CN103685311B - A kind of login validation method and equipment - Google Patents

A kind of login validation method and equipment Download PDF

Info

Publication number
CN103685311B
CN103685311B CN201310738898.8A CN201310738898A CN103685311B CN 103685311 B CN103685311 B CN 103685311B CN 201310738898 A CN201310738898 A CN 201310738898A CN 103685311 B CN103685311 B CN 103685311B
Authority
CN
China
Prior art keywords
terminal
information
identification code
result
subscriber identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310738898.8A
Other languages
Chinese (zh)
Other versions
CN103685311A (en
Inventor
卓辉
周森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Netease Zhiqi Technology Co Ltd
Original Assignee
Netease Hangzhou Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netease Hangzhou Network Co Ltd filed Critical Netease Hangzhou Network Co Ltd
Priority to CN201310738898.8A priority Critical patent/CN103685311B/en
Publication of CN103685311A publication Critical patent/CN103685311A/en
Application granted granted Critical
Publication of CN103685311B publication Critical patent/CN103685311B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Embodiments of the present invention provide a kind of login validation method.For example, the method can include:Message in response to receiving user's request login, show the identification code for identifying the first terminal, so that second terminal carries out the figure that IMAQ obtains the identification code to the identification code, graphic hotsopt login authentication request according to the identification code, login authentication is sent to server to ask, so that the server obtains the content that the subscriber identity information and the identification code of the second terminal are identified according to login authentication request, subscriber identity information according to the second terminal carries out login authentication, the first terminal identified to the identification code returns to the result;The result that the reception server is returned, so as to realize ensureing the purpose of user identity safety.Additionally, embodiments of the present invention additionally provide a kind of login authentication equipment.

