CN103685311B - A kind of login validation method and equipment - Google Patents
A kind of login validation method and equipment Download PDFInfo
- Publication number
- CN103685311B CN103685311B CN201310738898.8A CN201310738898A CN103685311B CN 103685311 B CN103685311 B CN 103685311B CN 201310738898 A CN201310738898 A CN 201310738898A CN 103685311 B CN103685311 B CN 103685311B
- Authority
- CN
- China
- Prior art keywords
- terminal
- information
- identification code
- result
- subscriber identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Embodiments of the present invention provide a kind of login validation method.For example, the method can include:Message in response to receiving user's request login, show the identification code for identifying the first terminal, so that second terminal carries out the figure that IMAQ obtains the identification code to the identification code, graphic hotsopt login authentication request according to the identification code, login authentication is sent to server to ask, so that the server obtains the content that the subscriber identity information and the identification code of the second terminal are identified according to login authentication request, subscriber identity information according to the second terminal carries out login authentication, the first terminal identified to the identification code returns to the result;The result that the reception server is returned, so as to realize ensureing the purpose of user identity safety.Additionally, embodiments of the present invention additionally provide a kind of login authentication equipment.
Description
Technical field
Embodiments of the present invention are related to security fields, more specifically, embodiments of the present invention are related to a kind of login to test
Card method and apparatus.
Background technology
This part is it is intended that the embodiments of the present invention stated in claims provide background or context.Herein
Description in being included in this part because just do not recognize it is prior art.
The need for for safety or operation, many operators are required for user to be input into identity information in terminal, sign in
Associated server could use related application.But, under some scenes, for example, in the public terminals such as Internet bar, other people
It is very unsafe that identity information is input into private terminal, it is likely that concurrent by wooden horse record while identity information is input into
It is sent to the server specified and causes identity to be stolen.
The content of the invention
Therefore, in the prior art, how login authentication ensure that user identity is safely very bothersome asking
Topic.
Therefore, a kind of login validation method is highly desirable to, to realize ensureing the purpose of user identity safety.
In the present context, embodiments of the present invention are expected to provide a kind of login validation method and equipment.
In the first aspect of embodiment of the present invention, there is provided be applied to the login validation method of first terminal, for example,
Can include:Message in response to receiving user's request login, shows the identification code for identifying the first terminal, so as to
Second terminal carries out the figure that IMAQ obtains the identification code to the identification code, according to the graphic hotsopt of the identification code
Login authentication is asked, and sending login authentication to server asks, so that the server is obtained according to login authentication request
The content that the subscriber identity information of the second terminal and the identification code are identified, the user's body according to the second terminal
Part information carries out login authentication, and the first terminal identified to the identification code returns to the result;What the reception server was returned tests
Card result.
In the second aspect of embodiment of the present invention, there is provided be configured at the login authentication equipment of first terminal, for example,
Can include:Receiving unit is logged in, the message in response to receiving user's request login is configured to, shows described for identifying
The identification code of first terminal, so that second terminal carries out the figure that IMAQ obtains the identification code, root to the identification code
Asked according to the graphic hotsopt login authentication of the identification code, sending login authentication to server asks, so as to the server root
The content that the subscriber identity information and the identification code of the second terminal are identified, root are obtained according to login authentication request
Login authentication is carried out according to the subscriber identity information of the second terminal, the first terminal identified to the identification code returns to checking knot
Really;Checking receiving unit, is configured to the result of the reception server return.
In the third aspect of embodiment of the present invention, there is provided be applied to the login validation method of second terminal, for example,
Can include:The operation of IMAQ is carried out to identification code in response to user, figure is carried out to the identification code shown by first terminal
Figure as collecting identification code, wherein, the identification code is used to identify the first terminal;According to the figure of the identification code
Shape generation login authentication request;Login authentication is sent to server to ask, so that the server please according to the login authentication
The content for asking the subscriber identity information that obtains the second terminal and the identification code to be identified, according to the second terminal
Subscriber identity information carries out login authentication, and the first terminal identified to the identification code returns to the result.
In the fourth aspect of embodiment of the present invention, there is provided be configured at the login authentication equipment of second terminal, for example,
Can include:Collecting unit, is configured to carry out identification code in response to user the operation of IMAQ, and first terminal is shown
The identification code shown carries out the figure that IMAQ is identified code, wherein, the identification code is used to identify the first terminal;Please
Generation unit is sought, is configured to be asked according to the graphic hotsopt login authentication of the identification code;Request unit is sent, is configured to
Login authentication is sent to server to ask, so that the server obtains the second terminal according to login authentication request
The content that subscriber identity information and the identification code are identified, the subscriber identity information according to the second terminal is logged in
Checking, the first terminal identified to the identification code returns to the result.
In the 5th aspect of embodiment of the present invention, there is provided the login validation method of server is applied to, for example, can
To include:Login authentication request in response to receiving second terminal transmission, wherein, the login authentication request is by described second
Terminal according to the graphic hotsopt of identification code, wherein, the figure of the identification code is specifically by second terminal in response to receiving to knowing
Other code carries out the message of IMAQ, and carrying out IMAQ to the identification code shown by first terminal obtains, wherein, the identification
Code is for identifying the first terminal;According to the login authentication request obtain the second terminal subscriber identity information and
The content that the identification code is identified;Subscriber identity information according to the second terminal carries out login authentication;To the identification
The first terminal of code mark returns to the result.
In the 6th aspect of embodiment of the present invention, there is provided the login authentication equipment of server is configured at, for example, can
To include:Checking request receiving unit, is configured to the login authentication request in response to receiving second terminal transmission, wherein,
Login authentication request by the second terminal according to the graphic hotsopt of identification code, wherein, the figure of the identification code is specific
Carry out the message of IMAQ to identification code in response to receiving by second terminal, the identification code shown by first terminal is carried out
IMAQ is obtained, wherein, the identification code is used to identify the first terminal;Extraction unit, is configured to be stepped on according to
The subscriber identity information and the identification code that record checking request obtains the second terminal identify content;Authentication unit, matches somebody with somebody
Put carries out login authentication for the subscriber identity information according to the second terminal;Returning unit, is configured to the identification
The first terminal of code mark returns to the result.
According to the login validation method and equipment of embodiment of the present invention, because user is when first terminal asks to log in,
Need not be input into subscriber identity information, but identification code for identifying first terminal is shown by first terminal, be used by user
The identification code that second terminal shows to first terminal carries out IMAQ and is asked according to the graphic hotsopt login authentication of identification code,
The subscriber identity information and identification code of second terminal are obtained so as to the login authentication request that server sends according to second terminal
The content for being identified, therefore, server can carry out login authentication according to the subscriber identity information of second terminal, to identification code mark
The first terminal of knowledge returns to the result, therefore, user would not also occur user without being input into identity information in first terminal
The safety problem that identity information is stolen in first terminal, realizes the purpose for ensureing user identity safety.
In some possible implementations, identification code can be fed back according to server by first terminal for logging request
The identifying code encrypted and other information generation, because identifying code is encryption shape in terminal and in transmitting procedure
State, can prevent identifying code to be maliciously tampered, therefore, server after the identifying code that code is identified is identified, Ke Yi
Decryption verification code after to first terminal whether be before request log in terminal verify, the result is fed back to correctly
In terminal, user identity safety is further ensured.
In other possible implementations, identification code can by first terminal according to the hardware information of itself and its
He generates information, so that server or second terminal are after the hardware information of the first terminal that code is identified is identified,
The hardware information that can be identified to identification code is compared with common equipment hardware information and obtains common equipment the result, from
And login authentication is carried out with reference to the common equipment the result, further ensure user identity safety.
In other possible implementation, server can also obtain first eventually after login authentication request is received
The corresponding geographical location information of IP at end and the corresponding geographical location information of IP of second terminal, by server or second eventually
End is compared to the two and obtains different-place login the result, so that login authentication is carried out with reference to the different-place login the result,
Further ensure user identity safety.
Brief description of the drawings
Detailed description below, above-mentioned and other mesh of exemplary embodiment of the invention are read by reference to accompanying drawing
, feature and advantage will become prone to understand.In the accompanying drawings, if showing by way of example, and not by way of limitation of the invention
Dry implementation method, wherein:
Fig. 1 schematically shows the application scenarios according to embodiment of the present invention;
Fig. 2 is schematically shown according to one of schematic flow sheet of login validation method of embodiment of the present invention;
Fig. 3 schematically shows the Signalling exchange schematic diagram of the login validation method according to embodiment of the present invention;
Fig. 4 is schematically shown according to one of structural representation of login authentication equipment of embodiment of the present invention;
Fig. 5 schematically shows the two of the schematic flow sheet of the login validation method according to embodiment of the present invention;
Fig. 6 schematically shows the two of the structural representation of the login authentication equipment according to embodiment of the present invention;
Fig. 7 schematically shows the three of the schematic flow sheet of the login validation method according to embodiment of the present invention;
Fig. 8 schematically shows the three of the structural representation of the login authentication equipment according to embodiment of the present invention;
In the accompanying drawings, identical or corresponding label represents identical or corresponding part.
Specific embodiment
Principle of the invention and spirit are described below with reference to some illustrative embodiments.It should be appreciated that providing this
A little implementation methods are used for the purpose of better understood when those skilled in the art and then realizing the present invention, and not with any
Mode limits the scope of the present invention.Conversely, these embodiments are provided so that the disclosure is more thorough and complete, and energy
It is enough that the scope of the present disclosure is intactly conveyed into those skilled in the art.
Art technology technical staff knows, embodiments of the present invention can be implemented as a kind of system, device, equipment,
Method or computer program product.Therefore, the disclosure can be implemented as following form, i.e.,:It is complete hardware, complete soft
Part(Including firmware, resident software, microcode etc.), or the form that hardware and software is combined.
According to the embodiment of the present invention, it is proposed that a kind of login validation method and equipment.
Herein, it is to be understood that any number of elements in accompanying drawing is used to example and unrestricted and any
Name is only used for distinguishing, without any limitation.
