the maximum internet surfing time of each account in the account information table is 20 hours, and the service life of each account in the account information table is from 5 months and 5 days in 2013 to 5 months and 10 days in 2013. When the visitor scans the first two-dimensional code containing Zhang III and academic exchange conference, the account can be obtained from the account information table corresponding to Zhang III and academic exchange conference, so that the visitor can carry out internet authentication.
After receiving request information sent by a Portal authentication server for obtaining an account number for user equipment (visitor) to perform network access authentication, a two-dimensional code authorization component determines response information sent to the Portal authentication server according to an identifier of a first authorization guarantee user and a first two-dimensional code identifier contained in the request information, the response information can be response information agreeing to access or response information refusing to access, the response information agreeing to access contains the account number for the user equipment to perform network access authentication, the response information refusing to access is used for indicating the Portal authentication server to refuse to perform network access authentication on the user equipment, and the two-dimensional code authorization component determines that the response information is specifically divided into the following conditions:
in the first case: the two-dimensional code authorization component does not store an account information table corresponding to the identifier of the second authorized guarantee user and the identifier of the second two-dimensional code which are respectively the same as the identifier of the first authorized guarantee user and the identifier of the first two-dimensional code in the request information, the response information is determined to be access refusal response information, the specific form of the access refusal response information can be 'two-dimensional code invalid' or 'the user is an illegal user' or 'access refusal' or 'request failure' and the like. After receiving the access rejection response message, the Portal authentication server displays an access failure prompt to the user equipment, which is not limited by the invention.
In the second case: the two-dimensional code authorization component stores an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are respectively the same as the first authorized guarantee user identifier and the first two-dimensional code identifier in the request information, but the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is expired, the service life is expired, the current time for receiving the request information is out of the range of the service life, the service life is the first service life input by the second authorized guarantee user, and the response information is determined to be the access refusing response information.
In the third case: the two-dimensional code authorization component stores an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier in the request information, the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is not expired, the service life is not expired, the current time for receiving the request information is within the range of the service life, an unassigned account is not in the account information table, and the response information is determined to be response information refusing access. For example, if there are 10 accounts in the account information table and 10 accounts have been completely allocated, it is considered that there is no unassigned account in the account information table.
In a fourth case: the two-dimensional code authorization component stores an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier, the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is not expired, the service life is not expired, the current time for receiving the request information is within the service life range, an unassigned account is in the account information table, and an account for the user equipment to perform network access authentication is determined from the unassigned accounts. And determining that the response information is access approval response information, wherein the access approval response information comprises the account number for the user equipment to perform network access authentication.
Optionally, the first two-dimensional code information may further include a two-dimensional code network access authentication type identifier, where the two-dimensional code network access authentication type identifier is used to indicate that the first two-dimensional code information is used for requesting an account for network access authentication, and correspondingly, before executing S102, the method further includes: and determining whether the first two-dimensional code information contains the two-dimensional code network access authentication type identifier. If the first two-dimensional code information includes the two-dimensional code network access authentication type identifier, the first two-dimensional code is considered to be used for requesting a network access authentication account, and the subsequent step S103 is executed. And if the first two-dimensional code information does not contain the two-dimensional code network access authentication type identification, the first two-dimensional code is considered to be a common two-dimensional code, and the processing is carried out according to the prior art.
It should be noted that it may also be determined that the first two-dimensional code information is used for requesting the network access authentication account through other manners, for example, if the first two-dimensional code information includes an identifier of an authorized vouching user and a first two-dimensional code identifier, the first two-dimensional code information is considered to be used for requesting the network access authentication account, and if not, the first two-dimensional code information is considered to be a common two-dimensional code, and the processing is performed according to the prior art.
S103: and performing network access authentication management on the user equipment according to the response information sent by the two-dimension code authorization component.
If the response information is response information refusing to access, the Portal authentication server feeds back an access failure prompt to the user equipment.
If the response information is the access agreement response information, the Portal authentication server authenticates through the access authentication server by adopting the account number in the access agreement response information, namely, the Portal authentication server sends the account number in the access agreement response information to the access authentication server, the access authentication server enters authentication according to the account number, and after the access authentication server passes the authentication, the Portal authentication server informs the wireless access equipment to open an internet access channel of user equipment (visitor), and the visitor can use the wireless network to surf the internet.