Description

A kind of login validation method and equipment
Technical field
Embodiments of the present invention are related to security fields, more specifically, embodiments of the present invention are related to a kind of login to test Card method and apparatus.
Background technology
This part is it is intended that the embodiments of the present invention stated in claims provide background or context.Herein Description in being included in this part because just do not recognize it is prior art.
The need for for safety or operation, many operators are required for user to be input into identity information in terminal, sign in Associated server could use related application.But, under some scenes, for example, in the public terminals such as Internet bar, other people It is very unsafe that identity information is input into private terminal, it is likely that concurrent by wooden horse record while identity information is input into It is sent to the server specified and causes identity to be stolen.
The content of the invention
Therefore, in the prior art, how login authentication ensure that user identity is safely very bothersome asking Topic.
Therefore, a kind of login validation method is highly desirable to, to realize ensureing the purpose of user identity safety.
In the present context, embodiments of the present invention are expected to provide a kind of login validation method and equipment.
In the first aspect of embodiment of the present invention, there is provided be applied to the login validation method of first terminal, for example, Can include:Message in response to receiving user's request login, shows the identification code for identifying the first terminal, so as to Second terminal carries out the figure that IMAQ obtains the identification code to the identification code, according to the graphic hotsopt of the identification code Login authentication is asked, and sending login authentication to server asks, so that the server is obtained according to login authentication request The content that the subscriber identity information of the second terminal and the identification code are identified, the user's body according to the second terminal Part information carries out login authentication, and the first terminal identified to the identification code returns to the result;What the reception server was returned tests Card result.
In the second aspect of embodiment of the present invention, there is provided be configured at the login authentication equipment of first terminal, for example, Can include:Receiving unit is logged in, the message in response to receiving user's request login is configured to, shows described for identifying The identification code of first terminal, so that second terminal carries out the figure that IMAQ obtains the identification code, root to the identification code Asked according to the graphic hotsopt login authentication of the identification code, sending login authentication to server asks, so as to the server root The content that the subscriber identity information and the identification code of the second terminal are identified, root are obtained according to login authentication request Login authentication is carried out according to the subscriber identity information of the second terminal, the first terminal identified to the identification code returns to checking knot Really;Checking receiving unit, is configured to the result of the reception server return.
In the third aspect of embodiment of the present invention, there is provided be applied to the login validation method of second terminal, for example, Can include:The operation of IMAQ is carried out to identification code in response to user, figure is carried out to the identification code shown by first terminal Figure as collecting identification code, wherein, the identification code is used to identify the first terminal;According to the figure of the identification code Shape generation login authentication request;Login authentication is sent to server to ask, so that the server please according to the login authentication The content for asking the subscriber identity information that obtains the second terminal and the identification code to be identified, according to the second terminal Subscriber identity information carries out login authentication, and the first terminal identified to the identification code returns to the result.
In the fourth aspect of embodiment of the present invention, there is provided be configured at the login authentication equipment of second terminal, for example, Can include:Collecting unit, is configured to carry out identification code in response to user the operation of IMAQ, and first terminal is shown The identification code shown carries out the figure that IMAQ is identified code, wherein, the identification code is used to identify the first terminal;Please Generation unit is sought, is configured to be asked according to the graphic hotsopt login authentication of the identification code;Request unit is sent, is configured to Login authentication is sent to server to ask, so that the server obtains the second terminal according to login authentication request The content that subscriber identity information and the identification code are identified, the subscriber identity information according to the second terminal is logged in Checking, the first terminal identified to the identification code returns to the result.
In the 5th aspect of embodiment of the present invention, there is provided the login validation method of server is applied to, for example, can To include:Login authentication request in response to receiving second terminal transmission, wherein, the login authentication request is by described second Terminal according to the graphic hotsopt of identification code, wherein, the figure of the identification code is specifically by second terminal in response to receiving to knowing Other code carries out the message of IMAQ, and carrying out IMAQ to the identification code shown by first terminal obtains, wherein, the identification Code is for identifying the first terminal;According to the login authentication request obtain the second terminal subscriber identity information and The content that the identification code is identified;Subscriber identity information according to the second terminal carries out login authentication;To the identification The first terminal of code mark returns to the result.
In the 6th aspect of embodiment of the present invention, there is provided the login authentication equipment of server is configured at, for example, can To include:Checking request receiving unit, is configured to the login authentication request in response to receiving second terminal transmission, wherein, Login authentication request by the second terminal according to the graphic hotsopt of identification code, wherein, the figure of the identification code is specific Carry out the message of IMAQ to identification code in response to receiving by second terminal, the identification code shown by first terminal is carried out IMAQ is obtained, wherein, the identification code is used to identify the first terminal;Extraction unit, is configured to be stepped on according to The subscriber identity information and the identification code that record checking request obtains the second terminal identify content;Authentication unit, matches somebody with somebody Put carries out login authentication for the subscriber identity information according to the second terminal;Returning unit, is configured to the identification The first terminal of code mark returns to the result.
According to the login validation method and equipment of embodiment of the present invention, because user is when first terminal asks to log in, Need not be input into subscriber identity information, but identification code for identifying first terminal is shown by first terminal, be used by user The identification code that second terminal shows to first terminal carries out IMAQ and is asked according to the graphic hotsopt login authentication of identification code, The subscriber identity information and identification code of second terminal are obtained so as to the login authentication request that server sends according to second terminal The content for being identified, therefore, server can carry out login authentication according to the subscriber identity information of second terminal, to identification code mark The first terminal of knowledge returns to the result, therefore, user would not also occur user without being input into identity information in first terminal The safety problem that identity information is stolen in first terminal, realizes the purpose for ensureing user identity safety.
In some possible implementations, identification code can be fed back according to server by first terminal for logging request The identifying code encrypted and other information generation, because identifying code is encryption shape in terminal and in transmitting procedure State, can prevent identifying code to be maliciously tampered, therefore, server after the identifying code that code is identified is identified, Ke Yi Decryption verification code after to first terminal whether be before request log in terminal verify, the result is fed back to correctly In terminal, user identity safety is further ensured.
In other possible implementations, identification code can by first terminal according to the hardware information of itself and its He generates information, so that server or second terminal are after the hardware information of the first terminal that code is identified is identified, The hardware information that can be identified to identification code is compared with common equipment hardware information and obtains common equipment the result, from And login authentication is carried out with reference to the common equipment the result, further ensure user identity safety.
In other possible implementation, server can also obtain first eventually after login authentication request is received The corresponding geographical location information of IP at end and the corresponding geographical location information of IP of second terminal, by server or second eventually End is compared to the two and obtains different-place login the result, so that login authentication is carried out with reference to the different-place login the result, Further ensure user identity safety.
Brief description of the drawings
Detailed description below, above-mentioned and other mesh of exemplary embodiment of the invention are read by reference to accompanying drawing , feature and advantage will become prone to understand.In the accompanying drawings, if showing by way of example, and not by way of limitation of the invention Dry implementation method, wherein:
Fig. 1 schematically shows the application scenarios according to embodiment of the present invention;
Fig. 2 is schematically shown according to one of schematic flow sheet of login validation method of embodiment of the present invention;
Fig. 3 schematically shows the Signalling exchange schematic diagram of the login validation method according to embodiment of the present invention;
Fig. 4 is schematically shown according to one of structural representation of login authentication equipment of embodiment of the present invention;
Fig. 5 schematically shows the two of the schematic flow sheet of the login validation method according to embodiment of the present invention;
Fig. 6 schematically shows the two of the structural representation of the login authentication equipment according to embodiment of the present invention;
Fig. 7 schematically shows the three of the schematic flow sheet of the login validation method according to embodiment of the present invention;
Fig. 8 schematically shows the three of the structural representation of the login authentication equipment according to embodiment of the present invention;
In the accompanying drawings, identical or corresponding label represents identical or corresponding part.
Specific embodiment
Principle of the invention and spirit are described below with reference to some illustrative embodiments.It should be appreciated that providing this A little implementation methods are used for the purpose of better understood when those skilled in the art and then realizing the present invention, and not with any Mode limits the scope of the present invention.Conversely, these embodiments are provided so that the disclosure is more thorough and complete, and energy It is enough that the scope of the present disclosure is intactly conveyed into those skilled in the art.
Art technology technical staff knows, embodiments of the present invention can be implemented as a kind of system, device, equipment, Method or computer program product.Therefore, the disclosure can be implemented as following form, i.e.,:It is complete hardware, complete soft Part(Including firmware, resident software, microcode etc.), or the form that hardware and software is combined.
According to the embodiment of the present invention, it is proposed that a kind of login validation method and equipment.
Herein, it is to be understood that any number of elements in accompanying drawing is used to example and unrestricted and any Name is only used for distinguishing, without any limitation.
Below with reference to some representative embodiments of the invention, principle of the invention and spirit are explained in detail.
Summary of the invention
The inventors discovered that showing the identification code for identifying the terminal by a terminal(For example, Quick Response Code), by user IMAQ is carried out using another terminal-pair identification code and the login of subscriber identity information is carried according to the graphic hotsopt of identification code Checking request, so that the login authentication request that server can send according to another terminal obtains subscriber identity information and identification The content that code is identified, login authentication is carried out according to subscriber identity information, and the terminal identified to identification code returns to the result, Therefore, user would not also occur subscriber identity information in identification code without being input into identity information in the terminal of identification code mark The stolen safety problem of the terminal of mark.
After general principle of the invention is described, lower mask body introduces various non-limiting embodiment party of the invention Formula.
Application scenarios overview
With reference first to Fig. 1, first terminal 101 can be desktop computer, panel computer, intelligent sliding moved end etc., second terminal 102 can be intelligent sliding moved end.Using login validation method provided in an embodiment of the present invention, user is without in first terminal 101 Upper input subscriber identity information, to the identification code that first terminal 101 shows carries out IMAQ and sends using second terminal 102 Carry the login authentication request of subscriber identity information, so that it may so that server 103 carries out the login authentication of user identity, and will step on The result for recording checking is fed back on first terminal 101, can effectively ensure that the safety of user identity.
One of illustrative methods