Below with reference to some representative embodiments of the invention, principle of the invention and spirit are explained in detail.
Summary of the invention
The inventors discovered that showing the identification code for identifying the terminal by a terminal(For example, Quick Response Code), by user
IMAQ is carried out using another terminal-pair identification code and the login of subscriber identity information is carried according to the graphic hotsopt of identification code
Checking request, so that the login authentication request that server can send according to another terminal obtains subscriber identity information and identification
The content that code is identified, login authentication is carried out according to subscriber identity information, and the terminal identified to identification code returns to the result,
Therefore, user would not also occur subscriber identity information in identification code without being input into identity information in the terminal of identification code mark
The stolen safety problem of the terminal of mark.
After general principle of the invention is described, lower mask body introduces various non-limiting embodiment party of the invention
Formula.
Application scenarios overview
With reference first to Fig. 1, first terminal 101 can be desktop computer, panel computer, intelligent sliding moved end etc., second terminal
102 can be intelligent sliding moved end.Using login validation method provided in an embodiment of the present invention, user is without in first terminal 101
Upper input subscriber identity information, to the identification code that first terminal 101 shows carries out IMAQ and sends using second terminal 102
Carry the login authentication request of subscriber identity information, so that it may so that server 103 carries out the login authentication of user identity, and will step on
The result for recording checking is fed back on first terminal 101, can effectively ensure that the safety of user identity.
One of illustrative methods
With reference to the application scenarios of Fig. 1, it is described with reference to Figure 2 and is applied to according to exemplary embodiment of the invention
The login validation method of one terminal.It should be noted that above-mentioned application scenarios be for only for ease of understanding it is of the invention spirit and
Principle and show, embodiments of the present invention are unrestricted in this regard.Conversely, embodiments of the present invention can be applied
In applicable any scene.
It is provided in an embodiment of the present invention to be applied to first terminal for example, with reference to Fig. 2(For example, the first terminal of Fig. 1
101)One of login validation method schematic flow sheet.As illustrated, a kind of possible implementation method of the present invention can include:
S210, the message in response to receiving user's request login, show the identification code for identifying the first terminal,
So as to second terminal(For example, the second terminal 102 of Fig. 1)The figure that IMAQ obtains the identification code is carried out to the identification code
Shape, the graphic hotsopt login authentication request according to the identification code, to server(For example, the server 103 of Fig. 1)Send and log in
Checking request, so as to the server according to the login authentication request obtain the second terminal subscriber identity information and
The content that the identification code is identified, the subscriber identity information according to the second terminal carries out login authentication, to the identification
The first terminal of code mark returns to the result;
The result that S220, the reception server are returned.
It can be seen that, according to the login validation method of embodiment of the present invention, because user is when first terminal asks to log in, no
Need to be input into subscriber identity information, but identification code for identifying first terminal is shown by first terminal, the is used by user
The identification code that two terminal-pair first terminals show carries out IMAQ and is asked according to the graphic hotsopt login authentication of identification code, from
And the login authentication request that server can send according to second terminal obtains subscriber identity information and the identification of second terminal
The content that code is identified, the subscriber identity information according to second terminal carries out login authentication, to the first terminal that identification code is identified
The result is returned, therefore, user would not also occur subscriber identity information the without being input into identity information in first terminal
The stolen safety problem of one terminal, realizes the purpose for ensureing user identity safety.
It is understood that the identification code described in the embodiment of the present invention can be one-dimension code, Quick Response Code, three-dimension code or
Identification code of other forms etc..Wherein, the generating mode of the identification code is not limited.
For example, a kind of possible implementation can be, before the identification code is shown, first in such as Fig. 1 is whole
Hold the identification code that the hardware information for identification service information, identifying code and/or first terminal is generated at 101.Below, with reference to
A kind of possible signalling diagram of login validation method as shown in Figure 3 describes in detail to the implementation.Such as Fig. 3 institutes
Show, methods described can include:
S310, first terminal receive the message that user's request is logged in;
For example, first terminal can be presented the webpage or application program for logging in, user passes through webpage or application program
Send the message that request is logged in.
S320, first terminal send the message that request is logged in server;
S330, server generate the identifying code for identifying first terminal(For example, Quick Response Code)And encrypt;
S340, server return to the identifying code encrypted to first terminal;
S350, first terminal are according to business information(For example, instant messaging service, game service etc.), identifying code, and/or
The hardware information of person's first terminal(For example, board chip set model, CPU models, video card model, hard disk model, memory size,
The information such as display and panel model)Generate hardware information for identification service information, identifying code and/or first terminal
Identification code, wherein, the business information can be determined by first terminal according to user's request registering service, first terminal display institute
State identification code;
For example, can be generated for identification service letter according to the hardware information of business information, identifying code and first terminal
The two-dimension code image of the hardware information of breath, identifying code and first terminal, two-dimension code image is shown in first terminal.
S360, second terminal carry out the figure that IMAQ obtains the identification code to the identification code, according to the knowledge
The graphic hotsopt of other code carries the login authentication request of subscriber identity information;
It should be noted that the mode that second terminal obtains subscriber identity information is not limited.For example, second terminal is in user couple
Can be the second terminal for having been completed User logs in when identification code carries out the operation of IMAQ, or, or not
Carry out the second terminal of User logs in.If having been completed the second terminal of User logs in, then second terminal can from
Subscriber identity information is extracted in the information that family logs in(Such as, user account);If not carrying out the second terminal of User logs in,
Second terminal can require user input subscriber identity information, and the input according to user obtains subscriber identity information(Such as, account with
And password).It is of course also possible to there are other implementations, in the present invention and it is not limited.
S370, second terminal send the login authentication and ask to server;
In business information, identifying code, the hardware information of first terminal that S380, server are identified according to identification code one
Individual or multiple and second terminal subscriber identity information carries out login authentication;
S390, server return to the result to the first terminal that the identifying code is identified.
It can be seen that, in the embodiment, identification code can be used for the hardware information of identification service information, identifying code, first terminal
Any one or more in three, or can be also used for identifying other information, wherein:
When identification service information, server can to whether allow user to should business log in verify;
It is in itself that by server for encrypting, the inside can be with due to identifying code when the identifying code that mark has been encrypted
Including timestamp, the information such as general unique identifier, any other terminal cannot be decrypted cannot distort, therefore, server is being obtained
To after the identifying code that identification code is identified, identifying code can be verified after decryption verification code, be tested equivalent to login
Whether the targeted terminal of card request is that the terminal that request is logged in before is verified, thereby may be ensured that and feeds back the result
Onto correct terminal, user identity safety is further ensured;
When the hardware information of first terminal is identified, what server or second terminal can be identified identification code
Hardware information is compared with the common equipment hardware information for prestoring and obtains common equipment the result, so that server can be tied
Closing the common equipment the result carries out login authentication, so as to when other people usurp identity logs by other equipment, can be with
It is verified out according to hardware information difference, further ensures user identity safety.
In addition, in alternatively possible implementation, server is stepped in the user's request for receiving first terminal transmission
After the message of record, can also include:Obtain the IP of first terminal(Internet protocol)Address, inquires the IP address of first terminal
Corresponding geographical location information;Server can also include after the login authentication request for receiving second terminal transmission:Obtain
The IP address of second terminal is taken, the corresponding geographical location information of IP address of second terminal is inquired;By the first terminal
The corresponding geographical location information of IP of the corresponding geographical location information of IP and the second terminal is compared and must be stepped on to strange land
Record the result, so that server carries out login authentication according to the different-place login the result;Or, returned to second terminal
The corresponding geographical location information of IP of first terminal and the corresponding geographical location information of IP of second terminal, will by second terminal
The corresponding geographical location information of IP of the first terminal and the corresponding geographical location information of IP of the second terminal are carried out
Compare and obtain different-place login the result, so that server carries out login authentication according to the different-place login the result.
In this embodiment, the corresponding geographical location information of IP can be for example the information such as city, province, due to server
Or second terminal is to the corresponding geographical positions of the IP of the corresponding geographical location information of IP and the second terminal of first terminal
Confidence breath is compared and obtains different-place login the result, so that server can be stepped on reference to the different-place login the result
Record checking, further ensures user identity safety.
In the implementation for combining above two embodiment, second terminal can be in the common equipment the result
When non-common equipment and/or the different-place login the result are different-place login, presentation whether authorize non-common equipment and/or
The prompt message of person's different-place login, if second terminal receives the authorization message of user input, institute is sent to the server
Authorization message is stated, so that server carries out login authentication according to the subscriber identity information of authorization message and the second terminal.
One of example devices
After one of method of exemplary embodiment of the invention is described, next, with reference to Fig. 4 to example of the present invention
One of the login authentication equipment of first terminal that is configured at of property implementation method is introduced.
It is a kind of one of login authentication device structure schematic diagram provided in an embodiment of the present invention for example, with reference to Fig. 4.As schemed
Shown, a kind of possible implementation method for being configured at the equipment of first terminal can include:Receiving unit 410 is logged in, can be with
The message in response to receiving user's request login is configured to, the identification code for identifying the first terminal is shown, so as to
Second terminal carries out the figure that IMAQ obtains the identification code to the identification code, according to the graphic hotsopt of the identification code
Login authentication is asked, and sending login authentication to server asks, so that the server is obtained according to login authentication request
The content that the subscriber identity information of the second terminal and the identification code are identified, the user's body according to the second terminal
Part information carries out login authentication, and the first terminal identified to the identification code returns to the result;Checking receiving unit 420, can
To be configured to the result of the reception server return.
It can be seen that, the login authentication equipment according to embodiment of the present invention, because user is when first terminal asks to log in, no
Need to be input into subscriber identity information, but the knowledge for identifying first terminal is shown in first terminal by login receiving unit 410
Other code, IMAQ is carried out and according to the life of the figure of identification code by user using the identification code that second terminal shows to first terminal
Into login authentication request, so that the login authentication request that server can send according to second terminal obtains the user of second terminal
The content that identity information and identification code are identified, the subscriber identity information according to second terminal carries out login authentication, then by testing
The result that the first terminal that the card the reception server of receiving unit 420 identify to identification code is returned, therefore, user need not be the
One terminal is input into identity information, and the safety problem that subscriber identity information is stolen in first terminal would not also occur, and realizes guarantor
The purpose of card user identity safety.