The network access authentication server in this embodiment may be Remote user dial-up (RADIUS) authentication.
In the embodiment, a Portal authentication server receives first two-dimensional code information sent by a wireless access device, the first two-dimensional code information is information obtained by user equipment through scanning a two-dimensional code, the first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier, request information for obtaining an account number for network access authentication of the user equipment is sent to a two-dimensional code authorization component, the request information comprises the identifier of the first authorized guarantee user and the first two-dimensional code identifier, so that the two-dimensional code authorization component obtains the relationship between the user equipment and the first authorized guarantee user, response information is sent to the Portal authentication server according to the identifier of the first authorized guarantee user and the first two-dimensional code identifier, and the Portal authentication server conducts network access authentication management on the user equipment according to the response information sent by the two-dimensional code authorization component. In the process, the identity relationship between the visitor and the authorized guarantee user can be obtained by scanning the two-dimensional code by the visitor, and then an account is allocated to the visitor from the corresponding account information table according to the identification of the authorized guarantee user in the two-dimensional code and the identification of the two-dimensional code, so that the efficiency of the authentication of the use permission of the wireless network is improved.
Fig. 2 is a schematic flowchart of a second embodiment of the authentication method based on the two-dimensional code, as shown in fig. 2, an execution subject of this embodiment is a two-dimensional code authorization component, which may be an independent entity component or a component integrated in other network devices, and the method of this embodiment is as follows:
s201: and receiving request information sent by a Portal authentication server for acquiring an account number for the user equipment to perform network access authentication.
The request information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier, the identifier of the first authorized guarantee user and the first two-dimensional code identifier are obtained by scanning a two-dimensional code by user equipment, and the user equipment is user equipment used by a visitor.
After the two-dimensional code authorization component receives the request information, because the request information contains the identifier of the first authorization guarantee user and the identifier of the first two-dimensional code, the identity of the visitor is obtained, namely the visitor of which first authorization guarantee user the visitor belongs to.
S202: and determining response information sent to the Portal authentication server according to the identification information of the first authorized guarantee user and the first two-dimensional code identification.
The response information can be access refusing response information and access agreeing response information, and the access refusing response information is used for indicating a Portal authentication server to refuse to carry out network access authentication on the user equipment. The access agreement response message contains an account number for the user equipment to carry out network access authentication. The specific manner of determining the response information by the two-dimensional code authorization component is the same as four cases in S102, which are described in detail in S102 in the embodiment shown in fig. 1 and are not described herein again.
The Portal authentication server performs authentication management according to the response information, and specifically, the method for performing authentication management on different response information refers to the detailed description in S103 in the embodiment shown in fig. 1, which is not repeated herein.
It is worth mentioning that before executing S201, the following steps may be further included:
the two-dimension code authorization component receives requirement information input by a second authorization guarantee user, wherein the requirement information comprises the number of first users, the first internet surfing time and a first service life; generating a second two-dimensional code, wherein the second two-dimensional code comprises an identifier of a second authorized guarantee user and a second two-dimensional code identifier; and generating an account information table corresponding to the identifier of the second authorized guarantee user and the second two-dimensional code identifier according to the demand information, wherein the number of accounts contained in the account information table is the number of the first user, the maximum internet surfing time of each account in the account information table is the first internet surfing time, and the service life of each account in the account information table is the first service life.
Optionally, after the two-dimensional code authorization component receives the requirement information input by the second authorization guarantee user, the method further includes: and judging whether the requirement information is in the guarantee authority range of the second authorized guarantee user, wherein the network management center allocates authorization levels to different second authorized guarantee users, different authorization levels correspond to different guarantee authority ranges, the guarantee authority ranges comprise the maximum number of users capable of guaranteeing, the maximum internet surfing time length and a guarantee period, the guarantee period refers to the maximum guarantee duration, and corresponds to the first service life in the requirement information. And if the required information input by the second authorized guarantee user is out of the guarantee authority corresponding to the authorization level of the second authorized guarantee user, refusing to generate the second two-dimensional code and refusing to generate the identifier of the second authorized guarantee user and the account information table corresponding to the identifier of the second two-dimensional code. And if the required information input by the second authorized guarantee user is within the guarantee authority corresponding to the authorization level of the second authorized guarantee user, generating a second two-dimensional code, and generating an account information table corresponding to the identifier of the second authorized guarantee user and the identifier of the second two-dimensional code according to the required information. Optionally, the two-dimension code authorization component further defines a second authorization guarantee webpage popped up after Portal authentication of the user at different authorization levels.