With reference to the application scenarios of Fig. 1, it is described with reference to Figure 2 and is applied to according to exemplary embodiment of the invention The login validation method of one terminal.It should be noted that above-mentioned application scenarios be for only for ease of understanding it is of the invention spirit and Principle and show, embodiments of the present invention are unrestricted in this regard.Conversely, embodiments of the present invention can be applied In applicable any scene.
It is provided in an embodiment of the present invention to be applied to first terminal for example, with reference to Fig. 2(For example, the first terminal of Fig. 1 101)One of login validation method schematic flow sheet.As illustrated, a kind of possible implementation method of the present invention can include:
S210, the message in response to receiving user's request login, show the identification code for identifying the first terminal, So as to second terminal(For example, the second terminal 102 of Fig. 1)The figure that IMAQ obtains the identification code is carried out to the identification code Shape, the graphic hotsopt login authentication request according to the identification code, to server(For example, the server 103 of Fig. 1)Send and log in Checking request, so as to the server according to the login authentication request obtain the second terminal subscriber identity information and The content that the identification code is identified, the subscriber identity information according to the second terminal carries out login authentication, to the identification The first terminal of code mark returns to the result;
The result that S220, the reception server are returned.
It can be seen that, according to the login validation method of embodiment of the present invention, because user is when first terminal asks to log in, no Need to be input into subscriber identity information, but identification code for identifying first terminal is shown by first terminal, the is used by user The identification code that two terminal-pair first terminals show carries out IMAQ and is asked according to the graphic hotsopt login authentication of identification code, from And the login authentication request that server can send according to second terminal obtains subscriber identity information and the identification of second terminal The content that code is identified, the subscriber identity information according to second terminal carries out login authentication, to the first terminal that identification code is identified The result is returned, therefore, user would not also occur subscriber identity information the without being input into identity information in first terminal The stolen safety problem of one terminal, realizes the purpose for ensureing user identity safety.
It is understood that the identification code described in the embodiment of the present invention can be one-dimension code, Quick Response Code, three-dimension code or Identification code of other forms etc..Wherein, the generating mode of the identification code is not limited.
For example, a kind of possible implementation can be, before the identification code is shown, first in such as Fig. 1 is whole Hold the identification code that the hardware information for identification service information, identifying code and/or first terminal is generated at 101.Below, with reference to A kind of possible signalling diagram of login validation method as shown in Figure 3 describes in detail to the implementation.Such as Fig. 3 institutes Show, methods described can include:
S310, first terminal receive the message that user's request is logged in;
For example, first terminal can be presented the webpage or application program for logging in, user passes through webpage or application program Send the message that request is logged in.
S320, first terminal send the message that request is logged in server;
S330, server generate the identifying code for identifying first terminal(For example, Quick Response Code)And encrypt;
S340, server return to the identifying code encrypted to first terminal;
S350, first terminal are according to business information(For example, instant messaging service, game service etc.), identifying code, and/or The hardware information of person's first terminal(For example, board chip set model, CPU models, video card model, hard disk model, memory size, The information such as display and panel model)Generate hardware information for identification service information, identifying code and/or first terminal Identification code, wherein, the business information can be determined by first terminal according to user's request registering service, first terminal display institute State identification code;
For example, can be generated for identification service letter according to the hardware information of business information, identifying code and first terminal The two-dimension code image of the hardware information of breath, identifying code and first terminal, two-dimension code image is shown in first terminal.
S360, second terminal carry out the figure that IMAQ obtains the identification code to the identification code, according to the knowledge The graphic hotsopt of other code carries the login authentication request of subscriber identity information;
It should be noted that the mode that second terminal obtains subscriber identity information is not limited.For example, second terminal is in user couple Can be the second terminal for having been completed User logs in when identification code carries out the operation of IMAQ, or, or not Carry out the second terminal of User logs in.If having been completed the second terminal of User logs in, then second terminal can from Subscriber identity information is extracted in the information that family logs in(Such as, user account);If not carrying out the second terminal of User logs in, Second terminal can require user input subscriber identity information, and the input according to user obtains subscriber identity information(Such as, account with And password).It is of course also possible to there are other implementations, in the present invention and it is not limited.
S370, second terminal send the login authentication and ask to server;
In business information, identifying code, the hardware information of first terminal that S380, server are identified according to identification code one Individual or multiple and second terminal subscriber identity information carries out login authentication;
S390, server return to the result to the first terminal that the identifying code is identified.
It can be seen that, in the embodiment, identification code can be used for the hardware information of identification service information, identifying code, first terminal Any one or more in three, or can be also used for identifying other information, wherein:
When identification service information, server can to whether allow user to should business log in verify;
It is in itself that by server for encrypting, the inside can be with due to identifying code when the identifying code that mark has been encrypted Including timestamp, the information such as general unique identifier, any other terminal cannot be decrypted cannot distort, therefore, server is being obtained To after the identifying code that identification code is identified, identifying code can be verified after decryption verification code, be tested equivalent to login Whether the targeted terminal of card request is that the terminal that request is logged in before is verified, thereby may be ensured that and feeds back the result Onto correct terminal, user identity safety is further ensured;
When the hardware information of first terminal is identified, what server or second terminal can be identified identification code Hardware information is compared with the common equipment hardware information for prestoring and obtains common equipment the result, so that server can be tied Closing the common equipment the result carries out login authentication, so as to when other people usurp identity logs by other equipment, can be with It is verified out according to hardware information difference, further ensures user identity safety.
In addition, in alternatively possible implementation, server is stepped in the user's request for receiving first terminal transmission After the message of record, can also include:Obtain the IP of first terminal(Internet protocol)Address, inquires the IP address of first terminal Corresponding geographical location information;Server can also include after the login authentication request for receiving second terminal transmission:Obtain The IP address of second terminal is taken, the corresponding geographical location information of IP address of second terminal is inquired;By the first terminal The corresponding geographical location information of IP of the corresponding geographical location information of IP and the second terminal is compared and must be stepped on to strange land Record the result, so that server carries out login authentication according to the different-place login the result;Or, returned to second terminal The corresponding geographical location information of IP of first terminal and the corresponding geographical location information of IP of second terminal, will by second terminal The corresponding geographical location information of IP of the first terminal and the corresponding geographical location information of IP of the second terminal are carried out Compare and obtain different-place login the result, so that server carries out login authentication according to the different-place login the result.
In this embodiment, the corresponding geographical location information of IP can be for example the information such as city, province, due to server Or second terminal is to the corresponding geographical positions of the IP of the corresponding geographical location information of IP and the second terminal of first terminal Confidence breath is compared and obtains different-place login the result, so that server can be stepped on reference to the different-place login the result Record checking, further ensures user identity safety.
In the implementation for combining above two embodiment, second terminal can be in the common equipment the result When non-common equipment and/or the different-place login the result are different-place login, presentation whether authorize non-common equipment and/or The prompt message of person's different-place login, if second terminal receives the authorization message of user input, institute is sent to the server Authorization message is stated, so that server carries out login authentication according to the subscriber identity information of authorization message and the second terminal.
One of example devices
After one of method of exemplary embodiment of the invention is described, next, with reference to Fig. 4 to example of the present invention One of the login authentication equipment of first terminal that is configured at of property implementation method is introduced.
It is a kind of one of login authentication device structure schematic diagram provided in an embodiment of the present invention for example, with reference to Fig. 4.As schemed Shown, a kind of possible implementation method for being configured at the equipment of first terminal can include:Receiving unit 410 is logged in, can be with The message in response to receiving user's request login is configured to, the identification code for identifying the first terminal is shown, so as to Second terminal carries out the figure that IMAQ obtains the identification code to the identification code, according to the graphic hotsopt of the identification code Login authentication is asked, and sending login authentication to server asks, so that the server is obtained according to login authentication request The content that the subscriber identity information of the second terminal and the identification code are identified, the user's body according to the second terminal Part information carries out login authentication, and the first terminal identified to the identification code returns to the result;Checking receiving unit 420, can To be configured to the result of the reception server return.
It can be seen that, the login authentication equipment according to embodiment of the present invention, because user is when first terminal asks to log in, no Need to be input into subscriber identity information, but the knowledge for identifying first terminal is shown in first terminal by login receiving unit 410 Other code, IMAQ is carried out and according to the life of the figure of identification code by user using the identification code that second terminal shows to first terminal Into login authentication request, so that the login authentication request that server can send according to second terminal obtains the user of second terminal The content that identity information and identification code are identified, the subscriber identity information according to second terminal carries out login authentication, then by testing The result that the first terminal that the card the reception server of receiving unit 420 identify to identification code is returned, therefore, user need not be the One terminal is input into identity information, and the safety problem that subscriber identity information is stolen in first terminal would not also occur, and realizes guarantor The purpose of card user identity safety.
It is understood that the identification code described in the embodiment of the present invention can be one-dimension code, Quick Response Code, three-dimension code or Identification code of other forms etc..Wherein, the generating mode of the identification code is not limited.For example, the login authentication equipment can be with Including:Identification code generation unit 430, may be configured to generation for identification service information, identifying code and/or first terminal Hardware information the identification code, wherein, the identifying code be used for identify the first terminal, specifically by server receive First terminal is generated, encrypts and returned to after the message that the request of first terminal is logged in, and the business information please according to user The business of login is asked to determine, business information, identifying code, the hardware letter of first terminal identified according to identification code so as to server The subscriber identity information of one or more and second terminal in breath carries out login authentication.
It can be seen that, in the implementation, identification code can be used for the hardware letter of identification service information, identifying code, first terminal Breath three in any one or more, or can be also used for identify other information, wherein, when identification service information, Server can to whether allow user to should business log in verify;When the identifying code that mark has been encrypted, by Encrypted state is in terminal and in transmitting procedure in the identifying code encrypted, can prevent identifying code from maliciously being usurped Change, therefore, server can be tested identifying code after the identifying code that code is identified is identified after decryption verification code Card, equivalent to login authentication is asked targeted terminal whether be before the terminal that logs in of request verify, such that it is able to Guarantee feeds back in correct terminal the result, further ensures user identity safety;When used for mark first terminal Hardware information when, the hardware information that server or second terminal can be identified identification code is hard with the common equipment for prestoring Part information is compared and obtains common equipment the result, so that server can be stepped on reference to the common equipment the result Record checking, so as to when other people usurp identity logs by other equipment, be verified out, further ensures user Identity security.