It is understood that the identification code described in the embodiment of the present invention can be one-dimension code, Quick Response Code, three-dimension code or
Identification code of other forms etc..Wherein, the generating mode of the identification code is not limited.For example, the login authentication equipment can be with
Including:Identification code generation unit 430, may be configured to generation for identification service information, identifying code and/or first terminal
Hardware information the identification code, wherein, the identifying code be used for identify the first terminal, specifically by server receive
First terminal is generated, encrypts and returned to after the message that the request of first terminal is logged in, and the business information please according to user
The business of login is asked to determine, business information, identifying code, the hardware letter of first terminal identified according to identification code so as to server
The subscriber identity information of one or more and second terminal in breath carries out login authentication.
It can be seen that, in the implementation, identification code can be used for the hardware letter of identification service information, identifying code, first terminal
Breath three in any one or more, or can be also used for identify other information, wherein, when identification service information,
Server can to whether allow user to should business log in verify;When the identifying code that mark has been encrypted, by
Encrypted state is in terminal and in transmitting procedure in the identifying code encrypted, can prevent identifying code from maliciously being usurped
Change, therefore, server can be tested identifying code after the identifying code that code is identified is identified after decryption verification code
Card, equivalent to login authentication is asked targeted terminal whether be before the terminal that logs in of request verify, such that it is able to
Guarantee feeds back in correct terminal the result, further ensures user identity safety;When used for mark first terminal
Hardware information when, the hardware information that server or second terminal can be identified identification code is hard with the common equipment for prestoring
Part information is compared and obtains common equipment the result, so that server can be stepped on reference to the common equipment the result
Record checking, so as to when other people usurp identity logs by other equipment, be verified out, further ensures user
Identity security.
It should be noted that identification code generation unit 430 uses dotted lines in fig. 4, to represent that the unit is not this hair
The necessary unit of bright equipment.
The two of illustrative methods
After describing and being applied to one of login validation method of first terminal, with reference to Fig. 5, the present invention is implemented
The two of the login validation method for being applied to second terminal that example is provided describe in detail.
It is provided in an embodiment of the present invention to be applied to second terminal for example, with reference to Fig. 5(For example, shown in Fig. 1 second is whole
End 102)Login validation method schematic flow sheet two.As illustrated, a kind of possible implementation method of the present invention can include:
S510, the operation for carrying out IMAQ to identification code in response to user, enter to the identification code shown by first terminal
Row IMAQ is identified the figure of code, wherein, the identification code is used to identify the first terminal.
It is understood that the identification code described in the embodiment of the present invention can be one-dimension code, Quick Response Code, three-dimension code or
Identification code of other forms etc..
It should be noted that second terminal is when user carries out the operation of IMAQ to identification code, can be complete
Into the second terminal of User logs in, or, or the second terminal of User logs in is not carried out.Do not enter in the present invention
Row limitation.For example:IMAQ can be carried out to identification code in response to user after user is logged in by second terminal
Operation;Or, after IMAQ is carried out to identification code, the operation that user logs in first terminal is carried out automatically;Or,
It is both that user is logged in first terminal while step S520 below is asked according to the graphic hotsopt login authentication of identification code
Request, be also second terminal log in request;Again or, it is possibility to have any other is possible with reality for being combined of login
Existing mode, in the present invention and is not limited.
S520, according to the graphic hotsopt login authentication of the identification code ask.
For example, in a kind of possible implementation, can be identified to the figure of the identification code, the knowledge is obtained
The hardware information of business information, identifying code and/or first terminal that other code is identified;By business information, identifying code and/or
The hardware information of first terminal, and the subscriber identity information of the second terminal is carried in checking request, and generation checking please
Ask;Or, in alternatively possible implementation, can be by the subscriber identity information of the second terminal and the identification
The figure of code is carried in checking request, generates checking request;
Wherein, the identification code can be generated by first terminal, for identification service information, identifying code and/or described
The hardware information of first terminal, wherein, the identifying code is used to identify the first terminal.Specifically, signaling as shown in Figure 3
Schematic diagram, the identifying code can specifically be tested after the message of request login of first terminal is received by server described in generation
Card code is simultaneously encrypted, then identifying code is returned into first terminal, wherein, the business information can be asked by first terminal according to user
The business of login is asked to determine.
Can be used for the hardware information of identification service information, identifying code and/or first terminal due to identification code, therefore,
In business information, identifying code, the hardware information of first terminal that server can be identified according to identification code one or more,
And the subscriber identity information of second terminal carries out login authentication.When identification service information, server can to whether
Allow user to should business log in verify;When the identifying code that mark has been encrypted, can prevent identifying code from being disliked
Meaning is distorted, and be thereby may be ensured that and is fed back in correct terminal the result, further ensures user identity safety;When with
In identify first terminal hardware information when, the hardware information that server or second terminal can be identified identification code with it is pre-
The common equipment hardware information deposited is compared and obtains common equipment the result, so that server can combine the common equipment
The result carries out login authentication, so as to when other people usurp identity logs by other equipment, be verified out, enters
One step ensure that user identity safety.
S530, to server send login authentication ask, so as to the server according to the login authentication request obtain
The content that the subscriber identity information of the second terminal and the identification code are identified, the user's body according to the second terminal
Part information carries out login authentication, and the first terminal identified to the identification code returns to the result.
It can be seen that, according to the login validation method of embodiment of the present invention, because user is when first terminal asks to log in, no
Need to be input into subscriber identity information, but identification code for identifying first terminal is shown by first terminal, the is used by user
The identification code that two terminal-pair first terminals show carries out IMAQ and is asked according to the graphic hotsopt login authentication of identification code, from
And the login authentication request that server can send according to second terminal obtains subscriber identity information and the identification of second terminal
The content that code is identified, the subscriber identity information according to second terminal carries out login authentication, to the first terminal that identification code is identified
The result is returned, therefore, user would not also occur subscriber identity information the without being input into identity information in first terminal
The stolen safety problem of one terminal, realizes the purpose for ensureing user identity safety.
In a kind of possible implementation of the embodiment of the present invention, rightness of business can also be obtained by following steps and tested
Card result, identifying code legitimate verification result, one or more in common equipment the result, and then server can basis
One or more in rightness of business the result, identifying code legitimate verification result, common equipment the result are stepped on
Record checking, specifically, for example, the embodiment of the present invention can also include following either step or combination:
When the identification code is used for identification service information, the server can be received and returned for the checking request
Rightness of business the result, wherein, the rightness of business the result specifically can be by server according to the checking
Request obtains the subscriber identity information and the business information, corresponding with the subscriber identity information to the business information
Legitimate traffic be compared and obtain;When the identification code is used for identity verification code, the server can be received for institute
The identifying code legitimate verification result of checking request return is stated, wherein, the identifying code legitimate verification result specifically can be by
Server obtains the identifying code according to the checking request, and the identifying code is decrypted, to the identifying code mark after decryption
Whether terminal is judged by the terminal that the identifying code is identified in generation;When the identification code is used to identify first
During the hardware information of terminal, the common equipment the result that the server is returned for the checking request can be received, its
In, the common equipment the result specifically can by server according to the checking request obtain the subscriber identity information with
And the hardware information of the first terminal, whether the hardware information to the first terminal is that the subscriber identity information is corresponding
Usual hardware information is judged;When the identification code is used to identify the hardware information of first terminal, institute can be received
The usual hardware information corresponding with the subscriber identity information that server is returned for the checking request is stated, by the identification
The hardware information of the first terminal that code is identified is compared with the usual hardware information, obtains common equipment the result.
In the alternatively possible implementation of the embodiment of the present invention, different-place login can also be obtained by following steps and tested
Result is demonstrate,proved, and then server can be combined with different-place login the result and carry out login authentication.Specifically, the embodiment of the present invention is also
May comprise steps of:
Receive the corresponding geographical position letters of IP of the first terminal that the server is returned for the checking request
The corresponding geographical location information of IP of breath and the second terminal, by the corresponding geographical location information of the IP of the first terminal
And the corresponding geographical location information of IP of the second terminal is compared and obtains different-place login the result;Or, receive
The different-place login the result that the server is returned for the checking request, wherein, the different-place login the result tool
Body is received after the checking request by the server, inquire about the first terminal the corresponding geographical location information of IP and
The corresponding geographical location information of IP of the second terminal, by the corresponding geographical location information of the IP of the first terminal and institute
The corresponding geographical location information of IP for stating second terminal is compared and obtains.
It should be noted that in the implementation for obtaining different-place login the result is compared by second terminal execution, also
The different-place login the result can be returned to server so that server combination login authentication result is carried out from second terminal
Login authentication.
In the implementation for combining above two embodiment, second terminal can be in the common equipment the result
When non-common equipment and/or the different-place login the result are different-place login, presentation whether authorize non-common equipment and/or
The prompt message of person's different-place login, if second terminal receives the authorization message of user input, institute is sent to the server
Authorization message is stated, so that server carries out login authentication according to the subscriber identity information of authorization message and the second terminal.
Or, in the implementation for combining above two embodiment, if the server determine that subscriber identity information is verified
Pass through, and rightness of business the result is that legal, described common equipment the result is different described in common equipment, and/or person
Ground login authentication result is non-different-place login, then can directly determine the result for logging in login successfully.
The two of example devices
Describing after the two of method of exemplary embodiment of the invention, next, with reference to Fig. 6 to example of the present invention
The two of the login authentication equipment for being configured at second terminal of property implementation method are introduced.