In this embodiment, request information for acquiring an account number for a user equipment to perform network access authentication, which is sent by a Portal authentication server, is received, where the request information includes an identifier of a first authorized secured user and a first two-dimensional code identifier, and the identifier of the first authorized secured user and the first two-dimensional code identifier are acquired by the user equipment through scanning a two-dimensional code, so that a relationship between the user equipment and the first authorized secured user can be obtained, and then response information sent to the Portal authentication server is determined according to the identifier of the first authorized secured user and the first two-dimensional code identifier, so that the Portal authentication server performs network access authentication management according to the response information. In the process, the identity relationship between the visitor and the authorized guarantee user can be obtained by scanning the two-dimensional code by the visitor, and then an account is allocated to the visitor from the corresponding account information table according to the identification of the authorized guarantee user in the two-dimensional code and the identification of the two-dimensional code, so that the efficiency of the authentication of the use permission of the wireless network is improved.
Fig. 3 is a schematic flowchart of a third embodiment of the authentication method based on two-dimensional codes according to the present invention, as shown in fig. 3, the method of this embodiment is as follows:
s301: the two-dimensional code authorization component obtains an authorization level of a second authorization vouching user.
S302: the two-dimensional code authorization component receives requirement information input by a second authorization guarantee user.
The demand information includes the number of the first users, the first internet surfing time and a first service life.
S303: the two-dimensional code authorizing means judges whether or not the required information is within the guarantee authority range corresponding to the authorization level of the second authorization guarantee user, if so, S305 is executed, and if not, S304 is executed.
S304: the authority is limited and the operation fails.
S305: and the two-dimension code authorization component generates a second two-dimension code and generates an account information table corresponding to the identifier of the second authorization guarantee user and the identifier of the second two-dimension code according to the demand information.
S306: the wireless access equipment redirects first two-dimensional code information acquired by the user equipment through scanning the first two-dimensional code to a Portal authentication server.
The first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier.
S307: the Portal authentication server sends request information for acquiring an account number for the user equipment to perform network access authentication to the two-dimensional code authorization component, wherein the request information comprises an identifier of a first authorization guarantee user and a first two-dimensional code identifier.
And S308, the two-dimensional code authorization component determines response information sent to a Portal authentication server according to the identification information of the first authorization guarantee user and the identification of the first two-dimensional code.
S309: and performing network access authentication management on the user equipment according to the response information sent by the two-dimension code authorization component.
If the response information is response information refusing to access, the Portal authentication server feeds back an access failure prompt to the user equipment.
If the response information is the access agreement response information, the Portal authentication server adopts the account number in the access agreement response information to carry out authentication through the network access authentication server. After the authentication of the network access authentication server is passed, S310 is executed.
S310: the network access authentication server informs the wireless access equipment to open the network access channel of the user equipment (visitor).
Thus, the visitor can surf the internet by using the wireless network.
In the embodiment, the identity relationship between the visitor and the authorized guarantee user can be obtained by scanning the two-dimensional code by the visitor, and then the account is distributed to the visitor from the corresponding account information table according to the identification of the authorized guarantee user and the identification of the two-dimensional code.
Fig. 4 is a schematic structural diagram of a first embodiment of an authentication apparatus based on a two-dimensional code according to the present invention, where the apparatus of this embodiment may be deployed in an entrance authentication server, and the apparatus of this embodiment includes: the wireless access device comprises a receiving module 401, a sending module 402 and an authentication module 403, wherein the receiving module 401 is configured to receive first two-dimensional code information sent by a wireless access device, the first two-dimensional code information is information obtained by scanning a first two-dimensional code by a user device, and the first two-dimensional code information includes an identifier of a first authorized warranty user and an identifier of the first two-dimensional code; the sending module 402 is configured to send request information for obtaining an account for the user equipment to perform network access authentication to a two-dimensional code authorization component, where the request information includes an identifier of the first authorized vouching user and the first two-dimensional code identifier, so that the two-dimensional code authorization component sends response information according to the identifier of the first authorized vouching user and the first two-dimensional code identifier; the authentication module 403 is configured to perform network access authentication management on the user equipment according to the response information sent by the two-dimensional code authorization component.