It should be noted that identification code generation unit 430 uses dotted lines in fig. 4, to represent that the unit is not this hair The necessary unit of bright equipment.
The two of illustrative methods
After describing and being applied to one of login validation method of first terminal, with reference to Fig. 5, the present invention is implemented The two of the login validation method for being applied to second terminal that example is provided describe in detail.
It is provided in an embodiment of the present invention to be applied to second terminal for example, with reference to Fig. 5(For example, shown in Fig. 1 second is whole End 102)Login validation method schematic flow sheet two.As illustrated, a kind of possible implementation method of the present invention can include:
S510, the operation for carrying out IMAQ to identification code in response to user, enter to the identification code shown by first terminal Row IMAQ is identified the figure of code, wherein, the identification code is used to identify the first terminal.
It is understood that the identification code described in the embodiment of the present invention can be one-dimension code, Quick Response Code, three-dimension code or Identification code of other forms etc..
It should be noted that second terminal is when user carries out the operation of IMAQ to identification code, can be complete Into the second terminal of User logs in, or, or the second terminal of User logs in is not carried out.Do not enter in the present invention Row limitation.For example:IMAQ can be carried out to identification code in response to user after user is logged in by second terminal Operation;Or, after IMAQ is carried out to identification code, the operation that user logs in first terminal is carried out automatically;Or, It is both that user is logged in first terminal while step S520 below is asked according to the graphic hotsopt login authentication of identification code Request, be also second terminal log in request;Again or, it is possibility to have any other is possible with reality for being combined of login Existing mode, in the present invention and is not limited.
S520, according to the graphic hotsopt login authentication of the identification code ask.
For example, in a kind of possible implementation, can be identified to the figure of the identification code, the knowledge is obtained The hardware information of business information, identifying code and/or first terminal that other code is identified;By business information, identifying code and/or The hardware information of first terminal, and the subscriber identity information of the second terminal is carried in checking request, and generation checking please Ask;Or, in alternatively possible implementation, can be by the subscriber identity information of the second terminal and the identification The figure of code is carried in checking request, generates checking request;
Wherein, the identification code can be generated by first terminal, for identification service information, identifying code and/or described The hardware information of first terminal, wherein, the identifying code is used to identify the first terminal.Specifically, signaling as shown in Figure 3 Schematic diagram, the identifying code can specifically be tested after the message of request login of first terminal is received by server described in generation Card code is simultaneously encrypted, then identifying code is returned into first terminal, wherein, the business information can be asked by first terminal according to user The business of login is asked to determine.
Can be used for the hardware information of identification service information, identifying code and/or first terminal due to identification code, therefore, In business information, identifying code, the hardware information of first terminal that server can be identified according to identification code one or more, And the subscriber identity information of second terminal carries out login authentication.When identification service information, server can to whether Allow user to should business log in verify;When the identifying code that mark has been encrypted, can prevent identifying code from being disliked Meaning is distorted, and be thereby may be ensured that and is fed back in correct terminal the result, further ensures user identity safety;When with In identify first terminal hardware information when, the hardware information that server or second terminal can be identified identification code with it is pre- The common equipment hardware information deposited is compared and obtains common equipment the result, so that server can combine the common equipment The result carries out login authentication, so as to when other people usurp identity logs by other equipment, be verified out, enters One step ensure that user identity safety.
S530, to server send login authentication ask, so as to the server according to the login authentication request obtain The content that the subscriber identity information of the second terminal and the identification code are identified, the user's body according to the second terminal Part information carries out login authentication, and the first terminal identified to the identification code returns to the result.
It can be seen that, according to the login validation method of embodiment of the present invention, because user is when first terminal asks to log in, no Need to be input into subscriber identity information, but identification code for identifying first terminal is shown by first terminal, the is used by user The identification code that two terminal-pair first terminals show carries out IMAQ and is asked according to the graphic hotsopt login authentication of identification code, from And the login authentication request that server can send according to second terminal obtains subscriber identity information and the identification of second terminal The content that code is identified, the subscriber identity information according to second terminal carries out login authentication, to the first terminal that identification code is identified The result is returned, therefore, user would not also occur subscriber identity information the without being input into identity information in first terminal The stolen safety problem of one terminal, realizes the purpose for ensureing user identity safety.
In a kind of possible implementation of the embodiment of the present invention, rightness of business can also be obtained by following steps and tested Card result, identifying code legitimate verification result, one or more in common equipment the result, and then server can basis One or more in rightness of business the result, identifying code legitimate verification result, common equipment the result are stepped on Record checking, specifically, for example, the embodiment of the present invention can also include following either step or combination:
When the identification code is used for identification service information, the server can be received and returned for the checking request Rightness of business the result, wherein, the rightness of business the result specifically can be by server according to the checking Request obtains the subscriber identity information and the business information, corresponding with the subscriber identity information to the business information Legitimate traffic be compared and obtain;When the identification code is used for identity verification code, the server can be received for institute The identifying code legitimate verification result of checking request return is stated, wherein, the identifying code legitimate verification result specifically can be by Server obtains the identifying code according to the checking request, and the identifying code is decrypted, to the identifying code mark after decryption Whether terminal is judged by the terminal that the identifying code is identified in generation;When the identification code is used to identify first During the hardware information of terminal, the common equipment the result that the server is returned for the checking request can be received, its In, the common equipment the result specifically can by server according to the checking request obtain the subscriber identity information with And the hardware information of the first terminal, whether the hardware information to the first terminal is that the subscriber identity information is corresponding Usual hardware information is judged;When the identification code is used to identify the hardware information of first terminal, institute can be received The usual hardware information corresponding with the subscriber identity information that server is returned for the checking request is stated, by the identification The hardware information of the first terminal that code is identified is compared with the usual hardware information, obtains common equipment the result.
In the alternatively possible implementation of the embodiment of the present invention, different-place login can also be obtained by following steps and tested Result is demonstrate,proved, and then server can be combined with different-place login the result and carry out login authentication.Specifically, the embodiment of the present invention is also May comprise steps of:
Receive the corresponding geographical position letters of IP of the first terminal that the server is returned for the checking request The corresponding geographical location information of IP of breath and the second terminal, by the corresponding geographical location information of the IP of the first terminal And the corresponding geographical location information of IP of the second terminal is compared and obtains different-place login the result;Or, receive The different-place login the result that the server is returned for the checking request, wherein, the different-place login the result tool Body is received after the checking request by the server, inquire about the first terminal the corresponding geographical location information of IP and The corresponding geographical location information of IP of the second terminal, by the corresponding geographical location information of the IP of the first terminal and institute The corresponding geographical location information of IP for stating second terminal is compared and obtains.
It should be noted that in the implementation for obtaining different-place login the result is compared by second terminal execution, also The different-place login the result can be returned to server so that server combination login authentication result is carried out from second terminal Login authentication.
In the implementation for combining above two embodiment, second terminal can be in the common equipment the result When non-common equipment and/or the different-place login the result are different-place login, presentation whether authorize non-common equipment and/or The prompt message of person's different-place login, if second terminal receives the authorization message of user input, institute is sent to the server Authorization message is stated, so that server carries out login authentication according to the subscriber identity information of authorization message and the second terminal.
Or, in the implementation for combining above two embodiment, if the server determine that subscriber identity information is verified Pass through, and rightness of business the result is that legal, described common equipment the result is different described in common equipment, and/or person Ground login authentication result is non-different-place login, then can directly determine the result for logging in login successfully.
The two of example devices
Describing after the two of method of exemplary embodiment of the invention, next, with reference to Fig. 6 to example of the present invention The two of the login authentication equipment for being configured at second terminal of property implementation method are introduced.
It is the two of a kind of login authentication device structure schematic diagram provided in an embodiment of the present invention for example, with reference to Fig. 6.As schemed Shown, a kind of possible implementation method for being configured at the equipment of second terminal can include:
Collecting unit 610, may be configured to carry out identification code in response to user the operation of IMAQ, to first eventually The shown identification code in end carries out the figure that IMAQ is identified code, wherein, the identification code is used to identify described first Terminal;Request generation unit 620, may be configured to be asked according to the graphic hotsopt login authentication of the identification code;Sending please Unit 630 is sought, may be configured to send login authentication request to server, so that the server is according to the login authentication Request obtains the content that the subscriber identity information and the identification code of the second terminal are identified, according to the second terminal Subscriber identity information carry out login authentication, to the identification code identify first terminal return the result.
It can be seen that, second terminal login authentication equipment is configured at according to embodiment of the present invention, gathered by collecting unit 610 The figure of the identification code that first terminal shows, request generation unit 620 is asked according to the graphic hotsopt login authentication of identification code, hair Send request unit 630 to send login authentication to server to ask, so that server can be believed according to the user identity of second terminal Breath carries out login authentication, and the first terminal identified to identification code returns to the result, therefore, user is without in first terminal input Identity information, would not also occur the safety problem that subscriber identity information is stolen in first terminal, realize guarantee user identity The purpose of safety.
In a kind of possible implementation of the embodiment of the present invention, as shown in fig. 6, the request generation unit 620 can be with Including:First identification subelement 621, may be configured to be identified the figure of the identification code, obtain the identification code The hardware information of the business information, identifying code and/or the first terminal that are identified;Generation subelement 622, may be configured to by The hardware information of business information, identifying code and/or first terminal, and the subscriber identity information of the second terminal is carried In checking request, checking request is generated;Or, the request generation unit 620 may be configured to the second terminal The figure of login account and the identification code is carried in checking request, generates checking request.