It is the two of a kind of login authentication device structure schematic diagram provided in an embodiment of the present invention for example, with reference to Fig. 6.As schemed
Shown, a kind of possible implementation method for being configured at the equipment of second terminal can include:
Collecting unit 610, may be configured to carry out identification code in response to user the operation of IMAQ, to first eventually
The shown identification code in end carries out the figure that IMAQ is identified code, wherein, the identification code is used to identify described first
Terminal;Request generation unit 620, may be configured to be asked according to the graphic hotsopt login authentication of the identification code;Sending please
Unit 630 is sought, may be configured to send login authentication request to server, so that the server is according to the login authentication
Request obtains the content that the subscriber identity information and the identification code of the second terminal are identified, according to the second terminal
Subscriber identity information carry out login authentication, to the identification code identify first terminal return the result.
It can be seen that, second terminal login authentication equipment is configured at according to embodiment of the present invention, gathered by collecting unit 610
The figure of the identification code that first terminal shows, request generation unit 620 is asked according to the graphic hotsopt login authentication of identification code, hair
Send request unit 630 to send login authentication to server to ask, so that server can be believed according to the user identity of second terminal
Breath carries out login authentication, and the first terminal identified to identification code returns to the result, therefore, user is without in first terminal input
Identity information, would not also occur the safety problem that subscriber identity information is stolen in first terminal, realize guarantee user identity
The purpose of safety.
In a kind of possible implementation of the embodiment of the present invention, as shown in fig. 6, the request generation unit 620 can be with
Including:First identification subelement 621, may be configured to be identified the figure of the identification code, obtain the identification code
The hardware information of the business information, identifying code and/or the first terminal that are identified;Generation subelement 622, may be configured to by
The hardware information of business information, identifying code and/or first terminal, and the subscriber identity information of the second terminal is carried
In checking request, checking request is generated;Or, the request generation unit 620 may be configured to the second terminal
The figure of login account and the identification code is carried in checking request, generates checking request.
It should be noted that wherein described identification code can specifically be generated by first terminal, for identification service information, test
The hardware information of card code and/or the first terminal, wherein, the identifying code can be used for identifying the first terminal.Tool
Body ground, signalling diagram as shown in Figure 3 is specifically raw after the message that the request for receiving first terminal is logged in by server
Into, encrypt and return to first terminal, wherein, the business that the business information can be logged in by first terminal according to user's request
It is determined that.
In a kind of possible implementation of the embodiment of the present invention, can also be tested by obtaining rightness of business with lower unit
Card result, identifying code legitimate verification result, one or more in common equipment the result, and then server can basis
One or more in rightness of business the result, identifying code legitimate verification result, common equipment the result are stepped on
Record checking, specifically, for example, the embodiment of the present invention can also include following any unit or combination:Business the result is received
Unit 640, may be configured to, when the identification code is used for identification service information, receive the server and be directed to the checking
The rightness of business the result for returning is asked, wherein, the rightness of business the result is specifically by server according to
Checking request obtains the subscriber identity information and the business information, to the business information and the subscriber identity information
Corresponding legitimate traffic is compared and obtains;Identifying code the result receiving unit 650, may be configured to when the identification code
During for identity verification code, the identifying code legitimate verification result that the server is returned for the checking request is received, its
In, the identifying code legitimate verification result specifically obtains the identifying code by server according to the checking request, to described
Identifying code is decrypted, and whether the terminal to the identifying code mark after decryption is carried out by the terminal that the identifying code is identified in generation
Judgement is obtained;Conventional the result receiving unit 660, may be configured to be used to identify the hard of first terminal when the identification code
During part information, the common equipment the result that the server is returned for the checking request is received, wherein, described commonly using sets
Standby the result specifically obtains the subscriber identity information and the first terminal by server according to the checking request
Hardware information, whether the hardware information to the first terminal is that the corresponding usual hardware information of the subscriber identity information is carried out
Judgement is obtained;General information receiving unit 670, may be configured to be used to identify the hardware letter of first terminal when the identification code
During breath, usual hardware corresponding with the subscriber identity information letter that the server is returned for the checking request is received
Breath;First conventional judging unit, is configured to received general information receiving unit the identification code is identified first
The hardware information of terminal is compared with the usual hardware information, obtains common equipment the result.
In the alternatively possible implementation of the embodiment of the present invention, can also be tested by obtaining different-place login with lower unit
Result is demonstrate,proved, and then server can be combined with different-place login the result and carry out login authentication.Specifically, the embodiment of the present invention is also
Can include:Geography information receiving unit 680, may be configured to receive what the server was returned for the checking request
The corresponding geographical location information of IP of the first terminal and the corresponding geographical location information of IP of the second terminal;First
Geography information comparing unit 681, the IP of first terminal that may be configured to be received geography information receiving unit is corresponding
The corresponding geographical location information of IP of geographical location information and second terminal is compared and obtains different-place login the result;Or
Person, geographical the result receiving unit 682 may be configured to receive the strange land that the server is returned for the checking request
Login authentication result, wherein, after the different-place login the result specifically receives the checking request by the server, look into
The corresponding geographical location information of IP of the first terminal and the corresponding geographical location information of IP of the second terminal are ask, will
The corresponding geographical location information of IP of the first terminal and the corresponding geographical location information of IP of the second terminal are carried out
Compare and obtain.
In the implementation for combining above two embodiment, the login authentication equipment for being configured at second terminal can also be wrapped
Include:Tip element 690, may be configured to when the common equipment the result is non-common equipment and/or the strange land
When login authentication result is different-place login, whether presentation authorizes the prompt message of non-common equipment and/or different-place login;Authorize
Transmitting element 691, if may be configured to receive the authorization message of user input, the mandate is sent to the server
Information, so that server carries out login authentication according to the subscriber identity information of authorization message and the second terminal.
It should be noted that in the present embodiment, the first identification subelement 621, generation subelement 622, business checking knot
Fruit receiving unit 640, identifying code the result receiving unit 650, conventional the result receiving unit 660, general information are received
Unit 670, geography information receiving unit 680, the first geography information comparing unit 681, geographical the result receiving unit 682,
Tip element 690, mandate transmitting element 691 use dotted lines in figure 6, to represent that the unit is not necessity of present device
Unit.
The three of illustrative methods
Describing after the two of method of exemplary embodiment of the invention, next, with reference to Fig. 7 to example of the present invention
The three of the login validation method for being applied to server of property implementation method are introduced.
It is provided in an embodiment of the present invention to be applied to server for example, with reference to Fig. 7(For example, the server shown in Fig. 1
103)Login validation method schematic flow sheet three.As illustrated, this is applied to one kind of the login validation method of server
Possible implementation method can include:S710, the login authentication request in response to receiving second terminal transmission, wherein, it is described
Login authentication request by the second terminal according to the graphic hotsopt of identification code, wherein, the figure of the identification code is specifically by the
Two terminal responses carry out the message of IMAQ in receiving to identification code, and image is carried out to the identification code shown by first terminal
Collect, wherein, the identification code is used to identify the first terminal;It should be noted that wherein, the second terminal can
Being the second terminal for having been completed User logs in, or, or the second terminal of User logs in is not carried out.In this hair
In bright and it is not limited.
S720, subscriber identity information and the identification code that the second terminal is obtained according to login authentication request
The content for being identified.
For example, in a kind of possible implementation, the login authentication request can be worked as and carry the interior of identification code mark
Hold and second terminal subscriber identity information when, parse login authentication request obtain the content of the identification code mark with
And the subscriber identity information of second terminal;Or, in alternatively possible implementation, the login authentication request can be worked as
Carry identification code figure and second terminal subscriber identity information when, parse login authentication request and obtain the identification
The figure of code and the subscriber identity information of second terminal, the figure to the identification code are identified obtaining the identification code mark
The content of knowledge.
It should be noted that wherein, the identification code can specifically be generated by first terminal, for identification service information,
The hardware information of identifying code and/or the first terminal, wherein, the identifying code can be used for identifying the first terminal,
Signalling diagram as shown in Figure 3, the identifying code specifically can be by server in disappearing that the request for receiving first terminal is logged in
Generated after breath, encrypted and return to first terminal, wherein, the business information can be stepped on by first terminal according to user's request
The business of record determines.
When identification service information, server can to whether allow user to should business log in verify;
When the identifying code that mark has been encrypted, identifying code can be prevented to be maliciously tampered, thereby may be ensured that the result is anti-
It is fed in correct terminal, further ensures user identity safety;When the hardware information of first terminal is identified, service
The hardware information that device or second terminal can be identified identification code is compared with the common equipment hardware information for prestoring
To common equipment the result, so that server can carry out login authentication with reference to the common equipment the result, so as at it
When other people usurp identity logs by other equipment, can be verified out, further ensure user identity safety.
S730, login authentication is carried out according to the subscriber identity information of the second terminal.It should be noted that according to described
The subscriber identity information that login authentication request obtains the second terminal can be the user that user has logged in second terminal
Identity information, login authentication is carried out according to the subscriber identity information, can be specifically to determine user according to the subscriber identity information
Logged in second terminal, determine that authentication passes through.Or, obtain described second according to login authentication request
The subscriber identity information of terminal can be the subscriber identity information that user preserves but be not logged in second terminal, according to user's body
Part information carries out login authentication, is matched in legal identity information database according to the subscriber identity information
Determine whether authentication passes through.Again or, it is possibility to have other possible implementations, do not carry out in the present invention
Limitation.
For example, in a kind of possible implementation, business information, identifying code, that can be identified according to identification code
The subscriber identity information of one or more and second terminal in the hardware information of one terminal carries out login authentication.
S740, the first terminal identified to the identification code return to the result.
It can be seen that, according to the login validation method of embodiment of the present invention, because user in first terminal without being input into identity
Information, would not also occur the safety problem that subscriber identity information is stolen in first terminal, realize guarantee user identity safety
Purpose.