In the embodiment, the response information is access denial response information or access approval response information, where the access denial response information is used to indicate that the user equipment is denied to perform access authentication, and the access approval response information includes an account number for the user equipment to perform access authentication;
if the response information is the response information of access agreement; the authentication module 403 is specifically configured to send an account for performing network access authentication on the user equipment in the access agreement response message to the network access authentication server, so that the network access authentication server performs network access authentication on the user equipment according to the account. And if the response information is response information for refusing access, the authentication module is specifically used for feeding back an access failure prompt to the user equipment.
In the embodiment, the first two-dimensional code information further includes a two-dimensional code network access authentication type identifier, where the two-dimensional code authentication type identifier is used to indicate that the first two-dimensional code information is used for requesting an account for network access authentication;
the sending module 402 is further configured to determine that the first two-dimensional code information includes the two-dimensional code network access authentication type identifier before sending the request information for obtaining the account number for the user equipment to perform network access authentication to the two-dimensional code authorization component.
The apparatus of the above embodiment may correspondingly perform the technical solution of the method embodiment shown in fig. 1, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 5 is a schematic structural diagram of a second embodiment of an authentication apparatus based on a two-dimensional code according to the present invention, the apparatus of this embodiment is deployed in a two-dimensional code authorization component, and the apparatus of this embodiment includes a receiving module 501 and a processing module 502, where the receiving module 501 is configured to receive request information sent by an entry authentication server to acquire an account for a user equipment to perform network access authentication, where the request information includes an identifier of a first authorized guarantee user and a first two-dimensional code identifier, and the identifier of the first authorized guarantee user and the first two-dimensional code identifier are acquired by the user equipment through scanning a first two-dimensional code; the processing module 502 is configured to determine response information sent to the portal authentication server according to the identifier of the first authorization guaranty user and the identifier of the first two-dimensional code, so that the portal authentication server performs access authentication management according to the response information.
In the embodiment, the processing module 502 is further configured to receive, by the receiving module 501, requirement information input by a second authorized vouching user before the receiving module receives request information sent by an entry authentication server to acquire an account for a user equipment to perform network access authentication, where the requirement information includes a first user number, a first internet surfing time length, and a first service life; generating a second two-dimensional code, wherein the second two-dimensional code comprises an identifier of a second authorized guarantee user and a second two-dimensional code identifier; and generating an account information table corresponding to the identifier of the second authorized guarantee user and the second two-dimensional code identifier according to the demand information, wherein the number of accounts contained in the account information table is the number of the first user, the maximum internet surfing time of each account in the account information table is the first internet surfing time, and the service life of each account in the account information table is the first service life.
In the above embodiment, the response information is access denial response information, and the access denial response information is used to instruct the portal authentication server to deny the access authentication to the user equipment; the processing module 502 is specifically configured to determine that the response information is response information for denying access if an account information table corresponding to an identifier of a second authorized guaranteed user and a second two-dimensional code identifier, which are respectively the same as the identifier of the first authorized guaranteed user and the identifier of the first two-dimensional code, is not stored; or, if an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier is stored, but the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is expired, determining the response information as response information for refusing access; or, if an account information table corresponding to a second authorized guaranteed user identifier and a second two-dimensional code identifier which are the same as the first authorized guaranteed user identifier and the first two-dimensional code identifier is stored, and the service life of the account information table corresponding to the second authorized guaranteed user identifier and the second two-dimensional code identifier is not expired, but the account information table does not have an unassigned account, determining that the response information is response information refusing access
In the embodiment, the response information is access approval response information, and the access approval response information includes an account number for the user equipment to perform network access authentication; the processing module 502 is specifically configured to determine an account for the user equipment to perform network entry authentication from the unassigned accounts if an account information table corresponding to a second authorized guaranteed user identifier and a second two-dimensional code identifier, which are the same as the first authorized guaranteed user identifier and the first two-dimensional code identifier, is stored, and a lifetime of the account information table corresponding to the second authorized guaranteed user identifier and the second two-dimensional code identifier is not expired, and the account information table has unassigned accounts, determine the response information as access agreement response information, where the access agreement response information includes an account for the user equipment to perform network entry authentication.