It should be noted that wherein described identification code can specifically be generated by first terminal, for identification service information, test The hardware information of card code and/or the first terminal, wherein, the identifying code can be used for identifying the first terminal.Tool Body ground, signalling diagram as shown in Figure 3 is specifically raw after the message that the request for receiving first terminal is logged in by server Into, encrypt and return to first terminal, wherein, the business that the business information can be logged in by first terminal according to user's request It is determined that.
In a kind of possible implementation of the embodiment of the present invention, can also be tested by obtaining rightness of business with lower unit Card result, identifying code legitimate verification result, one or more in common equipment the result, and then server can basis One or more in rightness of business the result, identifying code legitimate verification result, common equipment the result are stepped on Record checking, specifically, for example, the embodiment of the present invention can also include following any unit or combination:Business the result is received Unit 640, may be configured to, when the identification code is used for identification service information, receive the server and be directed to the checking The rightness of business the result for returning is asked, wherein, the rightness of business the result is specifically by server according to Checking request obtains the subscriber identity information and the business information, to the business information and the subscriber identity information Corresponding legitimate traffic is compared and obtains;Identifying code the result receiving unit 650, may be configured to when the identification code During for identity verification code, the identifying code legitimate verification result that the server is returned for the checking request is received, its In, the identifying code legitimate verification result specifically obtains the identifying code by server according to the checking request, to described Identifying code is decrypted, and whether the terminal to the identifying code mark after decryption is carried out by the terminal that the identifying code is identified in generation Judgement is obtained;Conventional the result receiving unit 660, may be configured to be used to identify the hard of first terminal when the identification code During part information, the common equipment the result that the server is returned for the checking request is received, wherein, described commonly using sets Standby the result specifically obtains the subscriber identity information and the first terminal by server according to the checking request Hardware information, whether the hardware information to the first terminal is that the corresponding usual hardware information of the subscriber identity information is carried out Judgement is obtained;General information receiving unit 670, may be configured to be used to identify the hardware letter of first terminal when the identification code During breath, usual hardware corresponding with the subscriber identity information letter that the server is returned for the checking request is received Breath;First conventional judging unit, is configured to received general information receiving unit the identification code is identified first The hardware information of terminal is compared with the usual hardware information, obtains common equipment the result.
In the alternatively possible implementation of the embodiment of the present invention, can also be tested by obtaining different-place login with lower unit Result is demonstrate,proved, and then server can be combined with different-place login the result and carry out login authentication.Specifically, the embodiment of the present invention is also Can include:Geography information receiving unit 680, may be configured to receive what the server was returned for the checking request The corresponding geographical location information of IP of the first terminal and the corresponding geographical location information of IP of the second terminal;First Geography information comparing unit 681, the IP of first terminal that may be configured to be received geography information receiving unit is corresponding The corresponding geographical location information of IP of geographical location information and second terminal is compared and obtains different-place login the result;Or Person, geographical the result receiving unit 682 may be configured to receive the strange land that the server is returned for the checking request Login authentication result, wherein, after the different-place login the result specifically receives the checking request by the server, look into The corresponding geographical location information of IP of the first terminal and the corresponding geographical location information of IP of the second terminal are ask, will The corresponding geographical location information of IP of the first terminal and the corresponding geographical location information of IP of the second terminal are carried out Compare and obtain.
In the implementation for combining above two embodiment, the login authentication equipment for being configured at second terminal can also be wrapped Include:Tip element 690, may be configured to when the common equipment the result is non-common equipment and/or the strange land When login authentication result is different-place login, whether presentation authorizes the prompt message of non-common equipment and/or different-place login;Authorize Transmitting element 691, if may be configured to receive the authorization message of user input, the mandate is sent to the server Information, so that server carries out login authentication according to the subscriber identity information of authorization message and the second terminal.
It should be noted that in the present embodiment, the first identification subelement 621, generation subelement 622, business checking knot Fruit receiving unit 640, identifying code the result receiving unit 650, conventional the result receiving unit 660, general information are received Unit 670, geography information receiving unit 680, the first geography information comparing unit 681, geographical the result receiving unit 682, Tip element 690, mandate transmitting element 691 use dotted lines in figure 6, to represent that the unit is not necessity of present device Unit.
The three of illustrative methods
Describing after the two of method of exemplary embodiment of the invention, next, with reference to Fig. 7 to example of the present invention The three of the login validation method for being applied to server of property implementation method are introduced.
It is provided in an embodiment of the present invention to be applied to server for example, with reference to Fig. 7(For example, the server shown in Fig. 1 103)Login validation method schematic flow sheet three.As illustrated, this is applied to one kind of the login validation method of server Possible implementation method can include:S710, the login authentication request in response to receiving second terminal transmission, wherein, it is described Login authentication request by the second terminal according to the graphic hotsopt of identification code, wherein, the figure of the identification code is specifically by the Two terminal responses carry out the message of IMAQ in receiving to identification code, and image is carried out to the identification code shown by first terminal Collect, wherein, the identification code is used to identify the first terminal;It should be noted that wherein, the second terminal can Being the second terminal for having been completed User logs in, or, or the second terminal of User logs in is not carried out.In this hair In bright and it is not limited.
S720, subscriber identity information and the identification code that the second terminal is obtained according to login authentication request The content for being identified.
For example, in a kind of possible implementation, the login authentication request can be worked as and carry the interior of identification code mark Hold and second terminal subscriber identity information when, parse login authentication request obtain the content of the identification code mark with And the subscriber identity information of second terminal;Or, in alternatively possible implementation, the login authentication request can be worked as Carry identification code figure and second terminal subscriber identity information when, parse login authentication request and obtain the identification The figure of code and the subscriber identity information of second terminal, the figure to the identification code are identified obtaining the identification code mark The content of knowledge.
It should be noted that wherein, the identification code can specifically be generated by first terminal, for identification service information, The hardware information of identifying code and/or the first terminal, wherein, the identifying code can be used for identifying the first terminal, Signalling diagram as shown in Figure 3, the identifying code specifically can be by server in disappearing that the request for receiving first terminal is logged in Generated after breath, encrypted and return to first terminal, wherein, the business information can be stepped on by first terminal according to user's request The business of record determines.
When identification service information, server can to whether allow user to should business log in verify; When the identifying code that mark has been encrypted, identifying code can be prevented to be maliciously tampered, thereby may be ensured that the result is anti- It is fed in correct terminal, further ensures user identity safety;When the hardware information of first terminal is identified, service The hardware information that device or second terminal can be identified identification code is compared with the common equipment hardware information for prestoring To common equipment the result, so that server can carry out login authentication with reference to the common equipment the result, so as at it When other people usurp identity logs by other equipment, can be verified out, further ensure user identity safety.
S730, login authentication is carried out according to the subscriber identity information of the second terminal.It should be noted that according to described The subscriber identity information that login authentication request obtains the second terminal can be the user that user has logged in second terminal Identity information, login authentication is carried out according to the subscriber identity information, can be specifically to determine user according to the subscriber identity information Logged in second terminal, determine that authentication passes through.Or, obtain described second according to login authentication request The subscriber identity information of terminal can be the subscriber identity information that user preserves but be not logged in second terminal, according to user's body Part information carries out login authentication, is matched in legal identity information database according to the subscriber identity information Determine whether authentication passes through.Again or, it is possibility to have other possible implementations, do not carry out in the present invention Limitation.
For example, in a kind of possible implementation, business information, identifying code, that can be identified according to identification code The subscriber identity information of one or more and second terminal in the hardware information of one terminal carries out login authentication.
S740, the first terminal identified to the identification code return to the result.
It can be seen that, according to the login validation method of embodiment of the present invention, because user in first terminal without being input into identity Information, would not also occur the safety problem that subscriber identity information is stolen in first terminal, realize guarantee user identity safety Purpose.
In a kind of possible implementation of the embodiment of the present invention, rightness of business can also be obtained by following steps and tested Card result, identifying code legitimate verification result, one or more in common equipment the result, and then server can basis One or more in rightness of business the result, identifying code legitimate verification result, common equipment the result are stepped on Record checking, specifically, for example, the embodiment of the present invention can also include following either step or combination:
When the identification code is used for identification service information, the user identity letter can be obtained according to the checking request Breath and the business information, are compared to business information legitimate traffic corresponding with the subscriber identity information and obtain Rightness of business the result;
When the identification code is used for identity verification code, the identifying code can be obtained according to the checking request, to institute Identifying code decryption is stated, whether the terminal to the identifying code mark after decryption is entered by the terminal that the identifying code is identified in generation Row judgement is verified a yard legitimate verification result;
When the identification code is used to identify the hardware information of first terminal, can be according to the checking request be obtained The hardware information of subscriber identity information and the first terminal, whether the hardware information to the first terminal is the user The corresponding usual hardware information of identity information carries out judging to obtain common equipment the result;
When the identification code is used to identify the hardware information of first terminal, the subscriber identity information correspondence can be inquired about Usual hardware information, the usual hardware information is returned to the second terminal, so that second terminal is by the identification code institute The hardware information of the first terminal of mark is compared with the usual hardware information and obtains common equipment the result.
In the alternatively possible implementation of the embodiment of the present invention, different-place login can also be obtained by following steps and tested Result is demonstrate,proved, and then server can be combined with different-place login the result and carry out login authentication.Specifically, the embodiment of the present invention is also May comprise steps of:
Inquire about the corresponding geographical location information of IP of the first terminal and the corresponding geography of IP of the second terminal Positional information, the corresponding geographical location information of IP of the first terminal and the IP of the second terminal are returned to second terminal Corresponding geographical location information, so that second terminal is by the corresponding geographical location information of the IP of the first terminal and described The corresponding geographical location information of IP of two terminals is compared and obtains different-place login the result;