In a kind of possible implementation of the embodiment of the present invention, rightness of business can also be obtained by following steps and tested
Card result, identifying code legitimate verification result, one or more in common equipment the result, and then server can basis
One or more in rightness of business the result, identifying code legitimate verification result, common equipment the result are stepped on
Record checking, specifically, for example, the embodiment of the present invention can also include following either step or combination:
When the identification code is used for identification service information, the user identity letter can be obtained according to the checking request
Breath and the business information, are compared to business information legitimate traffic corresponding with the subscriber identity information and obtain
Rightness of business the result;
When the identification code is used for identity verification code, the identifying code can be obtained according to the checking request, to institute
Identifying code decryption is stated, whether the terminal to the identifying code mark after decryption is entered by the terminal that the identifying code is identified in generation
Row judgement is verified a yard legitimate verification result;
When the identification code is used to identify the hardware information of first terminal, can be according to the checking request be obtained
The hardware information of subscriber identity information and the first terminal, whether the hardware information to the first terminal is the user
The corresponding usual hardware information of identity information carries out judging to obtain common equipment the result;
When the identification code is used to identify the hardware information of first terminal, the subscriber identity information correspondence can be inquired about
Usual hardware information, the usual hardware information is returned to the second terminal, so that second terminal is by the identification code institute
The hardware information of the first terminal of mark is compared with the usual hardware information and obtains common equipment the result.
In the alternatively possible implementation of the embodiment of the present invention, different-place login can also be obtained by following steps and tested
Result is demonstrate,proved, and then server can be combined with different-place login the result and carry out login authentication.Specifically, the embodiment of the present invention is also
May comprise steps of:
Inquire about the corresponding geographical location information of IP of the first terminal and the corresponding geography of IP of the second terminal
Positional information, the corresponding geographical location information of IP of the first terminal and the IP of the second terminal are returned to second terminal
Corresponding geographical location information, so that second terminal is by the corresponding geographical location information of the IP of the first terminal and described
The corresponding geographical location information of IP of two terminals is compared and obtains different-place login the result;
Or,
Inquire about the corresponding geographical location information of IP of the first terminal and the corresponding geography of IP of the second terminal
Positional information, by the corresponding geographical positions of the IP of the corresponding geographical location information of the IP of the first terminal and the second terminal
Confidence breath is compared and obtains different-place login the result.
It should be noted that in the implementation for obtaining different-place login the result is compared by second terminal execution, also
The different-place login the result can be returned to server so that server combination login authentication result is carried out from second terminal
Login authentication.
In a kind of implementation for combining above two embodiment, the user's body described in step S730 according to second terminal
Part information carries out login authentication and is specifically as follows, according to the rightness of business the result, identifying code legitimate verification result,
It is any one or more in common equipment the result, different-place login the result, and the second terminal user's body
Part information carries out login authentication.
In another implementation for combining above two embodiment, according to the user of second terminal described in step S730
Identity information carries out login authentication and is specifically as follows, according to the rightness of business the result, identifying code legitimate verification knot
The subscriber identity information of one or more and the second terminal really, in authorization message carries out login authentication;
Wherein, the authorization message can specifically be received from second terminal, by second terminal when the common equipment is verified
Result is non-common equipment and/or the different-place login the result when being different-place login, and whether presentation authorizes non-conventional set
After the standby and/or prompt message of different-place login, the authorization message according to user input is obtained.
Again or, combine above two embodiment implementation in, if the server determine that subscriber identity information is tested
Card passes through, and rightness of business the result is that legal, described common equipment the result is described in common equipment, and/or person
Different-place login the result is non-different-place login, then can directly determine the result for logging in login successfully.
In addition, also, it should be noted that the server described in the embodiment of the present invention can be divided by function, being taken by multiple
Business device composition, for example:The server can be including service server, account authentication server, IP servers etc..Wherein, industry
Business server can be used for preserving the data such as the business information related to User logs in;Account authentication server can be used for checking
User identity, generation identifying code, admin-authentication code, identification identifying code etc.;It is corresponding that IP servers can be used for inquiry IP address
Geographical location information etc..It is understood that the server described in the embodiment of the present invention is not limited in a kind of this framework, can be with
Be it is any can apply login validation method provided in an embodiment of the present invention three server.
The three of example devices
Describing after the three of method of exemplary embodiment of the invention, next, with reference to Fig. 8 to example of the present invention
The three of the login authentication equipment for being configured at server of property implementation method are introduced.
It is the three of a kind of login authentication device structure schematic diagram provided in an embodiment of the present invention for example, with reference to Fig. 8.As schemed
Shown, a kind of possible implementation method for being configured at the login authentication equipment of server can include:
Checking request receiving unit 810, may be configured to please in response to receiving the login authentication of second terminal transmission
Ask, wherein, login authentication request by the second terminal according to the graphic hotsopt of identification code, wherein, the identification code
Figure is specifically carried out the message of IMAQ in response to receiving by second terminal to identification code, to the knowledge shown by first terminal
Other code carries out IMAQ and obtains, wherein, the identification code is used to identify the first terminal;Extraction unit 820, can configure
In subscriber identity information and the identification code for obtaining the second terminal according to login authentication request are identified
Hold;Authentication unit 830, may be configured to carry out login authentication according to the subscriber identity information of the second terminal;Return single
Unit 840, the first terminal that may be configured to be identified to the identification code returns to the result.
It can be seen that, according to the login authentication equipment for being configured at server of embodiment of the present invention, extraction unit 820 can be with root
The login authentication received according to checking request receiving unit 810 is asked, and obtains subscriber identity information and the institute of the second terminal
State identification code and identify content, authentication unit 830 can carry out login authentication according to the subscriber identity information of the second terminal,
The first terminal that returning unit 840 can be identified to the identification code returns to the result, therefore, user is without in first terminal
Input identity information, would not also occur the safety problem that subscriber identity information is stolen in first terminal, realize guarantee user
The purpose of identity security.
In a kind of possible implementation of the embodiment of the present invention, as shown in figure 8, the extraction unit 820, can configure
For when login authentication request carries the subscriber identity information of identification code and second terminal, parsing the login authentication
Request obtains the content of the identification code mark and the subscriber identity information of second terminal;Or, the extraction unit 820,
May be configured to when the login authentication asks to carry the subscriber identity information of the figure of identification code and second terminal, solution
Analyse the login authentication request and obtain the figure of the identification code and the subscriber identity information of second terminal, to the identification code
Figure be identified obtaining the content of the identification code mark;
Wherein, the identification code can specifically be generated by first terminal, for identification service information, identifying code and/or
The hardware information of the first terminal, wherein, the identifying code can specifically be stepped on by server in the request for receiving first terminal
Generated after the message of record, encrypted and return to first terminal, for identifying the first terminal, wherein, the business information
Can be determined according to the business that user's request is logged in by first terminal;
In the implementation, the authentication unit 830 may be configured to the business letter identified according to identification code
The subscriber identity information of one or more and second terminal in breath, identifying code, the hardware information of first terminal is logged in
Checking.
In a kind of possible implementation of the embodiment of the present invention, can also be tested by obtaining rightness of business with lower unit
Card result, identifying code legitimate verification result, one or more in common equipment the result, and then can be closed according to business
One or more in method the result, identifying code legitimate verification result, common equipment the result carry out login authentication,
Specifically, for example, the embodiment of the present invention can also include following any unit or combination:
The legal judging unit 850 of business, when may be configured to the identification code for identification service information, according to described
Checking request obtains the subscriber identity information and the business information, to the business information and the subscriber identity information
Corresponding legitimate traffic is compared and obtains rightness of business the result;
Identifying code judging unit 860, may be configured to, when the identification code is used for identity verification code, be tested according to described
Card request obtains the identifying code, and the identifying code is decrypted, and whether the terminal to the identifying code mark after decryption is described testing
The terminal that card code is identified in generation carries out judgement and is verified a yard legitimate verification result;
Second conventional judging unit 870, may be configured to be used to identify the hardware letter of first terminal when the identification code
During breath, the hardware information of the subscriber identity information and the first terminal is obtained according to the checking request, to described
Whether the hardware information of one terminal is that the corresponding usual hardware information of the subscriber identity information carries out judging to obtain common equipment
The result;
General information transmitting element 880, may be configured to be used to identify the hardware letter of first terminal when the identification code
During breath, the corresponding usual hardware information of the subscriber identity information is inquired about, returning to the usual hardware to the second terminal believes
Breath, the hardware information of the first terminal identified the identification code so as to second terminal is compared with the usual hardware information
Relatively obtain common equipment the result.
In the alternatively possible implementation of the embodiment of the present invention, can also be tested by obtaining different-place login with lower unit
Demonstrate,proving result, and then can be combined with different-place login the result carries out login authentication.Specifically, the embodiment of the present invention can also be wrapped
Include:
Geography information transmitting element 890, may be configured to inquire about the corresponding geographical position letters of IP of the first terminal
The corresponding geographical location information of IP of breath and the second terminal, the IP for returning to the first terminal to second terminal is corresponding
The corresponding geographical location information of IP of geographical location information and the second terminal, so that second terminal is by the first terminal
The corresponding geographical location information of IP and the corresponding geographical location information of IP of the second terminal be compared and obtain strange land
Login authentication result;Or, the second geography information comparing unit 891 may be configured to inquire about IP pairs of the first terminal
The corresponding geographical location information of the IP of geographical location information and the second terminal answered, by the IP correspondences of the first terminal
The corresponding geographical location information of the IP of geographical location information and the second terminal be compared obtain different-place login checking
As a result.
In a kind of implementation for combining above two embodiment, the authentication unit 830 may be configured to basis
The rightness of business the result, identifying code legitimate verification result, common equipment the result, different-place login the result
In it is any one or more, and the subscriber identity information of the second terminal carries out login authentication.
In another implementation for combining above two embodiment, the authentication unit 830 may be configured to root
According to one or more in the rightness of business the result, identifying code legitimate verification result, authorization message and described
The login account of second terminal carries out login authentication;
Wherein, the authorization message can specifically be received from second terminal, by second terminal when the common equipment is verified
Result is non-common equipment and/or the different-place login the result when being different-place login, and whether presentation authorizes non-conventional set
After the standby and/or prompt message of different-place login, the authorization message according to user input is obtained.