The apparatus of the above embodiment may correspondingly perform the technical solution of the method embodiment shown in fig. 2, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 6 is a schematic structural diagram of a first embodiment of the two-dimensional code-based authentication system according to the present invention, where the system of this embodiment includes a two-dimensional code-based authentication device 601 and a two-dimensional code-based authentication device 602, where the two-dimensional code-based authentication device 601 may adopt the device in the embodiment shown in fig. 4, the two-dimensional code-based authentication device 602 may adopt the device in the embodiment shown in fig. 5, the two-dimensional code-based authentication device 601 may be used to execute the technical solution in the embodiment of the method shown in fig. 1, and the two-dimensional code-based authentication device 602 may be used to execute the technical solution in the embodiment of the method shown in fig. 2, and specific structures and functions thereof are not described herein again, and the two-dimensional code authentication method related to the system may refer to the above-described embodiment.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (15)
1. An authentication method based on two-dimensional codes is characterized by comprising the following steps:
receiving first two-dimensional code information sent by wireless access equipment, wherein the first two-dimensional code information is information obtained by scanning a first two-dimensional code by user equipment, and the first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier;
sending request information for acquiring an account number for the user equipment to perform network access authentication to a two-dimensional code authorization component, wherein the request information comprises an identifier of the first authorization guarantee user and the first two-dimensional code identifier, so that the two-dimensional code authorization component sends response information according to the identifier of the first authorization guarantee user and the first two-dimensional code identifier;
and performing network access authentication management on the user equipment according to the response information sent by the two-dimension code authorization component.
2. The method according to claim 1, wherein the response information is access denial response information or access agreement response information, wherein the access denial response information is used to indicate that the user equipment is denied to perform access authentication, and the access agreement response information includes an account for the user equipment to perform access authentication;
if the response information is the response information of access agreement;
the network access authentication management of the user equipment according to the response information sent by the two-dimension code authorization component comprises the following steps:
and sending an account number for the user equipment to perform network access authentication in the access agreement response message to a network access authentication server, so that the network access authentication server performs network access authentication on the user equipment according to the account number.
3. The method according to claim 1 or 2, wherein the first two-dimensional code information further includes a two-dimensional code network access authentication type identifier, and the two-dimensional code authentication type identifier is used for indicating an account number for requesting network access authentication of the first two-dimensional code information;
before sending request information for acquiring an account for the user equipment to perform network access authentication to a two-dimensional code authorization component, the method further includes:
and determining that the first two-dimension code information contains the two-dimension code network access authentication type identification.
4. An authentication method based on two-dimensional codes is characterized by comprising the following steps:
receiving request information sent by an entrance authentication server and used for acquiring an account number for user equipment to perform network access authentication, wherein the request information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier, and the identifier of the first authorized guarantee user and the first two-dimensional code identifier are acquired by scanning a first two-dimensional code by the user equipment;
and determining response information sent to the entrance authentication server according to the identifier of the first authorization guarantee user and the first two-dimensional code identifier, so that the entrance authentication server performs access authentication management according to the response information.
5. The method according to claim 4, wherein before receiving the request information for acquiring the account for the user equipment to perform the network access authentication, which is sent by the portal authentication server, the method further comprises:
receiving demand information input by a second authorized guarantee user, wherein the demand information comprises the number of first users, the first internet surfing time and a first service life;
generating a second two-dimensional code, wherein the second two-dimensional code comprises an identifier of a second authorized guarantee user and a second two-dimensional code identifier;
and generating an account information table corresponding to the identifier of the second authorized guarantee user and the second two-dimensional code identifier according to the demand information, wherein the number of accounts contained in the account information table is the number of the first users, the maximum internet surfing time of each account in the account information table is the first internet surfing time, and the service life of each account in the account information table is the first service life.
6. The method according to claim 5, wherein the response message is a response message of access denial, and the response message of access denial is used to instruct the portal authentication server to deny the user equipment from performing network access authentication;
the determining, according to the identifier of the first authorized vouching user and the first two-dimensional code identifier, response information to be sent to the portal authentication server includes:
if an account information table corresponding to the identifier of the second authorized guarantee user and the identifier of the second two-dimensional code which are respectively the same as the identifier of the first authorized guarantee user and the identifier of the first two-dimensional code is not stored, determining the response information as response information refusing to access; or,
if an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier is stored, but the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is expired, determining that the response information is response information refusing access; or,
and if an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier is stored, the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is not expired, but the account information table does not have an unassigned account, determining that the response information is response information refusing access.