Or,
Inquire about the corresponding geographical location information of IP of the first terminal and the corresponding geography of IP of the second terminal Positional information, by the corresponding geographical positions of the IP of the corresponding geographical location information of the IP of the first terminal and the second terminal Confidence breath is compared and obtains different-place login the result.
It should be noted that in the implementation for obtaining different-place login the result is compared by second terminal execution, also The different-place login the result can be returned to server so that server combination login authentication result is carried out from second terminal Login authentication.
In a kind of implementation for combining above two embodiment, the user's body described in step S730 according to second terminal Part information carries out login authentication and is specifically as follows, according to the rightness of business the result, identifying code legitimate verification result, It is any one or more in common equipment the result, different-place login the result, and the second terminal user's body Part information carries out login authentication.
In another implementation for combining above two embodiment, according to the user of second terminal described in step S730 Identity information carries out login authentication and is specifically as follows, according to the rightness of business the result, identifying code legitimate verification knot The subscriber identity information of one or more and the second terminal really, in authorization message carries out login authentication;
Wherein, the authorization message can specifically be received from second terminal, by second terminal when the common equipment is verified Result is non-common equipment and/or the different-place login the result when being different-place login, and whether presentation authorizes non-conventional set After the standby and/or prompt message of different-place login, the authorization message according to user input is obtained.
Again or, combine above two embodiment implementation in, if the server determine that subscriber identity information is tested Card passes through, and rightness of business the result is that legal, described common equipment the result is described in common equipment, and/or person Different-place login the result is non-different-place login, then can directly determine the result for logging in login successfully.
In addition, also, it should be noted that the server described in the embodiment of the present invention can be divided by function, being taken by multiple Business device composition, for example:The server can be including service server, account authentication server, IP servers etc..Wherein, industry Business server can be used for preserving the data such as the business information related to User logs in;Account authentication server can be used for checking User identity, generation identifying code, admin-authentication code, identification identifying code etc.;It is corresponding that IP servers can be used for inquiry IP address Geographical location information etc..It is understood that the server described in the embodiment of the present invention is not limited in a kind of this framework, can be with Be it is any can apply login validation method provided in an embodiment of the present invention three server.
The three of example devices
Describing after the three of method of exemplary embodiment of the invention, next, with reference to Fig. 8 to example of the present invention The three of the login authentication equipment for being configured at server of property implementation method are introduced.
It is the three of a kind of login authentication device structure schematic diagram provided in an embodiment of the present invention for example, with reference to Fig. 8.As schemed Shown, a kind of possible implementation method for being configured at the login authentication equipment of server can include:
Checking request receiving unit 810, may be configured to please in response to receiving the login authentication of second terminal transmission Ask, wherein, login authentication request by the second terminal according to the graphic hotsopt of identification code, wherein, the identification code Figure is specifically carried out the message of IMAQ in response to receiving by second terminal to identification code, to the knowledge shown by first terminal Other code carries out IMAQ and obtains, wherein, the identification code is used to identify the first terminal;Extraction unit 820, can configure In subscriber identity information and the identification code for obtaining the second terminal according to login authentication request are identified Hold;Authentication unit 830, may be configured to carry out login authentication according to the subscriber identity information of the second terminal;Return single Unit 840, the first terminal that may be configured to be identified to the identification code returns to the result.
It can be seen that, according to the login authentication equipment for being configured at server of embodiment of the present invention, extraction unit 820 can be with root The login authentication received according to checking request receiving unit 810 is asked, and obtains subscriber identity information and the institute of the second terminal State identification code and identify content, authentication unit 830 can carry out login authentication according to the subscriber identity information of the second terminal, The first terminal that returning unit 840 can be identified to the identification code returns to the result, therefore, user is without in first terminal Input identity information, would not also occur the safety problem that subscriber identity information is stolen in first terminal, realize guarantee user The purpose of identity security.
In a kind of possible implementation of the embodiment of the present invention, as shown in figure 8, the extraction unit 820, can configure For when login authentication request carries the subscriber identity information of identification code and second terminal, parsing the login authentication Request obtains the content of the identification code mark and the subscriber identity information of second terminal;Or, the extraction unit 820, May be configured to when the login authentication asks to carry the subscriber identity information of the figure of identification code and second terminal, solution Analyse the login authentication request and obtain the figure of the identification code and the subscriber identity information of second terminal, to the identification code Figure be identified obtaining the content of the identification code mark;
Wherein, the identification code can specifically be generated by first terminal, for identification service information, identifying code and/or The hardware information of the first terminal, wherein, the identifying code can specifically be stepped on by server in the request for receiving first terminal Generated after the message of record, encrypted and return to first terminal, for identifying the first terminal, wherein, the business information Can be determined according to the business that user's request is logged in by first terminal;
In the implementation, the authentication unit 830 may be configured to the business letter identified according to identification code The subscriber identity information of one or more and second terminal in breath, identifying code, the hardware information of first terminal is logged in Checking.
In a kind of possible implementation of the embodiment of the present invention, can also be tested by obtaining rightness of business with lower unit Card result, identifying code legitimate verification result, one or more in common equipment the result, and then can be closed according to business One or more in method the result, identifying code legitimate verification result, common equipment the result carry out login authentication, Specifically, for example, the embodiment of the present invention can also include following any unit or combination:
The legal judging unit 850 of business, when may be configured to the identification code for identification service information, according to described Checking request obtains the subscriber identity information and the business information, to the business information and the subscriber identity information Corresponding legitimate traffic is compared and obtains rightness of business the result;
Identifying code judging unit 860, may be configured to, when the identification code is used for identity verification code, be tested according to described Card request obtains the identifying code, and the identifying code is decrypted, and whether the terminal to the identifying code mark after decryption is described testing The terminal that card code is identified in generation carries out judgement and is verified a yard legitimate verification result;
Second conventional judging unit 870, may be configured to be used to identify the hardware letter of first terminal when the identification code During breath, the hardware information of the subscriber identity information and the first terminal is obtained according to the checking request, to described Whether the hardware information of one terminal is that the corresponding usual hardware information of the subscriber identity information carries out judging to obtain common equipment The result;
General information transmitting element 880, may be configured to be used to identify the hardware letter of first terminal when the identification code During breath, the corresponding usual hardware information of the subscriber identity information is inquired about, returning to the usual hardware to the second terminal believes Breath, the hardware information of the first terminal identified the identification code so as to second terminal is compared with the usual hardware information Relatively obtain common equipment the result.
In the alternatively possible implementation of the embodiment of the present invention, can also be tested by obtaining different-place login with lower unit Demonstrate,proving result, and then can be combined with different-place login the result carries out login authentication.Specifically, the embodiment of the present invention can also be wrapped Include:
Geography information transmitting element 890, may be configured to inquire about the corresponding geographical position letters of IP of the first terminal The corresponding geographical location information of IP of breath and the second terminal, the IP for returning to the first terminal to second terminal is corresponding The corresponding geographical location information of IP of geographical location information and the second terminal, so that second terminal is by the first terminal The corresponding geographical location information of IP and the corresponding geographical location information of IP of the second terminal be compared and obtain strange land Login authentication result;Or, the second geography information comparing unit 891 may be configured to inquire about IP pairs of the first terminal The corresponding geographical location information of the IP of geographical location information and the second terminal answered, by the IP correspondences of the first terminal The corresponding geographical location information of the IP of geographical location information and the second terminal be compared obtain different-place login checking As a result.
In a kind of implementation for combining above two embodiment, the authentication unit 830 may be configured to basis The rightness of business the result, identifying code legitimate verification result, common equipment the result, different-place login the result In it is any one or more, and the subscriber identity information of the second terminal carries out login authentication.
In another implementation for combining above two embodiment, the authentication unit 830 may be configured to root According to one or more in the rightness of business the result, identifying code legitimate verification result, authorization message and described The login account of second terminal carries out login authentication;
Wherein, the authorization message can specifically be received from second terminal, by second terminal when the common equipment is verified Result is non-common equipment and/or the different-place login the result when being different-place login, and whether presentation authorizes non-conventional set After the standby and/or prompt message of different-place login, the authorization message according to user input is obtained.
Again or, combine above two embodiment implementation in, if the server determine that subscriber identity information is tested Card passes through, and rightness of business the result is that legal, described common equipment the result is described in common equipment, and/or person Different-place login the result is non-different-place login, then can directly determine the result for logging in login successfully.
It should be noted that in the present embodiment, the legal judging unit 850 of business, identifying code judging unit 860, second Conventional judging unit 870, general information transmitting element 880, geography information transmitting element 890, the second geography information comparing unit 891 use dotted lines in fig. 8, to represent that the unit is not the necessary unit of present device.
Although it should be noted that be referred to some units or subelement of login authentication equipment in above-detailed, It is that this division is only not enforceable.In fact, according to the embodiment of the present invention, above-described two or more dresses The feature and function put can embody in one apparatus.Conversely, the feature and function of an above-described device can be with It is further divided into being embodied by multiple devices.
Additionally, although the operation of the inventive method is described with particular order in the accompanying drawings, this do not require that or Hint must be performed according to the particular order these operation, or the operation having to carry out shown in whole could realize it is desired As a result.Additionally or alternatively, it is convenient to omit some steps, multiple steps are merged into a step to perform, and/or by one Step is decomposed into execution of multiple steps.
Although describing spirit and principles of the present invention by reference to some specific embodiments, it should be appreciated that, this Invention is not limited to disclosed specific embodiment, and the division to each side does not mean that the feature in these aspects can not yet Combination is this to divide merely to the convenience of statement to be benefited.It is contemplated that cover appended claims spirit and In the range of included various modifications and equivalent arrangements.