Again or, combine above two embodiment implementation in, if the server determine that subscriber identity information is tested
Card passes through, and rightness of business the result is that legal, described common equipment the result is described in common equipment, and/or person
Different-place login the result is non-different-place login, then can directly determine the result for logging in login successfully.
It should be noted that in the present embodiment, the legal judging unit 850 of business, identifying code judging unit 860, second
Conventional judging unit 870, general information transmitting element 880, geography information transmitting element 890, the second geography information comparing unit
891 use dotted lines in fig. 8, to represent that the unit is not the necessary unit of present device.
Although it should be noted that be referred to some units or subelement of login authentication equipment in above-detailed,
It is that this division is only not enforceable.In fact, according to the embodiment of the present invention, above-described two or more dresses
The feature and function put can embody in one apparatus.Conversely, the feature and function of an above-described device can be with
It is further divided into being embodied by multiple devices.
Additionally, although the operation of the inventive method is described with particular order in the accompanying drawings, this do not require that or
Hint must be performed according to the particular order these operation, or the operation having to carry out shown in whole could realize it is desired
As a result.Additionally or alternatively, it is convenient to omit some steps, multiple steps are merged into a step to perform, and/or by one
Step is decomposed into execution of multiple steps.
Although describing spirit and principles of the present invention by reference to some specific embodiments, it should be appreciated that, this
Invention is not limited to disclosed specific embodiment, and the division to each side does not mean that the feature in these aspects can not yet
Combination is this to divide merely to the convenience of statement to be benefited.It is contemplated that cover appended claims spirit and
In the range of included various modifications and equivalent arrangements.
Claims (18)
1. a kind of login validation method, is applied to second terminal, including:
The operation of IMAQ is carried out to identification code in response to user, IMAQ is carried out to the identification code shown by first terminal
The figure of code is identified, wherein, the identification code is used to identify the first terminal;
Graphic hotsopt login authentication request according to the identification code;
Login authentication is sent to server to ask, so that the server obtains described second eventually according to login authentication request
The content that the subscriber identity information at end and the identification code are identified, the subscriber identity information according to the second terminal is carried out
Login authentication, the first terminal identified to the identification code returns to the result;
Receive the server for the checking request return the first terminal the corresponding geographical location information of IP with
And the corresponding geographical location information of IP of the second terminal, by the corresponding geographical location information of the IP of the first terminal and
The corresponding geographical location information of IP of the second terminal is compared and obtains different-place login the result;Or, receive described
Server for the checking request return different-place login the result, wherein, the different-place login the result specifically by
The server is received after the checking request, inquires about the corresponding geographical location information of IP of the first terminal and described
The corresponding geographical location information of IP of second terminal, by the corresponding geographical location information of the IP of the first terminal and described
The corresponding geographical location information of IP of two terminals is compared and obtains.
2. method according to claim 1, wherein, it is described to be included according to the request of the graphic hotsopt login authentication of identification code:
Figure to the identification code is identified, and obtains business information, identifying code and/or that the identification code is identified
The hardware information of one terminal;By the hardware information of business information, identifying code and/or first terminal, and the second terminal
Subscriber identity information carry in checking request, generate checking request, or, by the subscriber identity information of the second terminal
And the figure of the identification code is carried in checking request, checking request is generated, so that server is identified according to identification code
Business information, identifying code, the hardware information of first terminal in one or more and second terminal subscriber identity information
Carry out login authentication;
Wherein, the identification code is specifically generated by first terminal, for identification service information, identifying code and/or described first
The hardware information of terminal, wherein, the identifying code is used to identify the first terminal, is specifically receiving first terminal by server
Request log in message after generate, encrypt and return to first terminal, wherein, the business information by first terminal according to
The business that user's request is logged in determines.
3. method according to claim 2, also including following arbitrary steps or combination:
When the identification code is used for identification service information, receives the server and closed for the business that the checking request is returned
Method the result, wherein, the rightness of business the result is specifically by server according to the checking request is obtained
Subscriber identity information and the business information, enter to business information legitimate traffic corresponding with the subscriber identity information
Go to compare and obtain;
When the identification code is used for identity verification code, receives the server and closed for the identifying code that the checking request is returned
Method the result, wherein, the identifying code legitimate verification result specifically obtains institute by server according to the checking request
Identifying code is stated, the identifying code is decrypted, whether the terminal identified to the identifying code after decryption is the identifying code in generation
The terminal for being identified is judged;
When the identification code is used to identify the hardware information of first terminal, receives the server and returned for the checking request
The common equipment the result for returning, wherein, the common equipment the result is specifically obtained by server according to the checking request
To the subscriber identity information and the hardware information of the first terminal, whether the hardware information to the first terminal is institute
The corresponding usual hardware information of subscriber identity information is stated to be judged;
When the identification code is used to identify the hardware information of first terminal, receives the server and returned for the checking request
The usual hardware information corresponding with the subscriber identity information returned, the hardware letter of the first terminal that the identification code is identified
Breath is compared with the usual hardware information, obtains common equipment the result.
4. method according to claim 3, also includes:
When the common equipment the result is that non-common equipment and/or the different-place login the result are different-place login
When, whether presentation authorizes the prompt message of non-common equipment and/or different-place login;
If receiving the authorization message of user input, the authorization message is sent to the server, so as to server according to
The subscriber identity information of authorization message and the second terminal carries out login authentication.
5. a kind of login authentication equipment, is configured at second terminal, including:
Collecting unit, is configured to carry out identification code in response to user the operation of IMAQ, to shown by first terminal
Identification code carries out the figure that IMAQ is identified code, wherein, the identification code is used to identify the first terminal;
Request generation unit, is configured to be asked according to the graphic hotsopt login authentication of the identification code;
Request unit is sent, is configured to send login authentication request to server, so that the server is according to the login
Checking request obtains the content that the subscriber identity information and the identification code of the second terminal are identified, according to described second
The subscriber identity information of terminal carries out login authentication, and the first terminal identified to the identification code returns to the result;
The equipment also includes:
Geography information receiving unit, is configured to receive the first terminal that the server is returned for the checking request
The corresponding geographical location information of IP and the second terminal the corresponding geographical location information of IP;First geography information compares
Unit, is configured to the corresponding geographical location information of IP and second of first terminal for being received geography information receiving unit
The corresponding geographical location information of IP of terminal is compared and obtains different-place login the result;Or, geographical the result is received
Unit, is configured to receive the different-place login the result that the server is returned for the checking request, wherein, it is described different
After ground login authentication result specifically receives the checking request by the server, the IP for inquiring about the first terminal is corresponding
The corresponding geographical location information of IP of geographical location information and the second terminal, by the IP of the first terminal correspondingly
The corresponding geographical location information of IP of reason positional information and the second terminal is compared and obtains.
6. equipment according to claim 5, wherein,
The request generation unit includes:First identification subelement, is configured to be identified the figure of the identification code, obtains
The hardware information of the business information, identifying code and/or the first terminal that are identified to the identification code;Generation subelement, configuration
For by the hardware information of business information, identifying code and/or first terminal, and the second terminal subscriber identity information
Carry in checking request, generate checking request;
Or,
The request generation unit, is configured to carry in the figure of the login account of the second terminal and the identification code
In checking request, checking request is generated;
Wherein, the identification code is specifically generated by first terminal, for identification service information, identifying code and/or described first
The hardware information of terminal, wherein, the identifying code is specifically by server after the message that the request for receiving first terminal is logged in
Generate, encrypt and return to first terminal, for identifying the first terminal, wherein, the business information is by first terminal root
The business logged according to user's request determines.
7. equipment according to claim 6, also including following any unit or combination:
Business the result receiving unit, is configured to, when the identification code is used for identification service information, receive the service
Device for the checking request return rightness of business the result, wherein, the rightness of business the result specifically by
Server obtains the subscriber identity information and the business information according to the checking request, to the business information and institute
State the corresponding legitimate traffic of subscriber identity information and be compared and obtain;
Identifying code the result receiving unit, is configured to, when the identification code is used for identity verification code, receive the service
The identifying code legitimate verification result that device is returned for the checking request, wherein, the identifying code legitimate verification result tool
Body obtains the identifying code by server according to the checking request, the identifying code is decrypted, to the identifying code mark after decryption
Whether the terminal of knowledge is judged by the terminal that the identifying code is identified in generation;
Conventional the result receiving unit, is configured to, when the identification code is used to identify the hardware information of first terminal, connect
The common equipment the result that the server is returned for the checking request is received, wherein, the common equipment the result
The hardware information of the subscriber identity information and the first terminal is specifically obtained according to the checking request by server, it is right
Whether the hardware information of the first terminal is that the corresponding usual hardware information of the subscriber identity information is judged;
General information receiving unit, is configured to, when the identification code is used to identify the hardware information of first terminal, receive institute
State the usual hardware information corresponding with the subscriber identity information that server is returned for the checking request;First conventional sentences
Disconnected unit, is configured to the hardware information of the first terminal that the identification code is identified for being received general information receiving unit
It is compared with the usual hardware information, obtains common equipment the result.
8. equipment according to claim 7, also includes:
Tip element, is configured to when the common equipment the result is that non-common equipment and/or the different-place login are tested
When card result is different-place login, whether presentation authorizes the prompt message of non-common equipment and/or different-place login;
Transmitting element is authorized, if being configured to receive the authorization message of user input, is awarded to described in server transmission
Power information, so that server carries out login authentication according to the subscriber identity information of authorization message and the second terminal.