7. The method according to claim 5, wherein the response information is an access agreement response information, and the access agreement response information includes an account for the user equipment to perform network access authentication;
the determining, according to the identifier of the first authorized vouching user and the first two-dimensional code identifier, response information to be sent to the portal authentication server includes:
if an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier is stored, and the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is not expired, and an unassigned account is in the account information table, determining an account for the user equipment to perform network access authentication from the unassigned account, determining that the response information is access approval response information, wherein the access approval response information comprises an account for the user equipment to perform network access authentication.
8. An authentication apparatus based on a two-dimensional code, comprising:
the wireless access device comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving first two-dimensional code information sent by the wireless access device, the first two-dimensional code information is information obtained by scanning a first two-dimensional code by user equipment, and the first two-dimensional code information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier;
a sending module, configured to send, to a two-dimensional code authorization component, request information for obtaining an account for the user equipment to perform network access authentication, where the request information includes an identifier of the first authorization and guarantee user and the first two-dimensional code identifier, so that the two-dimensional code authorization component sends response information according to the identifier of the first authorization and guarantee user and the first two-dimensional code identifier;
and the authentication module is used for carrying out network access authentication management on the user equipment according to the response information sent by the two-dimension code authorization component.
9. The apparatus according to claim 8, wherein the response information is access denial response information or access agreement response information, where the access denial response information is used to indicate that network access authentication is denied for the user equipment, and the access agreement response information includes an account for the user equipment to perform network access authentication;
if the response information is the response information of access agreement;
the authentication module is specifically configured to send an account for the user equipment to perform network access authentication in the access agreement response message to a network access authentication server, so that the network access authentication server performs network access authentication on the user equipment according to the account.
10. The device according to claim 8 or 9, wherein the first two-dimensional code information further includes a two-dimensional code network access authentication type identifier, and the two-dimensional code authentication type identifier is used to indicate that the first two-dimensional code information is used for requesting an account for network access authentication;
the sending module is further configured to determine that the first two-dimensional code information includes the two-dimensional code network access authentication type identifier before sending, to a two-dimensional code authorization component, request information for obtaining an account number for the user equipment to perform network access authentication.
11. An authentication apparatus based on a two-dimensional code, comprising:
the system comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving request information which is sent by an entrance authentication server and used for acquiring an account number for user equipment to carry out network access authentication, the request information comprises an identifier of a first authorized guarantee user and a first two-dimensional code identifier, and the identifier of the first authorized guarantee user and the first two-dimensional code identifier are acquired by the user equipment through scanning a first two-dimensional code;
and the processing module is used for determining response information sent to the entrance authentication server according to the identifier of the first authorization guarantee user and the first two-dimensional code identifier so as to enable the entrance authentication server to carry out network access authentication management according to the response information.
12. The apparatus according to claim 11, wherein the processing module is further configured to receive, by the receiving module, requirement information input by a second authorized vouching user before the receiving module receives request information sent by an entry authentication server to acquire an account for a user equipment to perform access authentication, where the requirement information includes a first user number, a first internet surfing time length, and a first lifetime; generating a second two-dimensional code, wherein the second two-dimensional code comprises an identifier of a second authorized guarantee user and a second two-dimensional code identifier; and generating an account information table corresponding to the identifier of the second authorized guarantee user and the second two-dimensional code identifier according to the demand information, wherein the number of accounts contained in the account information table is the number of the first users, the maximum internet surfing time of each account in the account information table is the first internet surfing time, and the service life of each account in the account information table is the first service life.
13. The apparatus according to claim 12, wherein the response message is a response message for denying access, and the response message for denying access is used to instruct the portal authentication server to deny the user equipment from performing network access authentication;
the processing module is specifically configured to determine that the response information is response information for denying access if an account information table corresponding to an identifier of a second authorized guaranteed user and a second two-dimensional code identifier, which are the same as the identifier of the first authorized guaranteed user and the first two-dimensional code identifier, is not stored; or if an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier is stored, but the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is expired, determining that the response information is response information refusing access; or if an account information table corresponding to a second authorized guarantee user identifier and a second two-dimensional code identifier which are the same as the first authorized guarantee user identifier and the first two-dimensional code identifier is stored, and the service life of the account information table corresponding to the second authorized guarantee user identifier and the second two-dimensional code identifier is not expired, but the account information table does not have an unassigned account, determining that the response information is response information refusing access.