Claims (18)

1. a kind of login validation method, is applied to second terminal, including:
The operation of IMAQ is carried out to identification code in response to user, IMAQ is carried out to the identification code shown by first terminal The figure of code is identified, wherein, the identification code is used to identify the first terminal;
Graphic hotsopt login authentication request according to the identification code;
Login authentication is sent to server to ask, so that the server obtains described second eventually according to login authentication request The content that the subscriber identity information at end and the identification code are identified, the subscriber identity information according to the second terminal is carried out Login authentication, the first terminal identified to the identification code returns to the result;
Receive the server for the checking request return the first terminal the corresponding geographical location information of IP with And the corresponding geographical location information of IP of the second terminal, by the corresponding geographical location information of the IP of the first terminal and The corresponding geographical location information of IP of the second terminal is compared and obtains different-place login the result;Or, receive described Server for the checking request return different-place login the result, wherein, the different-place login the result specifically by The server is received after the checking request, inquires about the corresponding geographical location information of IP of the first terminal and described The corresponding geographical location information of IP of second terminal, by the corresponding geographical location information of the IP of the first terminal and described The corresponding geographical location information of IP of two terminals is compared and obtains.
2. method according to claim 1, wherein, it is described to be included according to the request of the graphic hotsopt login authentication of identification code:
Figure to the identification code is identified, and obtains business information, identifying code and/or that the identification code is identified The hardware information of one terminal;By the hardware information of business information, identifying code and/or first terminal, and the second terminal Subscriber identity information carry in checking request, generate checking request, or, by the subscriber identity information of the second terminal And the figure of the identification code is carried in checking request, checking request is generated, so that server is identified according to identification code Business information, identifying code, the hardware information of first terminal in one or more and second terminal subscriber identity information Carry out login authentication;
Wherein, the identification code is specifically generated by first terminal, for identification service information, identifying code and/or described first The hardware information of terminal, wherein, the identifying code is used to identify the first terminal, is specifically receiving first terminal by server Request log in message after generate, encrypt and return to first terminal, wherein, the business information by first terminal according to The business that user's request is logged in determines.
3. method according to claim 2, also including following arbitrary steps or combination:
When the identification code is used for identification service information, receives the server and closed for the business that the checking request is returned Method the result, wherein, the rightness of business the result is specifically by server according to the checking request is obtained Subscriber identity information and the business information, enter to business information legitimate traffic corresponding with the subscriber identity information Go to compare and obtain;
When the identification code is used for identity verification code, receives the server and closed for the identifying code that the checking request is returned Method the result, wherein, the identifying code legitimate verification result specifically obtains institute by server according to the checking request Identifying code is stated, the identifying code is decrypted, whether the terminal identified to the identifying code after decryption is the identifying code in generation The terminal for being identified is judged;
When the identification code is used to identify the hardware information of first terminal, receives the server and returned for the checking request The common equipment the result for returning, wherein, the common equipment the result is specifically obtained by server according to the checking request To the subscriber identity information and the hardware information of the first terminal, whether the hardware information to the first terminal is institute The corresponding usual hardware information of subscriber identity information is stated to be judged;
When the identification code is used to identify the hardware information of first terminal, receives the server and returned for the checking request The usual hardware information corresponding with the subscriber identity information returned, the hardware letter of the first terminal that the identification code is identified Breath is compared with the usual hardware information, obtains common equipment the result.
4. method according to claim 3, also includes:
When the common equipment the result is that non-common equipment and/or the different-place login the result are different-place login When, whether presentation authorizes the prompt message of non-common equipment and/or different-place login;
If receiving the authorization message of user input, the authorization message is sent to the server, so as to server according to The subscriber identity information of authorization message and the second terminal carries out login authentication.
5. a kind of login authentication equipment, is configured at second terminal, including:
Collecting unit, is configured to carry out identification code in response to user the operation of IMAQ, to shown by first terminal Identification code carries out the figure that IMAQ is identified code, wherein, the identification code is used to identify the first terminal;
Request generation unit, is configured to be asked according to the graphic hotsopt login authentication of the identification code;
Request unit is sent, is configured to send login authentication request to server, so that the server is according to the login Checking request obtains the content that the subscriber identity information and the identification code of the second terminal are identified, according to described second The subscriber identity information of terminal carries out login authentication, and the first terminal identified to the identification code returns to the result;
The equipment also includes:
Geography information receiving unit, is configured to receive the first terminal that the server is returned for the checking request The corresponding geographical location information of IP and the second terminal the corresponding geographical location information of IP;First geography information compares Unit, is configured to the corresponding geographical location information of IP and second of first terminal for being received geography information receiving unit The corresponding geographical location information of IP of terminal is compared and obtains different-place login the result;Or, geographical the result is received Unit, is configured to receive the different-place login the result that the server is returned for the checking request, wherein, it is described different After ground login authentication result specifically receives the checking request by the server, the IP for inquiring about the first terminal is corresponding The corresponding geographical location information of IP of geographical location information and the second terminal, by the IP of the first terminal correspondingly The corresponding geographical location information of IP of reason positional information and the second terminal is compared and obtains.
6. equipment according to claim 5, wherein,
The request generation unit includes:First identification subelement, is configured to be identified the figure of the identification code, obtains The hardware information of the business information, identifying code and/or the first terminal that are identified to the identification code;Generation subelement, configuration For by the hardware information of business information, identifying code and/or first terminal, and the second terminal subscriber identity information Carry in checking request, generate checking request;
Or,
The request generation unit, is configured to carry in the figure of the login account of the second terminal and the identification code In checking request, checking request is generated;
Wherein, the identification code is specifically generated by first terminal, for identification service information, identifying code and/or described first The hardware information of terminal, wherein, the identifying code is specifically by server after the message that the request for receiving first terminal is logged in Generate, encrypt and return to first terminal, for identifying the first terminal, wherein, the business information is by first terminal root The business logged according to user's request determines.
7. equipment according to claim 6, also including following any unit or combination:
Business the result receiving unit, is configured to, when the identification code is used for identification service information, receive the service Device for the checking request return rightness of business the result, wherein, the rightness of business the result specifically by Server obtains the subscriber identity information and the business information according to the checking request, to the business information and institute State the corresponding legitimate traffic of subscriber identity information and be compared and obtain;
Identifying code the result receiving unit, is configured to, when the identification code is used for identity verification code, receive the service The identifying code legitimate verification result that device is returned for the checking request, wherein, the identifying code legitimate verification result tool Body obtains the identifying code by server according to the checking request, the identifying code is decrypted, to the identifying code mark after decryption Whether the terminal of knowledge is judged by the terminal that the identifying code is identified in generation;
Conventional the result receiving unit, is configured to, when the identification code is used to identify the hardware information of first terminal, connect The common equipment the result that the server is returned for the checking request is received, wherein, the common equipment the result The hardware information of the subscriber identity information and the first terminal is specifically obtained according to the checking request by server, it is right Whether the hardware information of the first terminal is that the corresponding usual hardware information of the subscriber identity information is judged;
General information receiving unit, is configured to, when the identification code is used to identify the hardware information of first terminal, receive institute State the usual hardware information corresponding with the subscriber identity information that server is returned for the checking request;First conventional sentences Disconnected unit, is configured to the hardware information of the first terminal that the identification code is identified for being received general information receiving unit It is compared with the usual hardware information, obtains common equipment the result.
8. equipment according to claim 7, also includes:
Tip element, is configured to when the common equipment the result is that non-common equipment and/or the different-place login are tested When card result is different-place login, whether presentation authorizes the prompt message of non-common equipment and/or different-place login;
Transmitting element is authorized, if being configured to receive the authorization message of user input, is awarded to described in server transmission Power information, so that server carries out login authentication according to the subscriber identity information of authorization message and the second terminal.
9. a kind of login validation method, is applied to server end, including:
Login authentication request in response to receiving second terminal transmission, wherein, the login authentication request is whole by described second The graphic hotsopt according to identification code is held, wherein, the figure of the identification code is specifically by second terminal in response to receiving to identification Code carries out the message of IMAQ, carries out IMAQ to the identification code shown by first terminal and obtains, wherein, the identification code For identifying the first terminal;
What the subscriber identity information and the identification code for obtaining the second terminal according to login authentication request were identified Content;
Subscriber identity information according to the second terminal carries out login authentication;
The first terminal identified to the identification code returns to the result;
Inquire about the corresponding geographical location information of IP of the first terminal and the corresponding geographical position of IP of the second terminal Information, the corresponding geographical location information of IP of the first terminal and the IP correspondences of the second terminal are returned to second terminal Geographical location information, so as to second terminal by the corresponding geographical location information of the IP of the first terminal and it is described second eventually The corresponding geographical location information of IP at end is compared and obtains different-place login the result;Or, inquire about the first terminal The corresponding geographical location information of IP of the corresponding geographical location information of IP and the second terminal, by the IP of the first terminal The corresponding geographical location information of IP of corresponding geographical location information and the second terminal is compared and obtains different-place login The result.
10. method according to claim 9, wherein, the use that the second terminal is obtained according to login authentication request The content of family identity information and identification code mark includes:
When the subscriber identity information of content and second terminal that login authentication request carrying identification code is identified, parsing The login authentication request obtains the content of the identification code mark and the subscriber identity information of second terminal;Or, work as institute State login authentication request carry identification code figure and second terminal subscriber identity information when, parsing the login authentication please The subscriber identity information of the figure and second terminal that obtain the identification code, the figure to the identification code is asked to be identified To the content of identification code mark;
Wherein, the identification code is specifically generated by first terminal, for identification service information, identifying code and/or described first The hardware information of terminal, wherein, the identifying code is specifically by server after the message that the request for receiving first terminal is logged in Generate, encrypt and return to first terminal, for identifying the first terminal, wherein, the business information is by first terminal root The business logged according to user's request determines;
Wherein, the subscriber identity information according to second terminal carries out login authentication specifically, being identified according to identification code The subscriber identity information of one or more and second terminal in business information, identifying code, the hardware information of first terminal enters Row login authentication.
11. methods according to claim 10, also including following arbitrary steps or combination:
When the identification code is used for identification service information, the subscriber identity information and institute are obtained according to the checking request Business information is stated, it is legal to be compared the business of obtaining to business information legitimate traffic corresponding with the subscriber identity information Property the result;
When the identification code is used for identity verification code, the identifying code is obtained according to the checking request, to the identifying code Whether decryption, the terminal to the identifying code mark after decryption by the terminal that the identifying code is identified in generation judge To identifying code legitimate verification result;
When the identification code is used to identify the hardware information of first terminal, the user identity is obtained according to the checking request The hardware information of information and the first terminal, whether the hardware information to the first terminal is the subscriber identity information Corresponding usual hardware information carries out judging to obtain common equipment the result;
When the identification code is used to identify the hardware information of first terminal, the subscriber identity information is inquired about corresponding conventional hard Part information, the usual hardware information is returned to the second terminal, so as to second terminal the identification code is identified the The hardware information of one terminal is compared with the usual hardware information and obtains common equipment the result.
12. methods according to claim 11, wherein, the subscriber identity information according to second terminal carries out login and tests Card is specifically, according to the rightness of business the result, identifying code legitimate verification result, common equipment the result, different It is any one or more in ground login authentication result, and the subscriber identity information of the second terminal carries out login authentication.
13. methods according to claim 11, wherein, the subscriber identity information according to second terminal carries out login and tests Card is specifically, or many in the rightness of business the result, identifying code legitimate verification result, authorization message The subscriber identity information of the individual and second terminal carries out login authentication;
Wherein, the authorization message is specifically received from second terminal, by second terminal when the common equipment the result is non- When common equipment and/or the different-place login the result are different-place login, presentation whether authorize non-common equipment and/or After the prompt message of different-place login, the authorization message according to user input is obtained.
A kind of 14. login authentication equipment, are configured at server, including:
Checking request receiving unit, is configured to the login authentication request in response to receiving second terminal transmission, wherein, it is described Login authentication request by the second terminal according to the graphic hotsopt of identification code, wherein, the figure of the identification code is specifically by the Two terminal responses carry out the message of IMAQ in receiving to identification code, and image is carried out to the identification code shown by first terminal Collect, wherein, the identification code is used to identify the first terminal;
Extraction unit, is configured to be obtained according to the login authentication request subscriber identity information and the institute of the second terminal State identification code and identify content;
Authentication unit, is configured to carry out login authentication according to the subscriber identity information of the second terminal;
Returning unit, the first terminal for being configured to be identified to the identification code returns to the result;
The equipment also includes:
Geography information transmitting element, is configured to inquire about the corresponding geographical location information of IP and described of the first terminal The corresponding geographical location information of IP of two terminals, the corresponding geographical location information of IP of the first terminal is returned to second terminal And the corresponding geographical location information of IP of the second terminal, so that second terminal is corresponding by the IP of the first terminal The corresponding geographical location information of IP of reason positional information and the second terminal is compared and obtains different-place login checking knot Really;Or, the second geography information comparing unit, be configured to inquire about the corresponding geographical location information of IP of the first terminal with And the corresponding geographical location information of IP of the second terminal, by the corresponding geographical location information of the IP of the first terminal and The corresponding geographical location information of IP of the second terminal is compared and obtains different-place login the result.
15. equipment according to claim 14, wherein, the extraction unit is configured to be asked when the login authentication During the subscriber identity information of carrying identification code and second terminal, parse the login authentication request and obtain the identification code mark Content and second terminal subscriber identity information;Or, when the login authentication request carry identification code figure and During the subscriber identity information of second terminal, figure and second terminal that the login authentication request obtains the identification code are parsed Subscriber identity information, be identified obtaining the content of the identification code mark to the figure of the identification code;
Wherein, the identification code is specifically generated by first terminal, for identification service information, identifying code and/or described first The hardware information of terminal, wherein, the identifying code is specifically by server after the message that the request for receiving first terminal is logged in Generate, encrypt and return to first terminal, for identifying the first terminal, wherein, the business information is by first terminal root The business logged according to user's request determines;
Wherein, the authentication unit, is configured to according in identification code business information, identifying code, the hardware information of first terminal The subscriber identity information of one or more and second terminal carry out login authentication.
16. equipment according to claim 15, also including following any unit or combination:
The legal judging unit of business, when being configured to the identification code for identification service information, obtains according to the checking request It is corresponding with the subscriber identity information to the business information legal to the subscriber identity information and the business information Business is compared and obtains rightness of business the result;
Identifying code judging unit, is configured to, when the identification code is used for identity verification code, be obtained according to the checking request The identifying code, decrypts to the identifying code, and whether the terminal to the identifying code mark after decryption is that the identifying code is being generated When the terminal that is identified carry out judgement and be verified a yard legitimate verification result;
Second conventional judging unit, is configured to when the identification code is used to identify the hardware information of first terminal, according to institute The hardware information that checking request obtains the subscriber identity information and the first terminal is stated, to the hardware of the first terminal Whether information is that the corresponding usual hardware information of the subscriber identity information carries out judging to obtain common equipment the result;
General information transmitting element, is configured to, when the identification code is used to identify the hardware information of first terminal, inquire about institute The corresponding usual hardware information of subscriber identity information is stated, the usual hardware information is returned to the second terminal, so as to second The hardware information of the first terminal that terminal is identified the identification code is compared with the usual hardware information and is commonly used Device authentication result.
17. equipment according to claim 16, wherein, the authentication unit is configured to according to the rightness of business In the result, identifying code legitimate verification result, common equipment the result, different-place login the result any one or Multiple, and the subscriber identity information of the second terminal carries out login authentication.
18. equipment according to claim 16, wherein, the authentication unit is configured to according to the rightness of business The login account of one or more and the second terminal in the result, identifying code legitimate verification result, authorization message Number carry out login authentication;
Wherein, the authorization message is specifically received from second terminal, by second terminal when the common equipment the result is non- When common equipment and/or the different-place login the result are different-place login, presentation whether authorize non-common equipment and/or After the prompt message of different-place login, the authorization message according to user input is obtained.
CN201310738898.8A 2013-12-27 2013-12-27 A kind of login validation method and equipment Active CN103685311B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310738898.8A CN103685311B (en) 2013-12-27 2013-12-27 A kind of login validation method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310738898.8A CN103685311B (en) 2013-12-27 2013-12-27 A kind of login validation method and equipment