9. a kind of login validation method, is applied to server end, including:
Login authentication request in response to receiving second terminal transmission, wherein, the login authentication request is whole by described second
The graphic hotsopt according to identification code is held, wherein, the figure of the identification code is specifically by second terminal in response to receiving to identification
Code carries out the message of IMAQ, carries out IMAQ to the identification code shown by first terminal and obtains, wherein, the identification code
For identifying the first terminal;
What the subscriber identity information and the identification code for obtaining the second terminal according to login authentication request were identified
Content;
Subscriber identity information according to the second terminal carries out login authentication;
The first terminal identified to the identification code returns to the result;
Inquire about the corresponding geographical location information of IP of the first terminal and the corresponding geographical position of IP of the second terminal
Information, the corresponding geographical location information of IP of the first terminal and the IP correspondences of the second terminal are returned to second terminal
Geographical location information, so as to second terminal by the corresponding geographical location information of the IP of the first terminal and it is described second eventually
The corresponding geographical location information of IP at end is compared and obtains different-place login the result;Or, inquire about the first terminal
The corresponding geographical location information of IP of the corresponding geographical location information of IP and the second terminal, by the IP of the first terminal
The corresponding geographical location information of IP of corresponding geographical location information and the second terminal is compared and obtains different-place login
The result.
10. method according to claim 9, wherein, the use that the second terminal is obtained according to login authentication request
The content of family identity information and identification code mark includes:
When the subscriber identity information of content and second terminal that login authentication request carrying identification code is identified, parsing
The login authentication request obtains the content of the identification code mark and the subscriber identity information of second terminal;Or, work as institute
State login authentication request carry identification code figure and second terminal subscriber identity information when, parsing the login authentication please
The subscriber identity information of the figure and second terminal that obtain the identification code, the figure to the identification code is asked to be identified
To the content of identification code mark;
Wherein, the identification code is specifically generated by first terminal, for identification service information, identifying code and/or described first
The hardware information of terminal, wherein, the identifying code is specifically by server after the message that the request for receiving first terminal is logged in
Generate, encrypt and return to first terminal, for identifying the first terminal, wherein, the business information is by first terminal root
The business logged according to user's request determines;
Wherein, the subscriber identity information according to second terminal carries out login authentication specifically, being identified according to identification code
The subscriber identity information of one or more and second terminal in business information, identifying code, the hardware information of first terminal enters
Row login authentication.
11. methods according to claim 10, also including following arbitrary steps or combination:
When the identification code is used for identification service information, the subscriber identity information and institute are obtained according to the checking request
Business information is stated, it is legal to be compared the business of obtaining to business information legitimate traffic corresponding with the subscriber identity information
Property the result;
When the identification code is used for identity verification code, the identifying code is obtained according to the checking request, to the identifying code
Whether decryption, the terminal to the identifying code mark after decryption by the terminal that the identifying code is identified in generation judge
To identifying code legitimate verification result;
When the identification code is used to identify the hardware information of first terminal, the user identity is obtained according to the checking request
The hardware information of information and the first terminal, whether the hardware information to the first terminal is the subscriber identity information
Corresponding usual hardware information carries out judging to obtain common equipment the result;
When the identification code is used to identify the hardware information of first terminal, the subscriber identity information is inquired about corresponding conventional hard
Part information, the usual hardware information is returned to the second terminal, so as to second terminal the identification code is identified the
The hardware information of one terminal is compared with the usual hardware information and obtains common equipment the result.
12. methods according to claim 11, wherein, the subscriber identity information according to second terminal carries out login and tests
Card is specifically, according to the rightness of business the result, identifying code legitimate verification result, common equipment the result, different
It is any one or more in ground login authentication result, and the subscriber identity information of the second terminal carries out login authentication.
13. methods according to claim 11, wherein, the subscriber identity information according to second terminal carries out login and tests
Card is specifically, or many in the rightness of business the result, identifying code legitimate verification result, authorization message
The subscriber identity information of the individual and second terminal carries out login authentication;
Wherein, the authorization message is specifically received from second terminal, by second terminal when the common equipment the result is non-
When common equipment and/or the different-place login the result are different-place login, presentation whether authorize non-common equipment and/or
After the prompt message of different-place login, the authorization message according to user input is obtained.
A kind of 14. login authentication equipment, are configured at server, including:
Checking request receiving unit, is configured to the login authentication request in response to receiving second terminal transmission, wherein, it is described
Login authentication request by the second terminal according to the graphic hotsopt of identification code, wherein, the figure of the identification code is specifically by the
Two terminal responses carry out the message of IMAQ in receiving to identification code, and image is carried out to the identification code shown by first terminal
Collect, wherein, the identification code is used to identify the first terminal;
Extraction unit, is configured to be obtained according to the login authentication request subscriber identity information and the institute of the second terminal
State identification code and identify content;
Authentication unit, is configured to carry out login authentication according to the subscriber identity information of the second terminal;
Returning unit, the first terminal for being configured to be identified to the identification code returns to the result;
The equipment also includes:
Geography information transmitting element, is configured to inquire about the corresponding geographical location information of IP and described of the first terminal
The corresponding geographical location information of IP of two terminals, the corresponding geographical location information of IP of the first terminal is returned to second terminal
And the corresponding geographical location information of IP of the second terminal, so that second terminal is corresponding by the IP of the first terminal
The corresponding geographical location information of IP of reason positional information and the second terminal is compared and obtains different-place login checking knot
Really;Or, the second geography information comparing unit, be configured to inquire about the corresponding geographical location information of IP of the first terminal with
And the corresponding geographical location information of IP of the second terminal, by the corresponding geographical location information of the IP of the first terminal and
The corresponding geographical location information of IP of the second terminal is compared and obtains different-place login the result.
15. equipment according to claim 14, wherein, the extraction unit is configured to be asked when the login authentication
During the subscriber identity information of carrying identification code and second terminal, parse the login authentication request and obtain the identification code mark
Content and second terminal subscriber identity information;Or, when the login authentication request carry identification code figure and
During the subscriber identity information of second terminal, figure and second terminal that the login authentication request obtains the identification code are parsed
Subscriber identity information, be identified obtaining the content of the identification code mark to the figure of the identification code;
Wherein, the identification code is specifically generated by first terminal, for identification service information, identifying code and/or described first
The hardware information of terminal, wherein, the identifying code is specifically by server after the message that the request for receiving first terminal is logged in
Generate, encrypt and return to first terminal, for identifying the first terminal, wherein, the business information is by first terminal root
The business logged according to user's request determines;
Wherein, the authentication unit, is configured to according in identification code business information, identifying code, the hardware information of first terminal
The subscriber identity information of one or more and second terminal carry out login authentication.
16. equipment according to claim 15, also including following any unit or combination:
The legal judging unit of business, when being configured to the identification code for identification service information, obtains according to the checking request
It is corresponding with the subscriber identity information to the business information legal to the subscriber identity information and the business information
Business is compared and obtains rightness of business the result;
Identifying code judging unit, is configured to, when the identification code is used for identity verification code, be obtained according to the checking request
The identifying code, decrypts to the identifying code, and whether the terminal to the identifying code mark after decryption is that the identifying code is being generated
When the terminal that is identified carry out judgement and be verified a yard legitimate verification result;
Second conventional judging unit, is configured to when the identification code is used to identify the hardware information of first terminal, according to institute
The hardware information that checking request obtains the subscriber identity information and the first terminal is stated, to the hardware of the first terminal
Whether information is that the corresponding usual hardware information of the subscriber identity information carries out judging to obtain common equipment the result;
General information transmitting element, is configured to, when the identification code is used to identify the hardware information of first terminal, inquire about institute
The corresponding usual hardware information of subscriber identity information is stated, the usual hardware information is returned to the second terminal, so as to second
The hardware information of the first terminal that terminal is identified the identification code is compared with the usual hardware information and is commonly used
Device authentication result.
17. equipment according to claim 16, wherein, the authentication unit is configured to according to the rightness of business
In the result, identifying code legitimate verification result, common equipment the result, different-place login the result any one or
Multiple, and the subscriber identity information of the second terminal carries out login authentication.