14. The apparatus according to claim 12, wherein the response information is an access grant response information, and the access grant response information includes an account for the user equipment to perform network access authentication;
the processing module is specifically configured to determine an account for the user equipment to perform network access authentication from the unassigned accounts if an account information table corresponding to a second authorized guaranteed user identifier and a second two-dimensional code identifier, which are the same as the first authorized guaranteed user identifier and the first two-dimensional code identifier, is stored, and the service life of the account information table corresponding to the second authorized guaranteed user identifier and the second two-dimensional code identifier is not expired, and the account information table has unassigned accounts, determine the response information as access approval response information, where the access approval response information includes an account for the user equipment to perform network access authentication.
15. An authentication system based on two-dimensional codes, comprising:
apparatus as claimed in any one of claims 8 to 10 and apparatus as claimed in any one of claims 11 to 14.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310507099.XA CN103532971B (en) | 2013-10-24 | 2013-10-24 | Authentication method, device and system based on two-dimensional code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310507099.XA CN103532971B (en) | 2013-10-24 | 2013-10-24 | Authentication method, device and system based on two-dimensional code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103532971A CN103532971A (en) | 2014-01-22 |
CN103532971B true CN103532971B (en) | 2017-01-25 |
Family
ID=49934650
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310507099.XA Active CN103532971B (en) | 2013-10-24 | 2013-10-24 | Authentication method, device and system based on two-dimensional code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103532971B (en) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104144420B (en) * | 2014-02-26 | 2015-11-25 | 腾讯科技(深圳)有限公司 | A kind of radio switch-in method and relevant device, system |
US9265079B2 (en) * | 2014-03-13 | 2016-02-16 | Microsoft Technology Licensing, Llc | Authentication and pairing of devices using a machine readable code |
CN104254073B (en) * | 2014-09-03 | 2018-02-06 | 深信服网络科技(深圳)有限公司 | The method and device being authenticated to access terminal |
CN104598800A (en) * | 2015-01-21 | 2015-05-06 | 浪潮通用软件有限公司 | Authentication method and authentication system for identity information of grain depot and terminal equipment |
CN107656502A (en) * | 2016-07-26 | 2018-02-02 | 耿跃峰 | A kind of automated machine equipment |
CN106453243B (en) * | 2016-08-29 | 2019-11-29 | 捷开通讯(深圳)有限公司 | The verification method of server, terminal and its authorization code |
CN108347469B (en) | 2017-01-24 | 2021-11-16 | 西门子公司 | Method, device and system for transmitting article information in Internet of things |
CN107155185B (en) * | 2017-06-30 | 2019-12-03 | 迈普通信技术股份有限公司 | It is a kind of to access the authentication method of WLAN, apparatus and system |
CN107454064A (en) * | 2017-07-11 | 2017-12-08 | 上海斐讯数据通信技术有限公司 | A kind of visitor's authentication method and system based on public number |
CN107454594A (en) * | 2017-08-15 | 2017-12-08 | 上海斐讯数据通信技术有限公司 | The method and device of mobile terminal Internet access certification |
CN107580321A (en) * | 2017-09-07 | 2018-01-12 | 上海斐讯数据通信技术有限公司 | A kind of authorization and authentication method and system |
CN109962897B (en) * | 2017-12-26 | 2022-04-12 | 航天信息股份有限公司 | Open platform authentication and access method and system based on two-dimensional code scanning |
CN108810896B (en) * | 2018-07-17 | 2020-11-06 | 上海连尚网络科技有限公司 | Connection authentication method and device of wireless access point |
CN109218038B (en) * | 2018-09-05 | 2022-03-01 | 四川译讯信息科技有限公司 | Multi-language instant session platform |
CN110336870B (en) * | 2019-06-27 | 2024-03-05 | 深圳前海微众银行股份有限公司 | Method, device and system for establishing remote office operation and maintenance channel and storage medium |
CN110856173B (en) * | 2019-11-26 | 2022-11-18 | 维沃移动通信有限公司 | Network access method and device and electronic equipment |
CN112073959B (en) * | 2020-09-18 | 2023-04-07 | 珠海爱迪生智能家居股份有限公司 | Zigbee module management method and network access method |
CN113723126A (en) * | 2021-08-31 | 2021-11-30 | 北京市商汤科技开发有限公司 | Data acquisition method and device, electronic equipment and storage medium |