Publications (2)

Publication Number Publication Date
CN103685311A CN103685311A (en) 2014-03-26
CN103685311B true CN103685311B (en) 2017-06-13

Family

ID=50321625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310738898.8A Active CN103685311B (en) 2013-12-27 2013-12-27 A kind of login validation method and equipment

Country Status (1)

Country Link
CN (1) CN103685311B (en)

Families Citing this family (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905206A (en) * 2014-04-03 2014-07-02 江苏先安科技有限公司 Cross-equipment and cross-application identity authentication method based on data image coding
CN104980400A (en) * 2014-04-08 2015-10-14 深圳市腾讯计算机系统有限公司 Login access control method and login access control server
CN103945380A (en) * 2014-04-10 2014-07-23 深圳市信锐网科技术有限公司 Method and system for network login authentication based on graphic code
CN105024986B (en) * 2014-04-30 2019-09-17 腾讯科技(深圳)有限公司 The methods, devices and systems that account number logs in
CN104378344B (en) 2014-05-26 2016-03-09 腾讯科技(深圳)有限公司 Log-on message transmission method, barcode scanning method and device, background server
CN103971239A (en) * 2014-05-28 2014-08-06 中国农业银行股份有限公司 Verification method and device
CN105227307A (en) * 2014-06-03 2016-01-06 阿里巴巴集团控股有限公司 Auth method and system and server data processing method and server
CN104066203A (en) * 2014-06-20 2014-09-24 可牛网络技术(北京)有限公司 Method and system for generating identifier of mobile device, method for remotely controlling mobile device, and communication terminal
CN105490809B (en) * 2014-09-17 2020-11-06 腾讯科技(深圳)有限公司 Information acquisition method and device, terminal and server
CN105763520A (en) * 2014-12-18 2016-07-13 阿里巴巴集团控股有限公司 Network account password recovery method and device, client terminal device and server
CN104618356B (en) * 2015-01-20 2018-02-16 广东欧珀移动通信有限公司 Auth method and device
CN105991619B (en) * 2015-03-05 2021-01-15 中兴通讯股份有限公司 Security authentication method and device
CN104917766B (en) * 2015-06-10 2018-01-05 飞天诚信科技股份有限公司 A kind of two-dimension code safe authentication method
CN105095729B (en) * 2015-06-19 2018-05-25 广州密码科技有限公司 A kind of Quick Response Code login method, server and system
CN106651407B (en) * 2015-07-17 2020-12-25 阿里巴巴集团控股有限公司 Data acquisition method and device
CN105162774B (en) * 2015-08-05 2018-08-24 深圳市方迪融信科技有限公司 Virtual machine entry method, the virtual machine entry method and device for terminal
CN105162775A (en) * 2015-08-05 2015-12-16 深圳市方迪科技股份有限公司 Logging method and device of virtual machine
CN106507158B (en) * 2015-09-06 2020-07-14 腾讯科技(北京)有限公司 Information processing method, first terminal and second terminal
CN105162785B (en) * 2015-09-07 2019-01-04 飞天诚信科技股份有限公司 A kind of method and apparatus registered based on authenticating device
CN105187450B (en) * 2015-10-08 2019-05-10 飞天诚信科技股份有限公司 A kind of method and apparatus authenticated based on authenticating device
CN105516135B (en) * 2015-12-08 2020-02-21 腾讯科技(深圳)有限公司 Method and device for account login
CN106936761A (en) * 2015-12-29 2017-07-07 株式会社日立制作所 A kind of secure log authentication method and system based on Quick Response Code and hardware information
CN107204959B (en) * 2016-03-16 2020-07-24 阿里巴巴集团控股有限公司 Verification method, device and system of verification code
CN106060098B (en) * 2016-08-09 2019-07-09 北京小米支付技术有限公司 Processing method, processing unit and the processing system of identifying code
CN107172025A (en) * 2017-04-28 2017-09-15 武汉矽感科技有限公司 Method for authenticating user identity and device based on multiframe identification code
CN109600340B (en) * 2017-09-30 2021-04-16 腾讯科技(深圳)有限公司 Operation authorization method, device, terminal and server
CN108985040B (en) * 2018-06-29 2019-06-28 北京海泰方圆科技股份有限公司 Method and apparatus, storage medium and the processor logged in using cipher key
CN109150852A (en) * 2018-07-31 2019-01-04 海南新软软件有限公司 A kind of account number safe login method, apparatus and system
CN109741067B (en) * 2018-12-19 2023-05-30 广州羊城通有限公司 Data processing method and device based on IC card unlocking
CN109711133B (en) * 2018-12-26 2020-05-15 巽腾(广东)科技有限公司 Identity information authentication method and device and server
CN109753773A (en) * 2019-01-08 2019-05-14 浙江汉默生链商科技有限公司 A kind of quick auth method and device based on terminal
CN110427747B (en) * 2019-06-20 2021-12-14 中国科学院信息工程研究所 Identity authentication method and device supporting service security mark
CN111726331A (en) * 2019-06-28 2020-09-29 上海妃鱼网络科技有限公司 Code scanning login information processing method
CN110830930B (en) * 2019-11-19 2021-09-24 东北石油大学 Verification code anti-sniffing processing method and device
CN110995682A (en) * 2019-11-26 2020-04-10 深圳市思迪信息技术股份有限公司 Method and device for preventing multiple terminals from logging in at different places
CN111245841A (en) * 2020-01-14 2020-06-05 杭州涂鸦信息技术有限公司 Account authorization method and system
CN113746801B (en) * 2021-07-30 2023-07-11 佛山市青松科技股份有限公司 Communication method, sending terminal, receiving terminal and system based on temporary secret key
CN113625984A (en) * 2021-08-16 2021-11-09 中国工商银行股份有限公司 Method and device for realizing same screen of mobile terminal and automatic teller machine
CN115834077B (en) * 2022-11-11 2023-08-01 北京深盾科技股份有限公司 Control method, control system, electronic device and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102111271A (en) * 2009-12-25 2011-06-29 林茂聪 Network security authentication method and device as well as authentication method of hand-held electronic device
CN102130909A (en) * 2011-02-22 2011-07-20 中兴通讯股份有限公司 Authentication method and system
CN102724667A (en) * 2012-05-29 2012-10-10 中国联合网络通信集团有限公司 Authentication method, device and system
CN103001973A (en) * 2012-12-26 2013-03-27 百度在线网络技术(北京)有限公司 Method, system and device used for controlling login and based on two-dimensional code
CN103023917A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for authorization aiming at intelligent household electrical appliance
CN103152330A (en) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 Login method, login system and cloud server
CN103152401A (en) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 Mobile terminal, login method and system through mobile terminal, and cloud server
CN103237034A (en) * 2013-04-28 2013-08-07 北京小米科技有限责任公司 Login method and device
CN103457951A (en) * 2013-09-02 2013-12-18 小米科技有限责任公司 Method and device for allowing multiple terminals to login to server

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102111271A (en) * 2009-12-25 2011-06-29 林茂聪 Network security authentication method and device as well as authentication method of hand-held electronic device
CN102130909A (en) * 2011-02-22 2011-07-20 中兴通讯股份有限公司 Authentication method and system
CN102724667A (en) * 2012-05-29 2012-10-10 中国联合网络通信集团有限公司 Authentication method, device and system
CN103001973A (en) * 2012-12-26 2013-03-27 百度在线网络技术(北京)有限公司 Method, system and device used for controlling login and based on two-dimensional code
CN103023917A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for authorization aiming at intelligent household electrical appliance
CN103152330A (en) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 Login method, login system and cloud server
CN103152401A (en) * 2013-02-07 2013-06-12 百度在线网络技术(北京)有限公司 Mobile terminal, login method and system through mobile terminal, and cloud server
CN103237034A (en) * 2013-04-28 2013-08-07 北京小米科技有限责任公司 Login method and device
CN103457951A (en) * 2013-09-02 2013-12-18 小米科技有限责任公司 Method and device for allowing multiple terminals to login to server

Also Published As

Publication number Publication date
CN103685311A (en) 2014-03-26

Similar Documents

Publication Publication Date Title
CN103685311B (en) A kind of login validation method and equipment
CN110086608B (en) User authentication method, device, computer equipment and computer readable storage medium
CN103107996B (en) Digital certificate download online method and system, digital certificate are provided platform
CN105050081B (en) Method, device and system for connecting network access device to wireless network access point
CN104580264B (en) Login method, entering device and login and Accreditation System
CN106209763B (en) A kind of login method and system
CN103281340B (en) 2 D code verification method, system, client, issue and cloud server
CN110351228A (en) Remote entry method, device and system
CN108632231A (en) A kind of internet of things equipment, Internet of Things authentication platform, authentication method and system
US20160021111A1 (en) Method, Terminal Device, and Network Device for Improving Information Security
CN104883367B (en) A kind of method, system and applications client that auxiliary verification logs in
CN105099707B (en) A kind of offline authentication method, server and system
CN109413096A (en) A kind of login method and device more applied
CN105447715A (en) Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party
US20170012781A1 (en) A Solution For Generating And Issuing Security Codes With Guaranteed Issuer Authenticity And Origin
CN110768973A (en) Signaling safety evaluation system and method based on GB35114 standard
CN103023911A (en) Authentication method for access of trusted network devices to trusted network
CN107484032A (en) Prevent the verification method and device brushed
CN108234442A (en) Obtain method, system and the readable storage medium storing program for executing of contract
CN108011717A (en) A kind of method, apparatus and system for asking user data
CN106572082A (en) Approval signature verifying method, mobile device, terminal device and system
CN106330828A (en) Method for network secure access, terminal device and authentication server
CN104717224A (en) Login method and device
CN110505185A (en) Auth method, equipment and system
CN102025748B (en) Method, device and system for acquiring user name of Kerberos authentication mode

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211008

Address after: 310051 Room 408, building 3, No. 399, Wangshang Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Netease Zhiqi Technology Co.,Ltd.

Address before: 310052 Building No. 599, Changhe Street Network Business Road, Binjiang District, Hangzhou City, Zhejiang Province, 4, 7 stories

Patentee before: NETEASE (HANGZHOU) NETWORK Co.,Ltd.