18. equipment according to claim 16, wherein, the authentication unit is configured to according to the rightness of business
The login account of one or more and the second terminal in the result, identifying code legitimate verification result, authorization message
Number carry out login authentication;
Wherein, the authorization message is specifically received from second terminal, by second terminal when the common equipment the result is non-
When common equipment and/or the different-place login the result are different-place login, presentation whether authorize non-common equipment and/or
After the prompt message of different-place login, the authorization message according to user input is obtained.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310738898.8A CN103685311B (en) | 2013-12-27 | 2013-12-27 | A kind of login validation method and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310738898.8A CN103685311B (en) | 2013-12-27 | 2013-12-27 | A kind of login validation method and equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103685311A CN103685311A (en) | 2014-03-26 |
CN103685311B true CN103685311B (en) | 2017-06-13 |
Family
ID=50321625
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310738898.8A Active CN103685311B (en) | 2013-12-27 | 2013-12-27 | A kind of login validation method and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103685311B (en) |
Families Citing this family (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905206A (en) * | 2014-04-03 | 2014-07-02 | 江苏先安科技有限公司 | Cross-equipment and cross-application identity authentication method based on data image coding |
CN104980400A (en) * | 2014-04-08 | 2015-10-14 | 深圳市腾讯计算机系统有限公司 | Login access control method and login access control server |
CN103945380A (en) * | 2014-04-10 | 2014-07-23 | 深圳市信锐网科技术有限公司 | Method and system for network login authentication based on graphic code |
CN105024986B (en) * | 2014-04-30 | 2019-09-17 | 腾讯科技(深圳)有限公司 | The methods, devices and systems that account number logs in |
CN104378344B (en) | 2014-05-26 | 2016-03-09 | 腾讯科技(深圳)有限公司 | Log-on message transmission method, barcode scanning method and device, background server |
CN103971239A (en) * | 2014-05-28 | 2014-08-06 | 中国农业银行股份有限公司 | Verification method and device |
CN105227307A (en) * | 2014-06-03 | 2016-01-06 | 阿里巴巴集团控股有限公司 | Auth method and system and server data processing method and server |
CN104066203A (en) * | 2014-06-20 | 2014-09-24 | 可牛网络技术(北京)有限公司 | Method and system for generating identifier of mobile device, method for remotely controlling mobile device, and communication terminal |
CN105490809B (en) * | 2014-09-17 | 2020-11-06 | 腾讯科技(深圳)有限公司 | Information acquisition method and device, terminal and server |
CN105763520A (en) * | 2014-12-18 | 2016-07-13 | 阿里巴巴集团控股有限公司 | Network account password recovery method and device, client terminal device and server |
CN104618356B (en) * | 2015-01-20 | 2018-02-16 | 广东欧珀移动通信有限公司 | Auth method and device |
CN105991619B (en) * | 2015-03-05 | 2021-01-15 | 中兴通讯股份有限公司 | Security authentication method and device |
CN104917766B (en) * | 2015-06-10 | 2018-01-05 | 飞天诚信科技股份有限公司 | A kind of two-dimension code safe authentication method |
CN105095729B (en) * | 2015-06-19 | 2018-05-25 | 广州密码科技有限公司 | A kind of Quick Response Code login method, server and system |
CN106651407B (en) * | 2015-07-17 | 2020-12-25 | 阿里巴巴集团控股有限公司 | Data acquisition method and device |
CN105162774B (en) * | 2015-08-05 | 2018-08-24 | 深圳市方迪融信科技有限公司 | Virtual machine entry method, the virtual machine entry method and device for terminal |
CN105162775A (en) * | 2015-08-05 | 2015-12-16 | 深圳市方迪科技股份有限公司 | Logging method and device of virtual machine |
CN106507158B (en) * | 2015-09-06 | 2020-07-14 | 腾讯科技(北京)有限公司 | Information processing method, first terminal and second terminal |
CN105162785B (en) * | 2015-09-07 | 2019-01-04 | 飞天诚信科技股份有限公司 | A kind of method and apparatus registered based on authenticating device |
CN105187450B (en) * | 2015-10-08 | 2019-05-10 | 飞天诚信科技股份有限公司 | A kind of method and apparatus authenticated based on authenticating device |
CN105516135B (en) * | 2015-12-08 | 2020-02-21 | 腾讯科技(深圳)有限公司 | Method and device for account login |
CN106936761A (en) * | 2015-12-29 | 2017-07-07 | 株式会社日立制作所 | A kind of secure log authentication method and system based on Quick Response Code and hardware information |
CN107204959B (en) * | 2016-03-16 | 2020-07-24 | 阿里巴巴集团控股有限公司 | Verification method, device and system of verification code |
CN106060098B (en) * | 2016-08-09 | 2019-07-09 | 北京小米支付技术有限公司 | Processing method, processing unit and the processing system of identifying code |
CN107172025A (en) * | 2017-04-28 | 2017-09-15 | 武汉矽感科技有限公司 | Method for authenticating user identity and device based on multiframe identification code |
CN109600340B (en) * | 2017-09-30 | 2021-04-16 | 腾讯科技(深圳)有限公司 | Operation authorization method, device, terminal and server |
CN108985040B (en) * | 2018-06-29 | 2019-06-28 | 北京海泰方圆科技股份有限公司 | Method and apparatus, storage medium and the processor logged in using cipher key |
CN109150852A (en) * | 2018-07-31 | 2019-01-04 | 海南新软软件有限公司 | A kind of account number safe login method, apparatus and system |
CN109741067B (en) * | 2018-12-19 | 2023-05-30 | 广州羊城通有限公司 | Data processing method and device based on IC card unlocking |
CN109711133B (en) * | 2018-12-26 | 2020-05-15 | 巽腾(广东)科技有限公司 | Identity information authentication method and device and server |
CN109753773A (en) * | 2019-01-08 | 2019-05-14 | 浙江汉默生链商科技有限公司 | A kind of quick auth method and device based on terminal |
CN110427747B (en) * | 2019-06-20 | 2021-12-14 | 中国科学院信息工程研究所 | Identity authentication method and device supporting service security mark |
CN111726331A (en) * | 2019-06-28 | 2020-09-29 | 上海妃鱼网络科技有限公司 | Code scanning login information processing method |
CN110830930B (en) * | 2019-11-19 | 2021-09-24 | 东北石油大学 | Verification code anti-sniffing processing method and device |
CN110995682A (en) * | 2019-11-26 | 2020-04-10 | 深圳市思迪信息技术股份有限公司 | Method and device for preventing multiple terminals from logging in at different places |
CN111245841A (en) * | 2020-01-14 | 2020-06-05 | 杭州涂鸦信息技术有限公司 | Account authorization method and system |
CN113746801B (en) * | 2021-07-30 | 2023-07-11 | 佛山市青松科技股份有限公司 | Communication method, sending terminal, receiving terminal and system based on temporary secret key |
CN113625984A (en) * | 2021-08-16 | 2021-11-09 | 中国工商银行股份有限公司 | Method and device for realizing same screen of mobile terminal and automatic teller machine |
CN115834077B (en) * | 2022-11-11 | 2023-08-01 | 北京深盾科技股份有限公司 | Control method, control system, electronic device and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102111271A (en) * | 2009-12-25 | 2011-06-29 | 林茂聪 | Network security authentication method and device as well as authentication method of hand-held electronic device |
CN102130909A (en) * | 2011-02-22 | 2011-07-20 | 中兴通讯股份有限公司 | Authentication method and system |
CN102724667A (en) * | 2012-05-29 | 2012-10-10 | 中国联合网络通信集团有限公司 | Authentication method, device and system |
CN103001973A (en) * | 2012-12-26 | 2013-03-27 | 百度在线网络技术(北京)有限公司 | Method, system and device used for controlling login and based on two-dimensional code |
CN103023917A (en) * | 2012-12-26 | 2013-04-03 | 百度在线网络技术(北京)有限公司 | Method, system and device for authorization aiming at intelligent household electrical appliance |
CN103152330A (en) * | 2013-02-07 | 2013-06-12 | 百度在线网络技术(北京)有限公司 | Login method, login system and cloud server |
CN103152401A (en) * | 2013-02-07 | 2013-06-12 | 百度在线网络技术(北京)有限公司 | Mobile terminal, login method and system through mobile terminal, and cloud server |
CN103237034A (en) * | 2013-04-28 | 2013-08-07 | 北京小米科技有限责任公司 | Login method and device |
CN103457951A (en) * | 2013-09-02 | 2013-12-18 | 小米科技有限责任公司 | Method and device for allowing multiple terminals to login to server |
-
2013
- 2013-12-27 CN CN201310738898.8A patent/CN103685311B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102111271A (en) * | 2009-12-25 | 2011-06-29 | 林茂聪 | Network security authentication method and device as well as authentication method of hand-held electronic device |
CN102130909A (en) * | 2011-02-22 | 2011-07-20 | 中兴通讯股份有限公司 | Authentication method and system |
CN102724667A (en) * | 2012-05-29 | 2012-10-10 | 中国联合网络通信集团有限公司 | Authentication method, device and system |
CN103001973A (en) * | 2012-12-26 | 2013-03-27 | 百度在线网络技术(北京)有限公司 | Method, system and device used for controlling login and based on two-dimensional code |
CN103023917A (en) * | 2012-12-26 | 2013-04-03 | 百度在线网络技术(北京)有限公司 | Method, system and device for authorization aiming at intelligent household electrical appliance |
CN103152330A (en) * | 2013-02-07 | 2013-06-12 | 百度在线网络技术(北京)有限公司 | Login method, login system and cloud server |
CN103152401A (en) * | 2013-02-07 | 2013-06-12 | 百度在线网络技术(北京)有限公司 | Mobile terminal, login method and system through mobile terminal, and cloud server |
CN103237034A (en) * | 2013-04-28 | 2013-08-07 | 北京小米科技有限责任公司 | Login method and device |
CN103457951A (en) * | 2013-09-02 | 2013-12-18 | 小米科技有限责任公司 | Method and device for allowing multiple terminals to login to server |
Also Published As
Publication number | Publication date |
---|---|
CN103685311A (en) | 2014-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103685311B (en) | A kind of login validation method and equipment | |
CN110086608B (en) | User authentication method, device, computer equipment and computer readable storage medium | |
CN103107996B (en) | Digital certificate download online method and system, digital certificate are provided platform | |
CN105050081B (en) | Method, device and system for connecting network access device to wireless network access point | |
CN104580264B (en) | Login method, entering device and login and Accreditation System | |
CN106209763B (en) | A kind of login method and system | |
CN103281340B (en) | 2 D code verification method, system, client, issue and cloud server | |
CN110351228A (en) | Remote entry method, device and system | |
CN108632231A (en) | A kind of internet of things equipment, Internet of Things authentication platform, authentication method and system | |
US20160021111A1 (en) | Method, Terminal Device, and Network Device for Improving Information Security | |
CN104883367B (en) | A kind of method, system and applications client that auxiliary verification logs in | |
CN105099707B (en) | A kind of offline authentication method, server and system | |
CN109413096A (en) | A kind of login method and device more applied | |
CN105447715A (en) | Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party | |
US20170012781A1 (en) | A Solution For Generating And Issuing Security Codes With Guaranteed Issuer Authenticity And Origin | |
CN110768973A (en) | Signaling safety evaluation system and method based on GB35114 standard | |
CN103023911A (en) | Authentication method for access of trusted network devices to trusted network | |
CN107484032A (en) | Prevent the verification method and device brushed | |
CN108234442A (en) | Obtain method, system and the readable storage medium storing program for executing of contract | |
CN108011717A (en) | A kind of method, apparatus and system for asking user data | |
CN106572082A (en) | Approval signature verifying method, mobile device, terminal device and system | |
CN106330828A (en) | Method for network secure access, terminal device and authentication server | |
CN104717224A (en) | Login method and device | |
CN110505185A (en) | Auth method, equipment and system | |
CN102025748B (en) | Method, device and system for acquiring user name of Kerberos authentication mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20211008 Address after: 310051 Room 408, building 3, No. 399, Wangshang Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province Patentee after: Hangzhou Netease Zhiqi Technology Co.,Ltd. Address before: 310052 Building No. 599, Changhe Street Network Business Road, Binjiang District, Hangzhou City, Zhejiang Province, 4, 7 stories Patentee before: NETEASE (HANGZHOU) NETWORK Co.,Ltd. |