CN114071650B (en) * | 2021-09-26 | 2024-07-19 | 深圳市酷开网络科技股份有限公司 | Cross-end distribution network method, device, computer equipment and storage medium |
CN114492694A (en) * | 2022-02-08 | 2022-05-13 | 北京城建设计发展集团股份有限公司 | Rack building method and system based on rail transit and electronic equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102630004A (en) * | 2012-04-12 | 2012-08-08 | 华为技术有限公司 | Authentication method for video conference and related device |
CN102821104A (en) * | 2012-08-09 | 2012-12-12 | 腾讯科技(深圳)有限公司 | Authorization method, authorization device and authorization system |
CN103227796A (en) * | 2013-05-06 | 2013-07-31 | 北京灵创众和科技有限公司 | Method and system of sharing contact network based on two-dimensional code |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8677131B2 (en) * | 2011-11-11 | 2014-03-18 | The Vanguard Group, Inc. | Method of securing data in 2D bar codes using SSL |
CN103294938B (en) * | 2012-02-29 | 2016-08-24 | 国际商业机器公司 | Access request verification method and system, authorization message generation method, hardware device |
-
2013
- 2013-10-24 CN CN201310507099.XA patent/CN103532971B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102630004A (en) * | 2012-04-12 | 2012-08-08 | 华为技术有限公司 | Authentication method for video conference and related device |
CN102821104A (en) * | 2012-08-09 | 2012-12-12 | 腾讯科技(深圳)有限公司 | Authorization method, authorization device and authorization system |
CN103227796A (en) * | 2013-05-06 | 2013-07-31 | 北京灵创众和科技有限公司 | Method and system of sharing contact network based on two-dimensional code |
Also Published As
Publication number | Publication date |
---|---|
CN103532971A (en) | 2014-01-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103532971B (en) | Authentication method, device and system based on two-dimensional code | |
CN106875515B (en) | Gate inhibition verifies system and its gate inhibition's verification method | |
CN102111766B (en) | Network accessing method, device and system | |
CN106394486A (en) | Authorization method and system of virtual key and server | |
US8201226B2 (en) | Authorizing network access based on completed educational task | |
CN106559783B (en) | Authentication method, device and system for WIFI network | |
CN1941700A (en) | Granting privileges and sharing resources in a telecommunications system | |
CN105681259A (en) | Open authorization method and apparatus and open platform | |
CN107564140A (en) | A kind of gate inhibition invites authorization identifying system | |
CN110011957B (en) | Security authentication method and device for enterprise account, electronic equipment and storage medium | |
CN107067576A (en) | Intelligent cabinet tenant remote authorization other people use method, apparatus and system | |
EP1449324A1 (en) | Use of a public key key pair in the terminal for authentication and authorisation of the telecommunication user with the network operator and business partners | |
US9185098B2 (en) | Method for user authentication | |
CN107277812A (en) | A kind of wireless network authentication method and system based on Quick Response Code | |
CN104660405A (en) | Business equipment authentication method and equipment | |
CN105703910A (en) | Dynamic password verifying method based on Wechat service number | |
EP2705477A1 (en) | Response to queries by means of the communication terminal of a user | |
CN103428698B (en) | Mobile interchange participant's identity strong authentication method | |
CN108711205B (en) | Visitor authentication system of conference system | |
CN111163063A (en) | Edge application management method and related product | |
CN105812314B (en) | A kind of user logs in the method and unification authentication platform of internet application | |
US11935348B2 (en) | System and method for biometric access control | |
CN109859348A (en) | A kind of authorization method of remote door access, apparatus and system | |
CN115410301B (en) | Visitor invitation access control authority management method, device and system based on two-dimension code | |
CN114448725B (en) | Equipment authentication method, system and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20201225 Address after: 200030 full floor, 4 / F, 190 Guyi Road, Xuhui District, Shanghai Patentee after: Shanghai Ruishan Network Co., Ltd Address before: 12 / F, block a, East Tower, Zhongyi pengao Hotel, 29 Fuxing Road, Haidian District, Beijing 100036 Patentee before: Beijing Star-Net Ruijie Networks Co.,Ltd. |